Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Geutebrück is well positioned for the industry 4.0. The family-owned company has expanded its portfolio within a short time, from being a pure CCTV supplier of products for distributors and installers to a provider of software-based all-round solutions for safety and process optimisation, including for end customers. Part of this were not only comprehensive technical developments or a significantly higher range of services, but also organisational reorganisation, such as the Business and De...
As part of Security Officer Appreciation Week, Corps Security is hosting an inaugural ‘Thank Your Security Officer Day’ on Thursday 19th September to thank their dedicated security guards. Working in partnership with a range of clients, the management team at Corps Security will thank their security officers in person as well as sharing stories across several social media platforms to acknowledge those who go above and beyond delivering an unprecedented level of service. Security Off...
Dahua Technology, a video-centric smart IoT solution provider, announces the addition of the new StereoVision camera: a 3MP dual-sensor, people-counting camera that incorporates Artificial Intelligence (AI). The camera uses advanced image processing technology for improved depth perception to count people with up to 98% accuracy. The close, side-by-side positioning of the StereoVision camera’s dual lenses allows each sensor to capture images of the same area from slightly different angles...
Audio over IP pioneer Barix is highly regarded for the reliability, flexibility and cost-effectiveness of its IP-based paging and intercom solutions. Building on this rich history, the company announced Paging Cloud, an innovative software-as-a-service (SaaS) solution that brings paging into the smartphone-enabled mobile era. Integrating easily with almost all existing paging and public address systems, Paging Cloud records paging messages and sends them directly to registered smartphones, enab...
Geutebrück, international specialists for video systems in the security and process optimisation sectors in Germany, will be represented with offices in India and Malaysia from May onwards. From these locations, customers from the logistics, industry and government sectors will be supported more closely. Geutebrück Southeast Asia is focussed on the regions bordering Malaysia, Singapore, Indonesia, Thailand, Vietnam and Hong Kong. The office premises in the Malaysian capital Kuala Lump...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR for Security Heads of security at hospitals, stadiums, corporate campuses, airports, and other enterprises must maintain high awareness over large areas via a growing number of security cameras. To know whether a familiar person, employee, VIP, perceived threat, concern, or stranger is onsite, security professionals must rely on their ability to focus on key details and then make accurate assessments. SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility" “It’s been a challenge to maintain awareness of who is present at Shelby American, whether those are specific individuals of concern or aggregate demographics of museum visitors,” said Richard Sparkman, Director of Technology, Fleet & Facilities at Shelby American car museum in Las Vegas. “SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility and helps us understand who is moving through our museum by age, gender, and time of day – allowing us to better tailor our museum experience." 24/7 video monitoring Available as a standalone solution or integrated with market-leading video management systems, SAFR for Security provides vigilant 24/7 monitoring to detect and match millions of faces in real time, delivering a 99.86 percent accuracy rate. In the April 2019 National Institute of Standards and Technology (NIST) test results, the SAFR algorithm tested as both the fastest and most compact amongst algorithms for wild images with less than 0.025 FNMR. When SAFR for Security is paired with a VMS, the integrated experience includes video overlays within the VMS to identify strangers, threats, concerns, unrecognised persons, VIPs, employees, or other tagged individuals in live video. Security teams can customise real-time alerts to automatically notify them when persons of interest appear on a video camera feed or make use of automated bookmarking to conduct forensic analysis. SAFR for Security attaches rich metadata to video footage so security professionals can search by time range, location, category, person type, and registered individual instead of sifting through hours of video to find a specific person. All data passed through SAFR is protected with AES 256 encryption in transit and at rest “Security professionals are inundated with hours of raw footage, much of which must be evaluated in real time by a limited number of human eyes,” said Dan Grimm, Vice President and General Manager of Computer Vision at RealNetworks. “SAFR for Security helps these professionals maintain higher awareness by combining our highly accurate AI-based facial recognition service with the software they currently use.” Facial recognition systems The underlying SAFR platform has been optimised to detect and recognise faces in live video based on its industry-leading excellence in accuracy and performance. The SAFR platform can be deployed on a single PC to monitor a handful of IP cameras or scaled to thousands of cameras in a distributed architecture hosted on-premises, in the cloud, or hybrid. All data passed through SAFR is protected with AES 256 encryption in transit and at rest. The platform also provides actionable data for live analytics of traffic volumes, demographic composition, dwell times, and data exports for further reporting. “We’re delighted to partner with RealNetworks to extend our intelligent IP video system with SAFR for Security’s highly accurate facial recognition,” said Thomas Lausten, CEO, MOBOTIX AG. “The combination of SAFR and our innovative camera technologies opens up a new set of applications and use cases for MOBOTIX customers around the world, especially in retail, healthcare and education.”
