Mobile surveillance
Mobile credentials are set to become the mainstream choice for access control in office buildings as a new generation of workers are forcing employers and landlords to prioritise fast, secure and convenient access via their smartphones. Omdia predicts annual downloads of mobile credentials worldwide rising from 20 million in 2020 to 120 million by 2023 and 150 million in 2024. It is particularly bullish about Bluetooth, which it predicts to grow by more than three times the speed of the next hi...
PointCentral announced a new integration with Hostfully, an end-to-end property management platform, that improves keyless access and smart property automation management. Property managers use PointCentral’s cloud-based property automation platform to remotely monitor and control access and energy use at their connected rental properties. Now, property managers can offer contactless check-in to incoming guests through an automated data transfer between PointCentral and Hostfully that crea...
Johnson Controls, the front-runner for smart, healthy and sustainable buildings, announced new Environmental, Social and Governance (ESG) commitments, science-based targets as well as a net zero carbon pledge to support a healthy, more sustainable planet over the next two decades. The company’s and customers’ emissions reduction will be driven by Johnson Controls’ OpenBlue technologies and innovations which leverage big data and artificial intelligence to optimise buildings sus...
Tech-enabled mobile security services company, The Keyholding Company, aims to disrupt the traditional keyholding model for businesses by removing the need for mechanical keys and saving clients up to 87% on their key management and access services costs. Smart Access uses cloud-enabled smart locks, alongside a mobile key app, to replace the need for a professional keyholder. Access rights are managed through The Keyholding Company’s well-established Smart Security Platform, which connect...
Researchers at cyber-security specialist Check Point Research have identified a security vulnerability in TikTok’s ‘Find Friends’ feature. If left unpatched, the vulnerability would have enabled an attacker to access a user's profile details and the phone number associated with their account, making it possible to build a database of users and their related phone numbers for use in malicious activity. Certain profile settings Profile details that were accessible via the vuln...
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, wheth...
News
VIVOTEK, the globally-renowned IP surveillance solution provider, has in recent years been committed to offering comprehensive solutions through multiple strategic alliances. Integrated access control Partnering with Chiyu Technology, one of the most experienced access control system provider in Taiwan, VIVOTEK rolls out the latest integrated access control and IP surveillance solution, an one-stop shopping, seamless integration, and easily managed solution to meet the market's demand. Traditional access control system requires time, budget, and third-party partners to adopt and integrate the intelligent IP surveillance technology with it. This new integrated solution, however, can be adopted in various fields at once and establishes a considerably higher level of security. Equipped with facial recognition and video tagging With facial recognition and video tagging, the new solution can accurately verify who is entering a specified area With facial recognition and video tagging, the new solution can accurately verify who is entering a specified area and then subsequently track where visitors go once they have entered. VIVOTEK also provides a wide selection of versatile network cameras to deliver high-quality imagery in diverse and changing environmental conditions. More importantly, security staff can easily manage both IP surveillance and access control systems through VIVOTEK’s VAST 2, user-friendly, intuitive video management software. All of these advanced features combine to provide an enhanced user experience while simplifying procedures of device setting and management. IP surveillance and access control integration “The integration of IP surveillance and access control has become a growing trend for Smart Security Systems. I believe this cooperation with IP surveillance pioneer VIVOTEK will build a mutually beneficial partnership, making us more competitive in the global industry,” said Eric Chang, General Manager of Chiyu Technology. From network cameras, and access control systems to backend software, VIVOTEK provides one-stop shopping solutions to create a new standard of customer service. Strategic partnership “It is our pleasure to team up with Chiyu Technology. With their profound expertise in the industry, we can reinforce our solutions' capability and realise the potentials of our products. We will be relentlessly devoted to offering more comprehensive and compatible IP surveillance solutions to unlock new possibilities for different applications and vertical markets,” said William Ku, Executive Vice President of VIVOTEK Brand Business Group.
