With access control for the simplest to the most complex application, ASSA ABLOY has a security solution to make any building smarter. Our wireless, battery-powered devices include Intersec’s Access Control Product of the Year, one of many created to secure buildings sustainably in the connected cities of the future. The ASSA ABLOY stand for Intersec 2019 (Sheik Saeed Hall 1, Stand A12) showcases the following commercial access control technologies and devices. Aperio H100: access contro...
Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit is employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 camer...
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including...
Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot ge...
The rapid adoption of employee scheduling and workforce management software SmartTask gathered pace last year with record levels of growth in the UK and internationally. In particular, there was an 81% increase in the number of field service businesses using the system during 2017, which now includes over 100 manned security providers and 15% of the ACS Pacesetters. “Over the past few years we have worked hard to understand the needs of the manned security industry to develop a solution t...
SecurAmerica, a leading U.S. man-guarding security company has announced the purchase of ERMC, based in Chattanooga, Tennessee. With headquarters in Atlanta, Georgia, SecurAmerica, headed by the legendary entrepreneur Frank Argenbright, will continue its relentless focus on growth. With this expansion of infrastructure, the combined business will operate in over 650 locations, employ more than 8,000 security officers, and have annual revenues of over $300 million. SecurAmerica will now be the fi...
Vicon Industries, a designer and producer of security surveillance solutions, introduces a 16-channel H.264 video encoder model that converts analogue camera inputs into streamed IP video data. The encoder incorporates high-quality H.264 video and audio encoding and compression technology and is specifically designed to support 960H, AHD and TVI analogue cameras. Perfect solution for hybrid systems The ENC-H264-16 encoder is the perfect solution for hybrid systems, as it simplifies the migration to network video without upgrading existing analogue camera systems. The encoder network-enables existing analogue cameras and creates an IP-based system, allowing integration with Vicon’s Valerus VMS. Customers benefit from leveraging the latest VMS technology while maintaining their legacy investments. This cost-effective, 16-channel video encoder supports all types of analogue cameras, including PTZ domes with full control over RS485. The H.264 video compression format drastically reduces bandwidth and storage requirements without compromising image quality. Advanced features Advanced features such as museum search, that permits users to conduct quick analysis of recorded events, as well as dynamic load balancing and automatic detection, are provided when the device is used as part of a Valerus Video Management System (VMS). The encoder device is easy to install and configure within Valerus by using an exclusive setup utility that enables quick assignment of an IP address. By upgrading to an IP-based system with Vicon’s video encoder, customers gain increased flexibility in camera management while utilising existing cameras and cabling. IP-based system allows cameras to be added one at a time, which ensures customers can future-proof their investment and continue to add the latest security technology without overhauling its infrastructure. “The new H.264 encoder is a perfect solution for hybrid systems, allowing users to benefit from the many advanced features of Valerus while maintaining use of their analogue cameras” said Guy Arazi, Vicon’s Director of Product Management.