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel has been established as the industry leader in integrated intelligent communications. Our companies have had a long-standing relationship where integration was valued, but we believe it is now time to go beyond simple integration to providing a full-service solution.” According to Barnard, RS2 Technologies has a reputation as a “one-stop” solution for the access management needs of customers in a wide variety of applications. RS2 delivers cost-effective access management solutions to customers in industries as diverse as ship-building, energy, hospitals, education, defense, banking, government (federal, state and municipal), museums, and a variety of diverse manufacturing companies. From small office buildings to large industrial facilities, RS2 has the products to meet the needs of business and industry. RS2 is known for having a rich feature set, continuous integrations, and the lowest total cost of ownership Intelligent Communication “The Intelligent Communication market is targeted to exceed $150 billion by 2021”, said Jim Hoffpauir, President, Zenitel Americas. “To continue to provide innovative solutions that exceed our customers’ expectations, we are creating new strategic partnerships with complimentary technology leaders in the security industry. With our recent release of the new IC-Edge system, partnering with RS2 provides Zenitel with sales channel alignment to emphasise smaller system sales, providing organisations of all sizes an easily accessible and cost-effective solution for highly intelligible audio.”
Dahua Technology, a video-centric smart IoT solution and service provider, launches its AI NVR4000-I Series, including DHI-NVR4208-8P-I, DHI-NVR4216-16P-I, DHI-NVR4216-I, DHI-NVR4416-16P-I, DHI-NVR4432-I and DHI-NVR4832-I. Distinguished from mainstream NVR products with single AI function in the market, the Dahua AI NVR Series integrates perimeter protection and face recognition, providing customers cost-effective AI transformation and upgrading with high-precision safety guarantee while saving labour cost. With the outstanding perimeter protection function, the Dahua NVR4000-I Series can significantly reduce false alarm and bring higher accuracy performance to end-users. Face recognition technology The NVR4000-I series is capable of analysing targets based on deep learning algorithm to differentiate people and vehicles The ability of the new NVRs to filter out false alarms caused by animals, rustling leaves, bright lights, etc. enables secondary recognition of the targets, thus improving alarm accuracy. Besides, the NVR4000-I series is capable of analysing targets based on deep learning algorithm to differentiate people and vehicles, therefore making retrieval more efficient. The AI-powered face recognition technology behind these products enjoys a high reputation in the industry, winning several first prizes in international competitions. Being acknowledged on performance for both efficiency and accuracy, Dahua Face Recognition offers real-time facial analysis by identifying, capturing and recording faces with powerful metadata. Combined with configurable multiple face database, common and stranger mode could alarm for suspects on blacklist, allowing passing for authorised people on whitelist, also alert for approaching of strangers. Significantly enhances accuracy Powerful metadata is well-constituted with feature attribute information extracted from target faces, such as gender, age, glasses, masks, beard and expressions, making it possible for users to select the appropriate channel, feature and similarity to search for eligible targets. Otherwise, users can also upload the face pictures of targets to NVR and compare them with the face database in NVR, so as to retrieve the relevant video captured by camera and find out the targets. Quick and handy search for a person of interest can be achieved through multi-channels and which significantly enhances accuracy and efficiency. The NVR4000-I Series also supports ePoE & EoC to meet various needs of customers In addition to the above features, the NVR4000-I Series combined with Dahua cameras will bloom more powerful functions. For instance, working with Dahua ITC camera enables ANPR (Automatic Number Plate Recognition) for convenient entrance/exit management. IP video surveillance applications Besides, people counting and heat-map are also available when matching Dahua IP camera. Furthermore, the NVR4000-I Series also supports ePoE & EoC to meet various needs of customers. Incorporating superior perimeter protection, advanced face recognition and reliable AI search, the Dahua NVR4000-I Series delivers excellent performance and high recording quality for IP video surveillance applications such as companies, retail stores, borders, villas, museums, dangerous areas and other small- and medium-sized scenes. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua will continue to focus on ‘Innovation, Quality, and Service’, to serve partners and customers around the world.
With access control for the simplest to the most complex application, ASSA ABLOY has a security solution to make any building smarter. Our wireless, battery-powered devices include Intersec’s Access Control Product of the Year, one of many created to secure buildings sustainably in the connected cities of the future. The ASSA ABLOY stand for Intersec 2019 (Sheik Saeed Hall 1, Stand A12) showcases the following commercial access control technologies and devices. Aperio H100: access control in a slimline handle The new H100’s stylish and robust design has proven a perfect fit for high-traffic office and facility doors"Intersec’s latest Access Control Product of the Year, the new Aperio H100 packs the power and flexibility of wireless access control into a simple door handle. With easy retrofitting to almost any interior door, broad RFID compatibility via an inbuilt credential reader, and simple integration with third-party systems, the H100 handle makes it cost-effective to extend access control to many more internal doors. A standard battery fits inside the H100, ensuring a minimal footprint. “The new H100’s stylish and robust design has proven a perfect fit for high-traffic office and facility doors,” says Murtaza Husaini, ASSA ABLOY Business Development & Marketing Director for the Middle East & Turkey. “The handle simply adds powerful access control functionality without wires.” Like all Aperio wireless door devices, the H100 is built to open standards for easy integration — including online, in real time — with access control systems around smart buildings. CLIQ: programmable keys for flexible, sustainable locking For small to medium-sized businesses, CLIQ Go enables managers to run an access system on the move via their smartphoneMechatronic locking system CLIQ combines high-end mechanical and electronic protection. A range of key-operated mechanical cylinders and weatherproof padlocks offer maximum attack resistance. CLIQ technology then layers encrypted, user-friendly electronic security on top, with the option to administer the system from a secure web interface or smartphone app. All CLIQ devices are wire-free: Power is supplied by a standard battery inside the programmable key. For small to medium-sized businesses, CLIQ Go enables managers to run an access system on the move via their smartphone. For managing remote sites or a mobile workforce (or both), CLIQ Remote with the CLIQ Connect app smooths mobile workflows. A key-holder no longer needs to update access rights in person, carry updating devices, or return to base. All they need is a smartphone and the app. With its unique combination of security and flexibility, CLIQ is deployed widely at sites with stringent safety requirements and ever-changing access needs, including critical infrastructure, emergency services, museums, banks and cash-in-transit businesses. Code Handle: secure handle with built-in PINpad Code Handle keeps sensitive files, private rooms, personal belongings or valuable stock separated and secureIt is impossible to keep watch over every private door in a public space: the storeroom in a shop or pharmacy, or a toilet for staff only. That's when you need Code Handle, a simple, secure handle with a built-in PINpad. Enter a 4-digit code and the door opens. Code Handle locks automatically when the door closes. Code Handle is easy to retrofit to the existing locking unit of almost any interior door: just change the handle for a battery-powered Code Handle. No need to cable the door or use mains power, and no need to install an electronic access control system. Code Handle keeps sensitive files, private rooms, personal belongings or valuable stock separated and secure. It keeps you hands-on, and everyone else’s hands off.