A feeling of security is a universal human need. And beyond physical, bodily security, people need to know that their environment, investments, and belongings are safe as well. Security systems are installed in homes and businesses every day to create that sense of security. Compared to conventional sensor-based alarm systems, a surveillance system that utilises cameras has several advantages: The ability to watch events in real-time, Obtaining key data around those events, and Providing solid and accurate evidence for law enforcement. AcuSense technology Hikvision AcuSense technology distinguishes people and vehicles from other moving objects Empowered by deep learning algorithms, Hikvision AcuSense technology distinguishes people and vehicles from other moving objects. AcuSense is the perfect choice for an accessible and intelligent security system. AcuSense technology helps to focus on human and vehicle events in two ways: The device will only trigger an alarm when the preset intrusion type (human or vehicle) takes place, and Videos related to alarm events are sorted into human and vehicle categories for easier footage searches. With AcuSense Technology, users get some powerful functions, such as: Accurate alarm for humans and vehicles - Focus on alarms triggered by humans and vehicles while false alarms triggered by animals or irrelevant objects are vastly reduced. Visual and auditory warning - On-site response and deterrence methods using visual and customisable auditory warnings add another layer of protection. Search targets quickly by type - Video clips sorted by human and vehicle categories, and object classification improves search efficiency. Searching video clips gets easier Video clips are already sorted into the ‘Human Files’ and ‘Vehicle Files’. Users just need to click one of these categories and use time or location data to quickly locate the clip that they want. Compared to the conventional method that displays all video files at once, AcuSense technology enables carrying out searching much more easily. Ideal applications Residential – Intrusion detection and deterrence for home security Whether choosing to keep an eye on the house or hiring a professional service provider to look after security of the home, there are two functions that users will surely want to have: Prompt notification via smartphone Users will get a notification on the app or via SMS, when the alarm is triggered. Irrespective of who takes care of looking after intrusion events, it’s always good to have first-hand information. Users will get a notification on the app or via SMS, when the alarm is triggered. Then, they can check out the live video from their smartphone. Light and Sound Intruder Deterrence Knowing what the suspect looks like is important, especially for providing evidence to police. However, property losses have already occurred at that time. It would be even better if there were means that can provide on-site deterrence and prevent any loss at all. Network Cameras with AcuSense technology Network Cameras with AcuSense technology, white light and audio alarm can be set to react to intrusion events with a flashing light and customisable siren, alerting any would-be intruder that they are being monitored and have already been spotted. Turbo DVR with AcuSense technology requires a PIR/TurboX camera for visual and audible alarm. Factories – Accurate trespass alarm, 24 hours a day Factories and warehouses store high-value raw materials or commodities. Security here is crucial. However, there is usually only limited manpower to perform such tasks. Replace security patrols with camera monitoring Using AcuSense technology can greatly improve perimeter monitoring efficiency and ensure that limited human resources can be deployed only where most needed. Accurate Trespassing Alarm for Human Targets Factories and warehouses mostly deal with human intrusion events, which might turn into burglary or vandalism. The security team can set devices with AcuSense to send alerts only upon the detection of a human intrusion. Wild animals crossing the line will no longer trigger the alarm.
Eagle Eye Networks, the global front-runner in smart cloud video security, has appointed David Barr as Enterprise Sales Manager for Europe to build the Enterprise Market Segment throughout the region. David has 30 years of experience in the security industry, joining Eagle Eye Networks after 17 years with Xtralis ADPRO, which in recent years was acquired by Honeywell. Responsibilities In his new role, David will work with Eagle Eye Networks global and EMEA end users and partners to develop their strategy, as the security market transitions from an on-premise recorder market to a true cloud market for video surveillance. Hybrid on-premise and cloud solution “This change isn’t happening overnight, but the great thing about Eagle Eye Networks is the possibility to start with a hybrid on-premise and cloud solution where clients can immediately see benefits of the cloud without investing in new hardware,” said David. “Eagle Eye Networks works with more than 3,500 existing analogue or IP cameras, and even DVRs can be directly connected to the cloud." "This is a gamechanger for companies that want to upgrade their video surveillance, migrate to the cloud for additional cybersecurity, and better manage their operations in a multi-site environment.” API integrations and open platform capabilities Rishi Lodhia, Managing Director for the region, added, "The creation of this new role and the experience David brings to Eagle Eye Networks illustrates the company’s continued commitment and growth to support Enterprise customers within the region.” “Enterprise customers are transitioning rapidly to the cloud due to our easy API integrations and open platform capabilities."