Hikvision, a supplier of innovative video surveillance products and solutions, has followed up its launch of the world’s first Deep Learning NVRs with a new series of IP cameras. The new “DeepinView” IP Camera Series delivers power and intelligence to boost the value of surveillance system performance across a broad range of security and management applications. Deep learning algorithms Hikvision’s deep learning algorithms bear much deeper programming compared against conventional intelligent algorithms, which only operate on the surface level. These algorithms perform feature-learning and provide astonishingly accurate and consistent video content analytics (VCA) performance. When coupled with high-speed GPU processing, Hikvision DeepinView cameras demonstrate faster computing with large amounts of data. Critical analytics – such as false alarm filters, facial recognition, people counting and ANPR – can now be reliably implemented in existing and new surveillance systems with versatile applications, providing a sophisticated level of tracking and alarm activation during incidents or even for pre-incident alerts. These analytics also enable customers to reduce the manpower previously required for searching surveillance footage, as well as improve business management efficiency and commercial ROI. Human body detection and facial recognition Hikvision deep learning technology enables the DeepinView cameras to detect human bodies while filtering out insignificant objects and movements within a scene where conventional VCA systems trigger false alarms. This is particularly useful for perimeter protection, where users often spend too much time and monetary resources locating significant alarms and relevant information. Critical analytics enable customers to reduce the manpower previously required for searching surveillance footage Facial recognition can be deployed in many security and management scenarios within a variety of applications to alert system operators to the presence of persons of interest. This is achieved by the facial image modelling and similarity calculation woven into the system. This technology is becoming a crucial tool against blacklisted personnel entering casinos, as the identity of an individual can be used to alert security guards to the presence of a known offender, enabling security personnel to deny access in that casino. In this way they can potentially prevent cheating behaviours. The technology works equally well in preventing the admittance of known offenders into venues such as sports stadiums or restaurants. People counting For transportation hubs, retail stores, sports venues, visitor attractions, and car parks, the gathering and analysis of accurate visitor information can assist businesses to improve their profitability and site management. People Counting video analytics can track the number of people who enter and exit a particular area. It can record foot traffic through a retail store on a daily basis, or monitor the number of people in a venue to ensure that health & safety limits are not breached at any one time, as in a museum for example, where crowds move through on foot. Vehicle management Traffic monitoring and Automatic Number Plate Recognition (ANPR) analytics can be deployed to monitor vehicular traffic movement and enhance the efficiency of traffic management strategies. ANPR can be used to identify vehicles with listed number plates and allow them access to public and private car parks automatically. Hikvision DeepinView deep learning cameras self-learn the number plate information within a scene and recognise a larger amount of number plates than conventional ANPR systems, without the often cumbersome camera positioning adjustments. Hikvision DeepinView deep learning cameras recognisea larger amount of number plates than conventional ANPR systems DeepinView Traffic monitoring analytics, when applied in populous areas and on highways, capture traffic violations such as running red lights, wrong-way driving, illegal parking, and illegal U-turns, contributing to decreased traffic congestion and placing the public and vehicle passengers at lower risk of accidents. Deeper system functionality “Offering security professionals much deeper system functionality, the new range of Hikvision DeepinView IP cameras combine video data, immense processing power, and Hikvision’s innovative set of intelligent technologies to provide a whole new level of video surveillance performance,” says Keen Yao, VP at Hikvision International Business Centre. “With the DeepinView range, deep learning video analytics will transform standard CCTV systems into intelligent and highly-effective, HD-quality, automated detection and alert systems, to support operators and to deliver more efficient surveillance systems management.” Hikvision has taken the Deep Learning technology and innovated a family of products to maximise its use, including the DeepinView IP Camera Series, DeepinMind NVRs, and the DeepinMind Video Analytics Server. The launch dates of these products will be announced on the Hikvision website.
Security expert Abloy is celebrating 110 years since the Finnish invention that sparked a revolution in the lock industry – founder Emil Henriksson’s disc cylinder operated lock. With its unrivalled levels of product development, for over a century, Abloy has been at the forefront of the ever-changing global security market. Offering highly advanced and unique solutions, the Abloy name has become synonymous with quality and innovation. Innovative beginnings This spirit of innovation began in Helsinki, in 1907 where precision mechanic Henrikkson recognised that the principle of the rotating detainer discs inside a cash register could be applied to locks. His initial idea for a secure and durable lock was patented in 1919, at which time, the now globally recognised Abloy trademark was also registered. Thanks to its revolutionary disc design, the lock was virtually unpickable. This led to Abloy becoming the market leader in 1930’s Finland and gaining momentum on a global scale, becoming the locking choice for some of the world’s most important buildings. Integration with technological advancement The 1960’s and 1970’s saw the integration of electromechanical technology into Henrickkson’s revolutionary mechanical lock and Abloy maintained its position as market leader during the rapid technological advancement of the following decades. In 1994, Abloy merged with ASSA to form the ASSA ABLOY group. In the last decade, Abloy has developed game-changing access control systems such as PROTEC2 CLIQ and CLIQ Connect, maximising security yet reducing the number of keys required. Growing product range Abloy’s range of products encompasses mechanical and electric locks, as well as access control systems for applications including utilities, telecoms and banking. Its innovative locking solutions can be found securing some of the world’s most iconic landmarks from museums and sporting venues to hospitals, airports and government buildings. Abloy continues to invest heavily in research and development to ensure that its product range consistently meets the changing needs of consumers, striving to offer not only what customers need, but what they will need in the future. Abloy remains proud of its roots and history, with each product maintaining Henriksson’s Finnish values of reliability, resilience and durability.