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit is employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 cameras will now be made available with Mentalix Fed Submit live scan stations, operating alongside standard fingerprint scanners so iris information may be shared with the FBI as part of its NGI (Next Generation Identification) program. With Fed Submit it’s possible for agencies to access the FBI’s iris database, as well as create and grow their own local iris archive. Accurately capture iris data Dale Remmers, the chief technology officer of Mentalix, said the Iris ID technology was selected for its speed and accuracy in capturing iris data. He reported that jail officials can often acquire, submit and receive an FBI response to an iris query before a suspect’s booking procedure is completed. “They can know within a few minutes if the suspect arrested for public intoxication has any felony warrants in other states,” Remmers said. “We’re excited to be able to offer our law enforcement customers the Iris ID technology as an additional modality within our Fed Submit product.” The iris solution is contactless, unlike fingerprint pads which need to be wiped clean after each use R100 iris recognition technology The R100 iris recognition technology can obtain a valid identity scan from virtually any suspect. While fingerprints can be altered intentionally or worn down by jobs in industries such as agriculture, construction and manufacturing, iris patterns remain unchanged through a person’s life. The iris solution is also contactless, unlike fingerprint pads which need to be wiped clean after each use. Remmers said law enforcement clients may also use the iris scan feature of the Mentalix Fed Submit system to authenticate the identity of suspects being released from jail. Iris ID authentication Mohammed Murad, vice president global sales and business development, Iris ID, said the Mentalix partnership is another example of how Iris ID’s technology is being used to assist law enforcement officials. “Our iCAM R100 cameras add a valuable dimension to the Fed Submit kiosks” he said. “The Mentalix solution will make it easier – and faster – for local officials to know who is being booked and released from their facilities.” Iris ID technology is also being used by governments around the world for authentication at border crossings, national ID and voter registration efforts and by corporations large and small for access control and time and attendance applications.
The rapid adoption of employee scheduling and workforce management software SmartTask gathered pace last year with record levels of growth in the UK and internationally. In particular, there was an 81% increase in the number of field service businesses using the system during 2017, which now includes over 100 manned security providers and 15% of the ACS Pacesetters. “Over the past few years we have worked hard to understand the needs of the manned security industry to develop a solution that possesses the right mix of employee scheduling and workforce management functionality,” explains Paul Ridden, CEO of SmartTask. “This has enabled us to achieve impressive growth last year both domestically and worldwide, with our software now being used in 15 countries and successful trials underway in mainland Europe, the Middle East, Africa and Australasia.” Intelligent rostering functionality The number of locations that are now coordinated using SmartTask grew by 160% in 2017 to over 16,000, across a 17,000-strong employed and subcontracted workforce. In fact, the variety of managed sites expanded significantly to include: Football stadiums, national museums, retail developments, industrial estates, science parks, schools, universities, factories, airports, banks, hospitals and even a F1 racing team.The intelligent rostering functionality is being used to schedule almost one million hours of work per month SmartTask continued to help manned security providers to gain visibility and control over customer sites with more than 250,000 patrols monitored, over 5.5 million NFC checkpoints scanned, and 50,000 electronic Smartforms processed during 2017. Meanwhile, the intelligent rostering functionality is being used to schedule almost one million hours of work per month, as well as calculating £40 million of employee pay and £50 million of customer billing over the past year. Towards cloud-based solutions A number of new innovations were introduced in 2017 in response to changing needs within the security marketplace. Using its established expertise within the sector and taking advantage of the latest technological developments, SmartTask introduced a new vetting capability to simplify appropriate employee screening and background checks. A comprehensive trial of Smartbeacons was also undertaken as part of a project to extend patrol monitoring and proof of presence options. “2017 saw the number of businesses depending on SmartTask expand by more than 80%. This record growth is down to our ability to develop a highly adaptable, scalable and affordable cloud-based solution that achieves proven business and operational benefits for manned security providers. We are looking forward to building on this success and expect to continue this growth trend through 2018 and beyond.”
Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot get into the building they will have a harder time causing trouble for those within it. With quantum leaps happening in security technology, architectural revolving doors may not always be top-of-mind when designing a new security system from scratch. However, with recent technological advances in the last decade, and considering that they occupy less floor space and are extremely good at reducing unwanted air infiltration into an interior, it is definitely time to examine how they can participate in a complete physical security plan as well. A well-known financial company in the Midwest of America was the target of a protest, against their financing of a controversial initiative Restricted access for business continuity The exterior door to a building or premises, often a public entrance during business hours, is typically the first line of defence against unwanted persons or activity making its way into an organisation. If lobby or security staff sense trouble outside (distress, fights, weapons, protests, etc.), they need a quick and effective way to block anyone from entering the building and creating danger for those inside. Should this type of incident make its way into a building, it creates a number of risks, including the expenditure of unnecessary resources, loss of productivity, violence, and liability for the business. For example, recently a well-known financial company in the Midwest was the target of a protest against their financing of a controversial initiative. A large crowd gathered outside on the street, pushed inside the building, and took over the interior lobby. The protesters not only disrupted the retail banking business at the lobby level, but also attempted to block employees from going to work on the upper floors. The protest lasted hours, making it difficult to do business, and was stressful for employees. In addition, the news cycle around the protest created an image problem for upper management and the overall brand. Revolving doors for access control Thanks to technology employing electricity, today’s manual revolving doors can potentially save lives Beyond the immediate risks of theft and violence, crime has numerous intangible effects on employees, residents or students that can have a more profound and lasting impact. These include physical pain and suffering, along with a feeling of anxiety, stress, and uncertainty around future security. According to a survey conducted by Workplace Options in 2015, 53% of American workers have experienced a traumatic event while at work—with workplace violence or criminal activity listed as one of the top four events that cause trauma. Revolving doors can be a reliable solution for providing this necessary security. They are often deployed in buildings where public use is needed during the day, but controlled access is required in the evening—for example, banks, museums, commercial buildings, condominiums, libraries, dorms, recreational centres, and more. Thanks to technology employing electricity, today’s manual revolving doors are more capable than ever before and can potentially save lives or buy the time necessary to alert security staff or notify law enforcement to deal with a dangerous situation in time to prevent harm, stress, or liability. Secure access can be made possible via an access control device mounted on the outside of the door Enhanced security with electronic lock control The following security features are now available for manual revolving doors being deployed in buildings right now: Emergency security lockdown: Facility or reception staff can electronically lock the door in place, regardless of position, at the push of a remotely located button. In the event of an immediate security threat outside the entrance (weapons, protests, drunk and disorderly conduct, etc.), access to a lobby or entrance can be instantly denied, and those within protected. Remote locking: In an earlier time, the manual pushing of a pin was required to lock a revolving door’s wing into the ceiling or the floor. Today, you can lock a manual revolving door by using a remote pushbutton, or, an access control system can lock the door automatically at a specific time of day. If anyone is still in transit during the lock command, the door will allow them to exit before locking. Once the door is locked, staff can easily unlock it with the same remote mechanism if there is an authorised visitor. Access control integration: Integration with access control systems gives manual revolving doors even more capabilities. Secure access can be made possible via an access control device such as a keycard reader, mounted on the outside of the door. Upon valid authorisation, the door will unlock and the user can push to enter the facility. Once all compartments are clear, the door finishes rotating by positioning its door wings at the end posts of the throat opening and relocks. If tailgating is a concern, your revolving doors should be the first of several layers of physical security Efficient incident management Consider the usage of these features for a building such as a downtown high-rise condominium. During the day or night, residents can enter by showing credentials outside the door to the access control system. Any deliveries would have to stand outside, ring the doorbell and wait for reception to unlock the door and let them in. If anything threatening occurs during rotation, reception staff can immediately lock the doors to keep trouble out and call for help. At a high-rise office building, it can work differently. The door can be unlocked during the day for public entry with guards keeping a watchful eye outside, ready to lock the doors instantly if trouble happens outside. The access control system can lock the doors at 5pm until 7am the next morning, requiring employees or cleaning crew to present their credentials to enter. Access control integration It should be noted that standard revolving doors are not equipped to detect or prevent tailgating (an unauthorised person following an authorised person through an entrance). They should not be confused with a security revolving door, which is intended for individuals trained to use these doors at employee-only entrances. With this in mind, consider that with access control integration, a standard revolving door will unlock when presented with an authorised credential, but will continue to rotate as long as anyone is inside the door to prevent entrapment. Tailgating is still a possibility with these entrances, so if this is a concern, your revolving doors should be the first of several layers of physical security including, potentially, additional turnstiles, guard staff, surveillance cameras, additional locking mechanisms for restricted areas, and so on. Ensuring compliance with code requirements To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement Finally, modern code requirements for revolving doors are defined by a number of different agencies—ANSI, IBC, and NFPA. All require that a revolving door’s wings be able to collapse or ‘book fold’ to create a path of escape during a fire, and that a swinging or sliding door must be present within 10 feet of any revolving door, on the same building plane. To make sure this additional door isn’t a security weak point, the extra sliding or swinging door can be ‘exit only’, or locked to those trying to enter from outside the building, but unlocked to those trying to exit from inside the building. To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement solution that helps prevent unwanted entry by those looking to do harm and create unwanted liability. Considering revolving doors can be a first step into securing the entrances and exits of your building, and protecting everyone and everything within.