FLIR Systems has announced the release of the FLIR SV87-KIT, which offers a low cost, easy-to-configure, and 24/7 remote vibration and temperature sensing solution. Often before industrial machinery start showing issues that require immediate maintenance, pending problems can be detected through minute vibration changes. Temperature sensing monitoring The first component of effective condition monitoring is a combined remote vibration and temperature sensing monitoring solution. Manufacturing facilities from paper mills, to food and beverage processors to the oil and gas industry benefit from 24/7 remote condition monitoring of critical infrastructure and machinery. By combining the power of FLIR Systems’ vibration and temperature detection, industries now have a complete solution kit that maximises production output, improves worker safety, and reduces operational costs. Remote vibration detection FLIR SV87-KIT is low cost, easy-to-configure, and can install on any surface with wireless connectivity Vibration detection technology not only provides early warning to help eliminate maintenance surprises before they happen, but it also empowers staff to prioritise and streamline its maintenance schedule, so as to maximise efficiency and performance, while reducing downtime. However, traditional wired continuous vibration monitoring systems can be expensive, not always up to date, and cumbersome to install. The FLIR SV87-KIT, on the other hand, is low cost, easy-to-configure, and can install on any surface with wireless connectivity to a Wi-Fi network. This also provides maintenance staff with the ability to track changes in vibration and heat in real time and over time, providing operational insights to predict potentially serious problems before failure. The FLIR SV87-KIT is available to purchase globally through FLIR Systems and authorised FLIR Systems equipment distributors for a base price of US$ 999, with shipments slated to begin in the fourth quarter of 2020.
ProdataKey (PDK), manufacturer of the cloud access control platform built for mobile, releases a whitepaper that explores the differentiating features and distinct advantages of a Mobile First access control platform. Built from the ground up with the needs of the mobile user foremost in mind, Mobile First platforms are designed with the mobile experience as the default method by which integrators, technicians, system administrators, managers, tenants, and employees engage with the system. Expansive range of capabilities The whitepaper examines what Mobile First means to each of these stakeholders by offering specific examples of how its anytime, anywhere access expands the platform's usability in numerous and sometimes unexpected ways. Mobile First access control is conflated with more common mobile apps and mobile credentialing options Too often, Mobile First access control is conflated with more common mobile apps and mobile credentialing options, which provide only partial mobile functionality. This whitepaper addresses the more expansive range of capabilities that Mobile First solutions support, such as simplified installation, proactive maintenance, customer support, integration flexibility, unlimited credentialing, greater productivity by system managers, and much more. Access control projects These Mobile First advantages are in addition to the obvious convenience and superior security obtained when encrypted credentials on mobile devices replace users' keys and fobs. “As security stakeholders increasingly demand a mobile component to their access control projects, it’s important for them to understand their options.” “They often mistakenly believe that mobile access control means nothing more than allowing employees and tenants to open doors. They deserve better. We hope that this whitepaper helps to clarify why, in a world in which mobile device use now exceeds computer use, it makes the most sense to consider access control solutions that are 100% designed for the small screen,” said Jeff Perri, President and COO of ProdataKey.
Synology Inc. launches the next Deep Learning NVR, the DVA3221, for advanced on-premises video surveillance and analytics. Using GPU-accelerated deep learning algorithms, DVA3221 can generate real-time insights that enable security personnel to take action immediately. Facial recognition, people counting, vehicle detection, and additional video analysis capabilities enable the users to deploy a more intelligent solution for a safer environment. Continuous software updates "The DVA product line is constantly improving, thanks to continuous software updates. Our recently introduced Surveillance Station update introduced several new key features, such as facial, people and vehicle detection, and even the capability to detect mask usage," said Tony Lin, Synology Product Manager for Surveillance Station. DVA3221 continues to push the boundaries further, with support for more real-time analysis tasks" "DVA3221 continues to push the boundaries further, with support for more real-time analysis tasks." DVA3221 combines Synology's expertise in data storage and management with our powerful VMS solution, Surveillance Station. Support for over 7,600 cameras, ONVIF compatibility, and integration with I/O modules and speakers mean that one is not tied down to a specific brand or platform. With all analytics stored and processed on-prem, the solution can be entirely standalone, with no internet connectivity required unless setting up cloud or off-site backups. Optional internet connectivity Surveillance Station is platform-agnostic, supporting playback and management through mainstream browsers, through the Windows and Mac clients, and mobile apps. Deep-learning powered video analytics for facial recognition, people and vehicle detection, people counting, and more. Supports up to 32 camera feeds, with six real-time video analytics tasks. Search intelligently through existing footage by filters such as motion detection, missing items, no-idle zones, and more. Store large amounts of footage with four internal 3.5" bays, expandable up to 14.2. Easily archive and backup footage to a remote destination for safekeeping. Complete data ownership and perpetual licences. All video processed on-premises, with optional internet connectivity needed only for remote backups and viewing. No subscriptions are needed.