Identiv Hirsch physical access solutions include Velocity and Mx Controllers Identiv, Inc., recently announced that it will present its Hirsch and ICPAM physical access solutions in booth 8053 at ISC West 2016 in Las Vegas, Nevada on April 6 - 8, 2016. ISC West is the leading physical security event and aims to unite the entire security channel, including dealers, installers, integrators, specifiers, consultants, and end-users of physical, network, and IT products. Hirsch physical access solutions “Identiv’s Hirsch government-grade physical access solutions are backed with more than thirty years of physical security experience and features. Our solutions are designed and developed with the most secure facilities in mind, but are priced to install anywhere,” said Mark Allen, Identiv General Manager, Physical Access Systems. “Identiv helps protect museums, jails, federal training facilities, high-profile personnel, parking garages, airports, retail shops, gold mines, and many more installations that need a complete, secure, easy-to-install-and-maintain system. Government certifications, including FICAM, are also available for any installation.” Identiv’s robust, reliable, and feature-rich Hirsch physical access solutions include Velocity and Mx Controllers. Velocity is an integrated software platform that manages access control and security operations in hundreds of different facilities, from single high-security rooms to multi-building, multi-location campuses. Velocity allows end-users to control doors, gates, turnstiles, elevators, and other building equipment, monitor users as they move around a facility, prevent unwanted access, maintain compliance, and provide a robust audit trail. Live demonstration of Velocity software Identiv’s Hirsch Mx Controllers are designed to integrate seamlessly with current systems, ensuring that existing credentials, readers, and user databases can be retained. The Mx Controller is the core of Identiv’s physical access control solutions and its modular design and scalable architecture enable an installation to start small and grow large, from a single controller system to a larger, multi-site enterprise. During ISC West, Identiv will be providing demos of its Velocity software, including CCTV and DVR integrations, and Mx Controllers. During the event, Identiv will also be showcasing its FICAM solution for the U.S. federal government, uTrust Physical Access Readers — including its TS (TouchSecure) family of readers and category-defining Hirsch ScramblePads — credentials, and smart card readers. Identiv is the go-to solution for the federal government, including FICAM compliance, with the fastest, most cost-effective, federally compliant, IPv6 support on the market, and is featured on the approved FICAM solutions list. Identiv IoE solution for data aggregation Identiv will also provide demos of its ICPAM solution at ISC West. The Identiv Connected Physical Access Manager (ICPAM) solution is a distributed intelligent physical access control solution, providing state-of-the-art secure access to facilities using standards-based networking, is backwards compatible for legacy wiring topologies and devices, and seamlessly integrates within the Cisco security ecosystem. The ICPAM solution is available immediately through Cisco Authorised Technology Provider (ATP) Partners. “Through our partnership with Cisco, we are fulfilling the concept of convergence, leveraging the entire Cisco infrastructure and application ecosystem,” added Mr. Allen. “ICPAM is an Internet of Everything (IoE) solution, allowing data aggregation from physical access systems through IP-connected devices, unified security operations, and information sharing.” ISC West 2016 runs April 6 - 8, 2016 at Sands Expo in Las Vegas, Nevada.