The physical security market continues to experience growth as users look to capitalise on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase in cybersecurity threats and breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organisations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand for safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalise on opportunities for growth in the coming year.
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA case study But does that mean that organisations need to hold off on implementing biometric solutions? Or do they need to ‘force’ it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organisation to reap the benefits. In 1953, New York Metro Transit Authority (MTA), one of the world’s largest mass transit systems, began using tokens as payment for subway rides – a solution to engineers’ problem of creating a machine that could accept different types of coins for the new 15-cent fare. This technological advancement that may seems almost archaic today, served the MTA well for 40 years before the introduction of the MetroCard - a lighter, more automated solution. Technology adaption works Yet, the MTA, despite positive results from its first implementation in 1993, had both the older tokens and the new MetroCards in place, simultaneously for a full decade until 2003. This allowed “early adopters”, who understood the advantages of the MetroCard, to switch over, while allowing those that preferred their ‘trusty’ tokens to continue using them. In 2003, when tokens were finally phased out for a MetroCard-only system, only a small percentage of commuters were still using tokens; most had realised the significant benefits to the card and had switched over of their own volition. The MTA example serves as a model for how technology adoption works. From tokens to MetroCards, fax to email, landlines to cellphones –there is a distinct process new technologies go through as they are introduced and ultimately adopted by the public. Biometric technologies are no different. Yet, organisations must find way to implement new biometric systems that simultaneously provide organisations with the significant advantages biometrics offer, while ensuring that users are given time to adapt to and adopt the new technology. Let’s look at a few practical strategies for biometric adoption: 1. Optional, with added value Many facilities, such as airports, stadiums and theme parks, already use biometric technology to create ‘express lanes’ to save time and improve efficiency. Frequent fliers, VIPs and season ticketholders can enjoy faster and more personalised service with biometric identification solutions. These users can still opt to be identified the old-fashioned way, with an ID card or ticket, but doing so means they will have to line up and wait their turn as the old methods are much less efficient than biometrics technologies. Airports, stadiums and theme parks already use biometric technology to create ‘express lanes’ to save time and improve efficiency Biometrics can also be used to improve the customer experiences, or create more tailored, personalised programs. For example, the ICER (Industry, Culture, Education and Recreation) Innovation Center in the Netherlands implemented biometric visual identification technology to create customised experiences for museum visitors that were fun and interactive. Visitors could choose not to take part in the biometrics-enhanced visit and experience the baseline version of the museum, but by utilising the biometric system, museum goers are offered a tailored experience where exhibits and information are presented based on what a visitor has already seen in the museum. 2. Start with biometrics in optional locations Not all services or locations in a corporate setting are mandatory for employees to visit. For example, employee centers or health and wellness facilities are social settings for individuals to relax and connect. Implementing biometrics-based identification solutions in these types of settings allow employees to interact with the new technology in a low-stress environment and only if they choose to. For example, companies can provide an option for employees to pay for meals at corporate cafeterias using biometric identification, saving break time for those who choose to adopt the technology and enabling them to skip longer payment lines. This has the added benefit of reducing fraud resulting from lost or stolen ID cards. 3. Educate users in advance To ensure smooth deployment and adoption of biometric technology – whether partial or full – it is important to ensure that new users are educated on the new technology in advance of its deployment. For example, employees may have privacy or data security concerns. It’s critical that organisations clarify that the data being collected is kept private and secure. This information can be imparted in several ways. Organisations should be as transparent as possible and provide employees with enough information to address concerns. A Town Hall meeting can be held to explain benefits of the technology and answer questions that new users might have. Providing educational materials to new users, such as letters or videos that explain the new technology can put employees at ease. Make sure to outline how data privacy will be ensured as well as the benefits that employees stand to gain. Have management lead by example and be the first to enroll in the biometrics system. This can help inspire confidence and trust in the system. Make implementation competitive and fun. This can help users who aren’t as excited about the technology take part and learn about it. Implementation of biometric technology can still allow individuals in an organisation a choice of whether or not to partake. Over time, most people tend to adopt new technology by choice if it saves time and makes life easier. When considering biometric systems, keep in mind that it doesn’t necessarily require full adoption now and can coexist with other systems until users feel comfortable with the system, and recognise the benefits it provides.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