Expert commentary
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centres (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximise situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernised and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimise human error and optimise resource utilisation. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command centre through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance of ease of installation Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable and can be very expensive. In some cases, the cost of labour to install a camera can be more than the cost of the camera! If labour costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labour in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labour cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying installation of cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement through modular cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilise magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular cameras offer flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analogue video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software programs help in enhancing installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall video footage. Active archive strategy These challenges are thrusting storage tiers to the forefront of system design. Storage tiers in video surveillance had previously meant simply using a separate archive or attaching add-on capacity directly to network video recorders. Many of the new storage options designed for video surveillance are pulling together different storage tiers into a single storage architecture Many of the new storage options designed for video surveillance are pulling together different storage tiers (and in some cases storage media) into a single storage architecture, such as an active archive solution. This balance can be achieved with an active archive strategy that automates migration of data between different storage types, to ensure the data is on the correct storage type at the correct time to meet performance and retention requirements without blowing the budget. This approach also ensures ease of access while automatically moving content from more expensive tiers of storage to more cost-effective long-term tiers of storage. This allows for greater efficiencies in how recorded footage is treated throughout its lifecycle. In some cases, it includes moving data from edge devices to centralised storage, and then to the public cloud. Scalable video storage solutions As storage demands have increased, video management vendors have turned to storage specialists for solutions that can accommodate large numbers of high-resolution video files, metadata associated with the footage for easy searching, along with much needed scalable solutions. In terms of video management software, this means the integration of video content from different storage types, tiers and physical locations is required, and which considers the performance profile of each storage type. With an active archive solution, video content is searchable and accessible directly by the end users regardless of where it is stored. Deploying an active archive solution enables surveillance users to reduce the complexity and costs of managing data for long term retention As seen in many product categories, camera and storage vendors continue to provide extremely competitive offerings. But, storage-specific solutions for video surveillance have lagged behind the roadmaps for video equipment and, as more and more cameras have entered the market, less attention has been placed on video storage capacities. Tiered storage strategy The surveillance industry has evolved considerably from the days of the 8mm video recorder; however, enterprise storage solutions will be forced to evolve further to cope with changing storage retention requirements. Video storage is quickly becoming one of the most expensive parts in a surveillance solution, but there is hope. Deploying an active archive solution will enable surveillance users to reduce the complexity and costs of managing from terabytes to petabytes of data for long term retention. By finding a storage solution that delivers the ability to implement a tiered storage strategy, users can adhere to regulation requirements to retain video footage and meet their safety and security objectives, while also significantly reducing storage costs and operational expenses.
Security beat
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts. Helping customers remain connected Adapting to challenges of the coronavirus pandemic, Alarm.com is further investing in solutions that help customers remain connected and engaged. The company has created a resource hub called “Succeeding Remotely” that provides tools, tips and news links that partners can use to adapt their business operations. From adjusting sales and installation techniques to maintaining cellular upgrades, Alarm.com is helping partners stay connected to customers remotely, keep their teams trained, and address rapidly evolving customer concerns without rolling trucks.The company has created a resource hub called “Succeeding Remotely “Additionally, after seeing all that our partners are doing to support their local communities in need, we were compelled to highlight those efforts with ongoing videos called Good Connections, which we’re sharing with our partner community to spark more ideas and ways to help,” says Ferguson. “Though our partners have experienced varying degrees of disruption to their business, we’re inspired by their adaptability, ingenuity and resilience,” says Ferguson. “Along with establishing proper safeguards for operating in homes and businesses, our partners are leveraging our support resources more heavily, while our entire staff has worked tirelessly to deliver new, timely resources.” Do-It-Together solutions Alarm.com partners are successfully employing Do-It-Together (DIT) solutions, focusing on 3G-to-LTE upgrades, and pivoting to new verticals like commercial and wellness. Many are also streamlining their business operations and taking advantage of