FoxCounter is Foxstream’s first solution to benefit from this strategic alliance Foxstream, the fast growing software company specialising in real-time VCA (Video Content Analysis) is pleased to announce its partnership with Samsung Techwin. Foxstream’s people counting application can now be run on board Samsung Techwin’s Open Platform WiseNetIII cameras and end users can therefore benefit from a high performance counting application which works fully with Samsung’s latest professional camera functions. Focus on FoxCounter embedded in WiseNetIII cameras: FoxCounter is Foxstream’s first solution to benefit from this strategic alliance. Based on the FoxVigi counting solution module on server, the embedded version, FoxCounter, answers various needs, from statistics to security issues. Mostly used in places welcoming people, FoxCounter is able to help: Identify attendance peaks Establish reference bases (day/week/month), in order to measure evolutions Inform the operator in real time on the site's occupation rate, according to the maximum accommodation capacity The dedicated web interface fits perfectly with the Samsung Techwin WiseNetIII cameras' configuration screen, and allows in particular, listing of all the data reported by each camera on the same network. From a simple web browser and by connecting to a single camera, the operator can easily access all the statistics, and know at all times the number of people in a building, even if it has multiple entrances and exits. Foxstream’s people counting application can now be run on board Samsung Techwin’s Open Platform WiseNetIII cameras Samsung Techwin’s Open Platform WiseNetIII DSP chipset is at the heart of the company’s latest generation of 1.3, 2 and 3 megapixel high definition video surveillance cameras. The processing power of the WiseNetIII DSP chipset enables it to run multiple edge based Applications such as FoxCounter, as well as video analytics, facial recognition and ANPR solutions, which can be downloaded in a similar way to adding Apps to a Smartphone. It also offers users the freedom to utilise the video management software (VMS), that best matches specific project requirements. The WiseNetIII range is perfect for FoxCounter, as it supports P-Iris, which optimizes the iris function when multiple lighting conditions exist in a single scene. This results in images with better contrast, clarity, resolution and depth of field. P-Iris makes it easier for FoxCounter to recognise the flow direction. Indeed, FoxCounter performs bi-directionally in a ceiling-mounted camera, offering an easy-to-use and very accurate solution even under varying lighting conditions, such as light movements, shadows, reflections, etc. Thanks to the WDR function built into the WiseNetIII series that provide enhanced picture quality, motion blur is reduced and clearer images are processed. FoxCounter can therefore refine the counting results, when several people cross the counting area simultaneously, and provide adequate figures. FoxCounter is ideal for retail, airports, railway stations, museums, theme parks and any place with visitor traffic. It is also an autonomous solution: in case of network cuts, the data is stored directly inside the camera. The integration with third party systems is also simplified by the implementation of standard procedures of data recovery.