Rasilient Systems, Inc., the pioneer in forensic-grade video surveillance systems, has completed Phase II of the video surveillance system upgrade at Fairbanks International Airport (FIA) in Alaska. Phase II at FIA continued the installation of modern video surveillance for the airport to meet the stringent demands needed to provide safety and security for the thousands of passengers FIA serves daily. FIA is a state-owned, public-use airport that averages more than 328 aircraft operations each day. The Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel camerasThe Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel cameras; recording transmission and storage of forensic-based, high-quality video signals; comprehensive live viewing and playback; utilisation of purpose-built/designed digital IP networks; and intelligent processing of archived video, said Rasilient Director of Strategic Sales Engineering Dr. Edward Wassall. Increased support for surveillance cameras “These are key components that have the major video surveillance system requirements of scalability, video quality and reliability that FIA sought to implement when they chose to upgrade their security system,” said Dr. Wassall. “This current upgrade increased the number of supported video surveillance cameras as well as the efficiency associated with the management related to storage.” Phase I, completed in the summer of 2018, included the initial deployment of Rasilient’s forensic-grade series video surveillance servers and storage. Rasilient’s purpose-built server and storage products provide a video surveillance system infrastructure designed to deliver reliable and continuous video surveillance with exclusive No Frame Drop (NFD) technology that eliminates recording gaps. Enhancing visibility and storage capabilities The Rasilient system has allowed FIA to meet the needs of today as well as to provide scalability for our future needs"FIA Building and Security Representative Dana Bowen said their primary decision to upgrade the multi-camera airside and landside video surveillance system was to enhance visibility and storage capabilities. The Rasilient system has allowed FIA to meet the needs of today as well as to “provide scalability for our future needs,” said Bowen. “We are really very happy with the new airport forensic enabled storage system,” said Bowen. Small, medium to large enterprise deployments are supported by Rasilient products and technologies, and they have been deployed worldwide to protect museums, government institutions, airports, seaports, military contractors, financial institutions, educational establishments, stadiums, and residential complexes.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
The Canadian Warplane Heritage Museum was founded in 1972 and is the largest in Canada to house priceless and restored World War I and II warplanes, including bomber planes used by the Canadian military in Iraq and Afghanistan. The non-profit organisation is mandated to acquire, document, preserve and maintain a complete collection of aircrafts that were flown by Canadians and the Canadian military from the beginning of World War II to the present. Their role is to preserve the artifacts, books, periodicals and manuals relating to this mandate. Today, the Museum houses almost 50 aircrafts, an extensive aviation gift shop and exhibit gallery as well as host private events and offer group tours. The museum’s responsibility of staying open daily, year-round also requires a full-time staff making security a crucial priority. The primary objective is to secure indoor and outdoor premises, including visitor’s parking lot next to Hamilton International Airport. The main purpose is to deter all potential crime, vandalism and theft of property, and mainly to secure priceless World War I and II airplanes. VIVOTEK cameras with IR capabilities Deploying VIVOTEK cameras at the Warplane Heritage Museum was an ambitious task due to the structure of the site being an airplane hangar housing over 50 Warplane Heritage airplanes. The outside perimeters of the museum contain extremely dark zones and parking lots, requiring equipment with very strong IR capabilities to provide sufficient monitoring. Securing the indoor and outdoor premises, including a 400-vehicle parking lot adjacent to Hamilton International Airport took careful planning and a specific camera surveillance system to cover the extensive property. A new and upgraded security system would also deter potential vandalism and theft of property and vehicles, especially securing the priceless airplanes. VIVOTEK’s IB836B-HT Bullet Network camera was installed throughout the premises Earlier this year, the Ontario Government through the Ministry of Citizenship, Culture and Recreation, launched a project designed to update and improve the Museum’s existing video surveillance system. The process culminated in the selection of VIVOTEK’s valued partner, A.S. Security & Surveillance, Inc., a systems integration company headquartered in Southern Ontario that specializes in various residential, commercial, industrial and corporate security surveillance system installations. New VIVOTEK surveillance system The new video surveillance system features sixteen VIVOTEK Network cameras including a 32-channel Network Video Recorder, ND9541. VIVOTEK’s IB836B-HT Bullet Network camera was installed throughout the premises with its 2-Megapixel full HD sensor enabling smooth viewing resolution, capable of capturing high quality and high-resolution video with WDR and SNV technology, regardless of high contrast or low light environments. IB836B-HT is equipped with built-in IR illuminators up to 30 metres for superior image quality 24 hours a day and can withstand inclement weather and the IP66 and IK10-rated housing protects the unit against acts of vandalism, making these units a great selection for installation throughout the Canadian Heritage Warplane Museum. VIVOTEK’s PoE switch – IP surveillance Apart from the VIVOTEK cameras being used in the installation process, the ND9541, H.26 network video recorder equipped for up to 32-Channel network cameras with 4 hard drives offered ample storage space and AW-GEV-264-370, VivoCam Layer 2+ Managed PoE Switch provided extra power for all cameras used. VIVOTEK’s PoE switch enables IP surveillance management functions by not only being a standard Layer 2+ PoE switch, but also enabling set up and configuration of VIVOTEK IP cameras, NVR and CMS. Due to the building structure, AP-FXC-0210 was needed to extend the range for two cameras located indoors. The indoor PoE extender allows a daisy-chain installation with up to a 300M installation.