virtual training opportunities to enhance their technicians’ skills and knowledge, says Ferguson. Do-It-Together installs involve depending on customers to perform part or all of the installation process. Partners can send customers fully configured kits with mounting instructions, or technicians may guide customers on a remote video call. Alarm.com’s tools, training and products help partners modify remote installation options depending on each customer’s needs. End users can validate the Alarm.com Smart Gateway with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app Alarm.com Smart Gateway For example, the Alarm.com Smart Gateway can be pre-configured with indoor and outdoor cameras for easy customer installation and to reduce the likelihood of future service calls. Also, end users can validate with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app. “DIT is helping our partners continue onboarding customers and avoid backlogs,” says Ferguson. “We’ve been pleasantly surprised by the resiliency and level of future investment that our residential and commercial partners have shown in the face of adversity,” adds Ferguson. For example, a significant number of business customers have used the slow period to install systems that are typically too disruptive to put in during normal business hours. Similarly, service providers are adopting new technologies or business models, such as cloud-based access control. “They’re often saying to us, ‘I’m going to take this opportunity to make changes to improve our business,’ and have been working closely with us on training and business consulting to support their efforts,“ she says. Shift to the cloud Ferguson sees a growing preference for cloud-managed surveillance and access systems over ones that have historically been run on-premise. The technology itself is attractive, but especially driving change is the enhancement to the daily lives of service providers and customers, which have been strained during this time. “The foundational benefit of our cloud-based solution is the hassle-free, seamless customer experience it delivers,” says Ferguson. “We make this possible by taking ownership of the servers, software maintenance, firmware updates, health monitoring, and more. With cloud technology, these aspects become invisible to the customer and take a lot off their plate, which is more important than ever.” End users can take advantage of Smart Tip video tutorials to help with DIT installations, or they can use the Alarm.com Wellcam to connect with loved ones anywhere.End users can take advantage of Smart Tip video tutorials to help with DIT installations Partners can attend training workshops focused on remote installation tactics, while driving consumer interest in new offerings through Alarm.com’s Customer Connections platform. The goal is to make it simple for partners to stay connected to their customers to maximise lifetime account value. “We are well-positioned to endure the pandemic because of the strength of our partners in their markets along with our investments in technology, hardware and our team,” says Ferguson. “As restrictions slowly lift, there is cautious optimism that the residential, commercial, property management, plumbing/HVAC, builder and other verticals will recover quickly. We believe that as more partners adopt the DIT model and add commercial and wellness RMR, they will find increasing opportunities to deploy security, automation, video, video analytics, access and more throughout their customer base.”
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analysed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralised management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organisation. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Case studies
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
HID Global, a pioneer in trusted identity solutions, announces that aerospace company Avolon has selected the HID Mobile Access® solution for physical access at its headquarters in Dublin and other locations worldwide. Powered by HID’s award-winning Seos® credential technology, the solution enables Avolon to issue staff Mobile IDs to smartphones for building access and provides an efficient management platform for its global network of offices. Maintaining secure perimeter Avolon is one of the aircraft leasing companies servicing many of the world’s major airlines. HID partnered with Ireland-based systems integrator Summit Security Systems Ltd to deploy the HID Mobile Access solution and HID® readers throughout Avolon’s Dublin campus. Mobile IDs are sent to Avolon staff via an app on a user’s Android or iOS mobile device so they can quickly and easily use their phones to gain access to Avolon facilities. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility" “We needed to maintain a secure perimeter, but we did not want the security to be a barrier. Using a mobile phone is much more convenient than an access card and phones tend not to get left behind,” said Allan Dawson, facilities project manager at Avolon. “We were looking for a system that was highly flexible, highly mobile and highly secure. HID has offered us that and the solution gives us everything that we want in terms of security and flexibility.” Touchless access control The HID Mobile Access solution facilitates around-the-clock office access for staff members and equips administrators to manage access rights from a centralised, cloud-based portal. Since Mobile IDs are issued remotely, they can easily be issued or revoked for added convenience and efficiency. “Avolon’s use of HID Mobile Access makes touchless access control possible for a more seamless user experience, which is appealing to many organisations in today’s new normal,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control with HID Global. “The scalability of our solution also lays the groundwork for Avolon to easily extend mobile access across more of its facilities.” Following the successful deployment of mobile access at its Dublin headquarters, Avolon has also launched the HID Mobile Access solution at its New York, Florida and Hong Kong offices, with plans underway for its Singapore campus.
In a time where marking specific locations have never been more important to aid in carrying out safe social distancing, security teams can struggle to communicate locations that do not have physical addresses. Need to effectively track locations Traditional street addresses can only work to a certain extent, globally 70% of addresses will not take one to the front door, with 74% of people saying clients, services and deliveries struggle to find them. Many places don’t have an address at all, so teams are left to depend on landmark-based descriptions such as, for example an address mentioning behind the third building to the left of the large tree, just after the crossroads. GPS coordinates can help, but they are difficult to communicate over the radio. what3words location tracking app what3words is a free app which has divided the world into 57 trillion 3-metre squares and given each square a unique combination of three words, a what3words address. The what3words app enables people to easily convey locations from specific building entrances or parking spots, and it provides easy location references in places with no street addresses, such as building sites, event spaces and large offices with multiple entrances. Location and property management company, The Movie Lot, use what3words to manage their security operations. The Movie Lot specialise in film and television security, location support, and traffic management for the British entertainment industry. Cutting-edge GPS technology We’ve used what3words to coordinate guards on locations from Hospital sites to outdoor film sets" They are experts at using cutting-edge GPS technology to ensure that even the most complex operations are equipped to cover the smallest detail. The Movie Lot use what3words to coordinate production and security crews as well as equipment whilst on location, and have also provided security staff for University College Hospital London during the Covid-19 pandemic, as well as working on some of the world’s renowned household name entertainment productions, such as the Fantastic Beasts and Doctor Who movie franchises. The Director at The Move Lot, Mark Davies, explains how what3words has helped their security. He said, “We are proud to be partnered with what3words, it has been a huge addition for us to navigate guards to their exact position on locations. We’ve used what3words to coordinate guards on locations from Hospital sites to outdoor film sets.” An effective and quick emergency response Mark adds, “what3words is commonly used in the film industry and being able to utilise it on site to describe precise locations has given our team great support.” what3words has also been credited for its capability of saving lives, with emergency services urging the public to download the app in order to facilitate a more efficient response. what3words works offline, making it ideal for use in rural areas or areas with an unreliable data connection.
Supra, a provider of mobile credentialing and entry management systems for automotive and real estate sectors, announces that its TRAC-Box key management solution has been selected by Oregon-based Guaranty RV Super Centres to help secure and track keys while keeping pace with a growing demand for recreational vehicle (RV) travel. Supra is a part of Carrier Global Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. Located in Junction City, Oregon, Guaranty is the state’s largest dealer of recreational vehicles, from entry-level tent campers to luxurious diesel-powered RVs that sell for more than $400,000. Gaining valuable sales An industry publication, RV Business, has named Guaranty one of North America’s top 50 dealers for six consecutive years and a top 10 dealership based on customer reviews. “With our large footprint of 25 acres and long dark winters, it is difficult to have visibility of activity,” said Marty Nill, managing partner, Guaranty. “With the Supra TRAC-Box, we’ve improved security and gained valuable sales and marketing insights, and assigning permissions is simple. We’re confident we have authorised access to our vehicles with tracking controls in place. Our vehicles are retail-ready using the Supra TRAC-Box.” Providing greater visibility Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles. Each TRAC-Box uses Bluetooth to communicate with Supra’s eKEY® mobile app on smartphones carried by Guaranty sales associates. They enter a PIN code into the app to unlock the keybox and acquire the keys from a built-in container. “Each time an authorised user opens a keybox, a record of the activity is stored in both the TRAC-Box and eKEY app, so managers and users can see the history of openings without having to return to the office,” said André Lalande, vice president – sales, Supra. “The app also transmits activity to the TRACcess Manager software to create an audit trail providing greater visibility to lock-up activities.” Removing access permissions TRACcess Manager also provides prompt visibility to the activity and frequency of RV showings, enabling management to see which RVs are most popular and reposition vehicles more efficiently. Notifications can also be set to alert management of keybox activity on specific inventory they want to monitor, for example, each time the 10 most expensive RVs are accessed. The TRAC-Box system also promotes accountability among associates and saves time looking for misplaced keys needed to show vehicles. When salespeople leave the company, managers can remove access permissions in easy, streamlined steps via any internet-connected computer or mobile device within a few minutes. Supra is featuring the TRAC-Box system in its virtual exhibit at the RV Dealers Virtual Convention & Expo, Nov. 9-20, 2020.