Whoever honours the homeland Switzerland visits this museum: The Landesmuseum Zurich. A huge medieval castle, it lies in the turbulent heart of the city. The values and history of the country that are preserved by the museum deserve the utmost protection. This is ensured by the security personnel at the front desk. The renovation of the museum (from 2013 to 2016) included a new security loggia. The goal was to ease the control and monitoring of all security systems and building technology from two desk positions, each with four / ten monitors, using a single multifunctional keyboard per desk. The solution integrated some seven different functions: Access control, management systems, video surveillance with 130 cameras, a legacy workplace from the old security counter, some pre-existing WEYTEC components and two IT system rooms. The goal was to enable the security staff to provide enhanced security in a more effective and intuitive manner. A turnkey solution and a migration plan without interruption to ongoing operations were further requirements. WEY Distribution Platform bundles and distributes KVM signals A WEY Distribution Platform bundles and distributes KVM signals between the equipment in the system rooms and the security desk. The staff, located at the security desk, controls and steers all the networked sources and monitoring functions using WEYTEC SMARTtouch keyboards. Video images and other information can be switched to and displayed on the monitors with the touch of a button. The security staff has a 24/7 view of the entire museum in real time. They also manage access control, alarms and much more. Non-disruptive migration to new systemWEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia One of the biggest challenges was to ensure a non-disruptive migration to the new system. The Landesmuseum remained open and was monitored continuously during the renovation and installation work. After weeks of preparation and meticulous coordination between installation technicians, the change over was completed within one day. The old security counter remained fully functional at first. Meanwhile, the two security desks in the new loggia were configured, linked to existing and new systems and finally put into operation. WEYTEC solutions do not require any software or driver installations. They use KVM signal transmission that connects computer interfaces to KVM switches and works independently of hardware platforms and operating systems. The concept is compatible with almost any established IT infrastructure and can be implemented during ongoing operations. Thus, WEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia. Security operator responsibilities Security operators at the Landesmuseum are responsible for a multitude of tasks. Among other things, they track images from 130 video cameras that monitor 6,100 sqm of exhibition space. They oversee movement and intrusion sensors, fire detectors and elevators. They control lighting, window shades and air-conditioning systems. All alarms must be processed immediately. The operators are also responsible for access control. They issue badges when someone needs to enter secure rooms. They keep track of the opening and closing of doors. The WEYTEC SMARTtouch keyboards facilitate multitasking. They store central functions, workflows and alarm processes that are immediately available per click. Screen layouts can be arranged and re-arranged efficiently. The security personnel always have the overview of surveillance cameras, management systems and all other sources, data and applications. Remote system rooms eliminate computers under desks Remote system rooms eliminate computers under desks. WEYTEC recommends this solution for every control room, including the security desk in the Landesmusuem. System rooms provide a protected, air-conditioned and easy-to-maintain environment as well as room for growth. With the WEY Distribution Platform, remote computers are operated latency-free over long distances, while a single keyboard operates any number of machines. The KVM signals are transmitted via Ethernet. The Landesmuseum maintains two system rooms. One hosts security systems and video system clients, the other facilities management, access control and office IT systems. WEYTEC seamlessly integrates new and existing equipment in both rooms into the solution infrastructure. The systems are connected to the KVM switch matrix via IP Remote transmitters located in one of the system rooms. From there, the signals are routed via IP Remote receivers to the desks and screens. Landesmseum Zürich, Château de Prangins, Swiss History Schwyz united under Swiss National Museum Three museums, the Landesmseum Zürich, the Château de Prangins and the Forum of Swiss History Schwyz are united under the Swiss National Museum umbrella organisation. The museums present Swiss history from its beginnings to the present day, and explore Swiss identity and the diversity of the country's history and culture.Using a single keyboard to operate all seven of our systems simplifies our work enormously" The Landesmuseum is located in the heart of Zurich. The museum management describes the building as an "ensemble of a fine old historical building and a new sculptural wing". The edifice was first built in 1898 by the architect Gustav Gull, a pupil of Gottfried Semper. Gull drew upon a variety of historical architectural elements from the late Middle Ages to modern times and brought them together to form a whole.Everything runs more efficiently, faster and we have a better overview" Due to a shortage of space, the Landesmuseum was expanded for the first time from 2013 to 2016. The new wing, designed by the Swiss architects Christ & Gantenbein and opened in 2016, complements Gustav Gull's building. It houses flexible exhibition halls, a modern library and an auditorium for public events. Equipped by WEY Technology, the museum's new security loggia is located at the juncture between the old and new buildings. Operating seven security systems “Using a single keyboard to operate all seven of our systems simplifies our work enormously. Everything runs more efficiently, faster and we have a better overview. We are very satisfied", said Heinz Baumann, Head of the Security Loggia Landesmuseum Zürich. Mr. Baumann also confirms: A decisive advantage of the WEYTEC solution was its trouble-free implementation with the existing security systems. The head of the security desk at the Landesmuseum Zurich recommends that other museums use WEY Technology control room solutions.