In the fast-growing legalised cannabis industry, extensive security measures are a necessity. VIVOTEK, the pioneering IP surveillance provider has collaborated with Existo, a collective of cannabis industry professionals, to establish an IP surveillance solution for a cannabis cultivation facility in Northern Michigan, the United States. The results not only exceeded the state of Michigan’s expectations to allow for licensing at the state level but are also user friendly and add a level of comfort concerning building security to the owners. Why VIVOTEK? The state of Michigan has placed stringed demands on-camera coverage and recording quality for this industry, so a camera system is essential for the licencing of this business. Challenges in the project were related to distances within the building, coverage in unique spaces and varying climates and light exposure within indoor grow rooms. Existo chose VIVOTEK and a total of 70 of its indoor and outdoor security solutions, network video recorders (NVR) and video management software (VMS) to monitor the cannabis cultivation facility. CC9381-HV Panoramic network camera In the grow room, which includes a long hallway with tight spaces and climate concerns, 7 VIVOTEK 180-degree panoramic network cameras, the CC9381-HV were installed to combat high contrast lighting environments and armed with WDR Pro function to ensure 24/7 surveillance coverage. SD9364-EHL Speed dome camera For exterior corners, 4 VIVOTEK SD9364-EHL speed dome cameras were utilised. The camera is adopted VIVOTEK's Smart IR II technology which is specifically designed to provide a superb low light image in the most challenging situations. FE9181-H Fisheye and FD9380-H Fixed dome cameras Due to its high-quality imagery at a cost-effective perspective, 14 FE9181-H fisheye cameras and 40 FD9380-H cameras were installed throughout the rest of the indoor and outdoor facility. ND9541 NVR and apps VIVOCloud and iViewer app provide users with an open, flexible, and intelligent NVR for video surveillance applications The facility is also utilising VIVOTEK’s 16-CH ND9541 Linux-based embedded standalone NVR to set up and manage advanced IP surveillance systems with ease. It also supports remote and mobile access, via VIVOCloud and iViewer app, for both iOS and Android handheld devices, providing users with an open, flexible and intelligent NVR for seamless use in small to medium-sized video surveillance applications. Marijuana Regulatory Agency (MRA) acclamation In the end, the outcome not only met but surpassed all expectations and goals. The system was complimented as the highest quality in terms of coverage and camera quality by the Marijuana Regulatory Agency (MRA) enforcement agent during the state licencing walkthrough. Surpass expectations “The flexibility we gain from the quality and variety that VIVOTEK offers pays off tenfold in our business because there is no standard building design for cannabis businesses,” said Chris Hernandez, Existo director of operations. “Unique buildings with unique layouts but with highly standardised expectations put forward by state licensing expectations can be a stumbling block for many cannabis businesses. Our ability to utilize VIVOTEK’s solutions allows us to create systems that exceed state expectations while still being used to achieve safety goals set internally by our customers.”
Fury Motors has served the St. Paul, Minnesota area for more than 50 years. Founded in 1963 as a family-owned and operated business, the dealership offers the community a diversified mix of vehicles and services including new and pre-owned vehicles, financing, auto repair and maintenance. Currently, the dealership employs 115 people locally and is a one-stop-shop for all things automotive and trusted by the community. Committed to offering quality new and used vehicles for every taste and need, Fury Motors maintains a large and complete inventory of new Chrysler, Dodge and Jeep vehicles. With more than $50M in inventory on a 10-acre lot, security has taken on a whole new level of importance since the dealership was founded. Challenges faced With the face of retail ever-evolving, challenges commonplace for auto dealerships have not only intensified but evolved, too. The safety and security of employees, customers and assets has taken on a whole new meaning-making visibility into daily operations not just important but critical to business success. Now more than ever businesses require flexibility, agility and adaptability in their business solutions. This is particularly evident when it comes to solving security challenges. Fury Motors is no exception. The dealership realised simply recording security events as they happened was no longer enough. It needed to take a proactive stance on protecting its assets. Security of assets and operations To provide perspective, Fury Motors’ video security system required constant monitoring to capture events that were time and cost-prohibitive even with a monitoring company. And, if they could afford to have someone watch the cameras 24x7, human observations are subject to error or oversight. Fury Motors relies on remote monitoring to protect its inventory and capture valuable insight As a result, most video footage was never viewed or put to practical use, so Fury Motors was missing valuable information that could improve the security of assets and its operations. With no guard on-site, Fury Motors relies on remote monitoring to protect its inventory as well as capture valuable insight into employee behaviour and customer service practices. When the dealership turned to Global Axiom and Ava, a unified security company, it was losing $7K+ a month to internal theft and operational inefficiency above and beyond losses and damage to inventory. Global Axiom Remote Monitoring powered by Ava Aware Fury Motors realised that it could and should get more value from its remote monitoring service including its intelligent video security system and footage. The dealership turned to Global Axiom for a monitoring service coupled with Ava Aware to provide the perfect solution to stay a step ahead of criminals and potential losses. And even more importantly, it gives Fury Motors the data intelligence to take business operations to a whole new level with greater efficiency and resource optimisation. Fury Motors needed a new approach to security. Specifically, a system to capture, analyse and present the big picture data. Everything from monitoring people and assets on the outdoor car lots to technicians doing oil changes in the service bay to the handling of incoming parts and inventory after hours. Video monitoring solution Combination of Global Axiom’s remote monitoring expertise and Ava Aware technology is unprecedented The dealership’s new intelligent video monitoring solution uses artificial intelligence (AI) and machine learning bringing a new level of agility and flexibility to monitoring services allowing Fury Motors’ security operators to quickly review footage from past incidents, increase situational awareness and respond time to evolving situations and capture trend data for developing strategies and making data-driven decisions to prevent future problems. The combination of Global Axiom’s remote monitoring expertise and powerful Ava Aware technology is unprecedented. Ava Aware allows Fury Motors to accelerate investigations by searching objects and events of interest with speed and precision. Critical when managing $50M+ in inventory. Four important Ava differentiators Proactive threat detection Ava’s intelligent algorithms and self-learning detect abnormal behaviour in specific Fury Motors scenarios and alerts operators in real-time. It intelligently highlights what’s truly relevant from all Fury Motors’ cameras, in real-time, all the time. Powerful search using machine learning Fury Motors is now able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities. The dealership is now able to comb through countless hours of video in seconds. Critical in pre-empting theft and invaluable in managing operational efficiency. Directional audio analytics Fury Motors’ dealership is expansive with $50M in inventory on-site. The dealership needed a solution like Ava Aware to provide 360-degree coverage with Ava’s innovative acoustic sensors. The cameras identify specific sound patterns to determine the type of sound and its direction, and sends instant alerts to the Ava Aware video management system, providing Fury Motors’ security operators with a complete overview of the surroundings. Enhanced business and operational insights Fury Motors security and operations teams now have more situational awareness and insights. The dealership can monitor and count people and vehicles, watch smart maps to understand hot spots or high traffic areas to manage occupancy and shift scheduling and ultimately, improve customer service. Improved operational efficiency Fury Motors is positioned to carry on for another 50+ years as a leader in the St. Paul, Minnesota market. Management team is able to review past events, respond to changes in real-time and enhance operational efficiency with real data With its new improved monitoring service powered by analytics, the dealership’s management team is able to both review relevant past events but more importantly, proactively respond to situational changes in any environment via real-time alerts to prevent situations from occurring. Similarly, management is able to improve operational efficiency with real data. Ava’s technology Ava’s mobile technology allows investigators to immediately search footage across multiple video cameras from the field to decrease the time-to-target and save hours of investigation and suspect-tracking. Again, creating significant operational efficiencies and increasing the likelihood to prevent and/or recover lost assets. Video analytics Video analytics has also allowed Fury Motors to create customised alerts allowing the dealership to take a proactive and preventative response to a variety of problems. This need gained significance in the wake of health and safety guidelines put in place for COVID-19 and since has allowed Fury Motors to improve customer service by being more in tune with employee response times to customers on the lot. Data analytics The ability to detect both patterns and anomalies using Ava’s powerful data analytics is empowering Fury Motors to enforce compliance and respond to important company mandates in the short term while improving operations and protecting employees and customers in the long-term. Win-Win partnership “The Ava Aware solution combined with the Global Axiom remote monitoring service has been a tremendous win. Not only have our losses been eliminated but more importantly the headaches around dealing with those losses are gone as well. Our goal is for our customers to feel safe on our lot no matter when they choose to shop. They should feel comfortable that if they drop their car off for service or trust us with it for repair we will keep it safe. The Ava / Global Axiom solution provides this level of service and allows us to stay focused on serving our customers,” Fury Motor’s Owner, Tom Leonard.


Round table discussion
An aging employee population and the influx of a new generation of workers and customers is driving change in the physical security industry. Millennials – those born in the 1980s and mid-1990s – are especially impacting how the industry operates, the technologies it produces, and the customers it serves. This tech-savvy generation grew up with the Internet at their fingertips. They embrace innovation in all its glory and expect it to play a seamless role in their lives – and work. We asked this week’s Expert Panel Roundtable: How are millennials changing how security systems are designed, installed and/or operated?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
Products


Videos
Mobile surveillance: Manufacturers & Suppliers

How to ramp up perimeter security with license plate reader technology
Download
Solve access control challenges in the healthcare sector
Download
Getting the most value from Software Subscription Agreements
Download
Shifting trends in operation centers and control rooms for 2021
Download