The Musical Instrument Museum (MIM) in Phoenix, Arizona, hosts more than 300,000 guests each year to view its collection of more than 13,000 instruments and associated objects, and to attend live performances in the MIM Music Theater. As the world’s only global musical instrument museum, MIM creates an exciting experience for guests, immersing them in cultural traditions from around the world. With a mission to collect, preserve, and make accessible an astonishing variety of musical instruments and performance videos from every country in the world, MIM offers guests a welcoming and fun experience throughout the day with multiple live evening performances each week. The safety and security of visitors and staff and the protection of the museum’s extensive collection is an essential aspect of fulfilling its mission. The safety and security of visitors and staff is an essential aspect of fulfilling the museum's mission To enhance the security of its exterior spaces, the museum recently worked with IES Communications, a nationwide provider of integrated security solutions, to upgrade its outdoor surveillance system. Now, a combination of Bosch AUTODOME IP starlight 7000 HD, FLEXIDOME IP starlight 6000 VR, and AUTODOME IP 5000 IR cameras provide high-quality images of the museum’s outdoor areas, which include an impressive courtyard at the main entrance, an additional courtyard at the student entry, an outdoor café and seating area for guests, as well as special events, and two parking lots. Full-colour night images Bosch cameras with starlight technology provide clear images regardless of lighting conditions, delivering full-colour images in the dark beyond the point where other cameras turn to monochrome images. Supported by new exterior LED lights, the Bosch starlight cameras at the museum produce full-colour images throughout the night. The intelligent cameras also feature built-in video analytics to alert the museum’s security operators to possible risks, such as detecting objects left behind or the gathering of large crowds that may create congestion in an area. With Intelligent Tracking, AUTODOME IP starlight 7000 HD cameras can also automatically track objects of interest as they move throughout a scene. “The low light performance of the Bosch starlight cameras is completely unmatched. They are producing beautiful colour images all through the night,” said David Burger, security manager at the Musical Instrument Museum. The cameras also feature built-in video analytics to alert the museum’s security operators to possible risks, such as detecting objects left behind In addition, Bosch AUTODOME IP 5000 IR cameras are strategically placed in perimeter and other areas of the museum exterior where there is limited lighting at night. These pan-tilt-zoom cameras feature a built-in intelligent IR beam that ensures optimum illumination of objects regardless of the level of zoom. “The quality of the images, the onboard video analytics that are included without an additional cost, and the reliability of the moving cameras were key factors in our decision,” continued Burger. “Our security operators are thrilled with the quality and operation of the cameras.” Long distance data delivery One challenge with the installation was how to deliver data from the security cameras over long distances, between remote locations and the head-end network switches and servers. After receiving recommendations from IES Communications and Bosch, the museum selected Altronix’s PaceTM Long-Range Ethernet Solutions. Utilising a Pace8PRM multi-port receiver at the headend, along with Pace1ST transceivers at each device, the museum successfully deployed the Bosch high-resolution IP cameras beyond the standard Ethernet range of 100 meters. Using existing CAT6 cable, Pace transmits Ethernet data at 100Mbps at distances of up to 500 metres, which exceeded the museum‘s requirements.The design of the solutions are rugged enough to handle the intense heat and other weather conditions With the Altronix Pace solution, the museum did not need to replace existing cabling, which delivered a cost savings for the overall project without sacrificing performance. It also provided a higher return on the museum’s initial infrastructure investment. “We are definitely pleased with the ease of use of the Altronix Pace system,” Burger said. “It’s a completely plug-and-play system. It works great with all of our existing network equipment and infrastructure. It was pretty seamless for us to achieve integration with the new Bosch cameras.” Real-time video monitoring In addition, said Burger, the design of the Altronix Pace solution is rugged enough to handle the intense heat and other weather conditions related to Arizona’s weather and climate. “It speaks to the quality of the manufacturers: both Altronix and Bosch,” added Burger. Video throughout the exterior and interior of the museum is monitored around the clock by utilising Security Center from Genetec. Real-time monitoring allows museum staff to proactively address possible risks, as they are happening, to enhance overall security and safety at the museum.
Porto is home to one of Portugal’s most important art and architecture foundations, the Serralves Foundation, which governs the Serralves Museum of Contemporary Art and Serralves Park. Both are National Monuments, Portugal’s most important heritage classification. Managing visitor flow Over the past years, the Serralves Museum has become Portugal’s most popular museum: visitors now exceed 300,000 per year. They are drawn by world-class cultural events – such as a recent exhibition of Spanish artist Joan Miro. Many of the more than 80 works had never before been shown publicly. With such high visitor numbers, the Serralves Foundation searched for support in managing their visitor flow. Administrators wanted to identify high- and low-traffic days, so they could adjust staffing levels and thereby prevent long queues at entrances and dangerous overcrowding of exhibition rooms. Bosch FLEXIDOME cameras Bosch supported the Foundation by installing FLEXIDOME IP panoramic 7000 video cameras inside and outside the museum. Then the cameras were connected to the Bosch Remote Portal. Bosch supported the Foundation by installing FLEXIDOME IP panoramic 7000 video cameras inside and outside the museum The cameras provide a complete 360-degree view of a certain scene without blind spots. Thanks to their build-in video analytics function, the panoramic cameras are enabled to interpret what they see. In this way they not only capture and transmit video images, but they can also transmit associated data, like object type, size, speed and much more. Remote Portal is a software that as a service allows installers to access via the cloud any Bosch IP camera to configure applications, monitor the health status of the camera or set up camera counter reports. Visitor traffic report data Thus, this solution enables the Museum’s administration to count visitors – and report the count in real time. The Remote Portal allows for the creation of visitor traffic reports over a day, a week or several months. All data can be easily exported to other applications. With the help of this information, the Serralves Foundation plans and relocates staffing as well as other resources well in advance. Also, if needed, security guards can avoid the entrance of more people to the Miró Museum. It manages visitor traffic over the course of the year, so all visitors can indulge fully in experiencing fine art – rather than the art of being stuck in a crowd.