Also on display are Morse’s KeyBank key control system, KeyPro software, and PowerCheck guard tour system Morse Watchmans is giving booth visitors a preview of their new voice cues at this year’s Security ESSEN show. The new feature is demonstrated along with the company’s portfolio of key control and asset management systems, offering organisations of all sizes a full range of choices to access the benefits of managed key control. The product offerings are easy to implement and all include the same qualities and benefits for which Morse Watchmans products are known – innovative design, reliability and state of the art technology. “Key management is a vital tool in ensuring a safe and secure facility, and voice cues make it even easier for the user to incorporate key control into their security program,” said Fernando Pires, VP Sales and Marketing, Morse Watchmans. “The breadth of innovation in our product portfolio builds on that capability by giving users more exciting and easy to use options for creating an integrated and comprehensive state of the art security system.” At the show, Morse Watchmans is previewing a KeyWatcher system that uses voice cues to prompt the user to open the door, remove the key, return the key and close the door. While the feature is not currently offered with new systems, a positive response from show attendees will speed its incorporation into new systems in the future. Users can select key management solutions for single location applications such as museums or correctional facilities or for multiple site enterprise level installations at university campuses. There’s even a system designed specifically for fleet management applications. Innovative features that make the user experience more exceptional include scheduled reports, automatic email notifications, easier to use on-screen icons, key reservations, mobile capability and checking key ring inventory. KeyWatcher Touch has been updated to incorporate new easier to use onscreen icons. The enterprise key control and management system has a large touchscreen and user-intuitive interface including KeyAnywhere and KeyFind operations. It offers the convenience of scheduled PDF reports that are automatically emailed to authorised recipients. Email delivery of customised or standard reports can be scheduled for any frequency or specific time. System administrators have access to view or run reports as needed. The system also enables security management to easily notify a user via email when a key becomes overdue. Morse Watchmans’ smartphone app provides access to live reports, such as updates that a key is in or out, in addition to live transactions. “Key management is a vital tool in ensuring a safe and secure facility, and voice cues make it even easier for the user to incorporate key control into their security program" KeyWatcher TrueTouch software offers ring inventory functionality allowing multiple rings to be designated for a single SmartKey. Users can now more easily define what keys and rings are attached to the SmartKey. The advanced TrueTouch software runs all programming, remote functions and reports for all KeyWatcher Touch locations, while the server synchronises transactions and maintains the SQL database. Both access control systems and customised client control software interface with the server application. KeyWatcher Illuminated can be configured with a variety of modules and customised to specific user needs. Available modules include the credit/access card module and single and dual locker modules, which can be used in any KeyWatcher system to hold small valuable items. Morse Watchmans’ Mobile App enables authorised users to see a wide range of live information and to interact remotely with the KeyWatcher Touch key control and asset management system. It’s a highly efficient and easy to use tool that greatly simplifies key control management while on the go. Also on display are the KeyBank® Key Control System that provides total accountability of large quantities of keys; KeyPro™ Software; KeyRings™; PowerCheck® Guard Tour System and TourPro™ Data Sorting Software.
The physical security market continues to experience growth as users look to capitalise on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree cameras exclusively to provide extensive coverage inside a facility or in a large outdoor area, with traditional narrow field-of-view cameras used only at “choke” points. Increase in cybersecurity threats and breaches At the end of 2016, we predicted a major trend this year would be an increase in cybersecurity concerns for users of physical security systems, and we were right. An increase in cybersecurity threats and breaches have put organisations on watch. Based on this and the adoption of more IT-centric infrastructure and protocols, there is significant collaboration between IT and physical security, and true “convergence” is finally starting to happen. The adoption of video analytics also continued to increase this year, as most video surveillance projects involved the use of some form of analytics and data analysis. Demand for safeguards As we move into 2018, the trends of 2017 will roll over, and cybersecurity will continue to be a major issue. Suppliers of hardware and software will put an even greater emphasis being cyber secure and end users will increasingly demand safeguards. Additionally, the deployment and use of advanced analytics based on newer artificial intelligence-based technologies will continue to increase. It will be the technology providers that find ways to allow users to capture additional value from the information collected by security systems that will accelerate growth. Oncam made significant investments in new products that leverage analytics and cloud technologies. In 2018, we will continue to invest in the development of new products, with a focus on solutions for particular applications across industry segments. Beyond our technology advancements, we've invested significantly in boosting our sales force in the Americas and adding industry experts to ensure sustained customer and partner success with our solutions. From our vantage point, Oncam is well positioned to capitalise on opportunities for growth in the coming year.
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA case study But does that mean that organisations need to hold off on implementing biometric solutions? Or do they need to ‘force’ it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organisation to reap the benefits. In 1953, New York Metro Transit Authority (MTA), one of the world’s largest mass transit systems, began using tokens as payment for subway rides – a solution to engineers’ problem of creating a machine that could accept different types of coins for the new 15-cent fare. This technological advancement that may seems almost archaic today, served the MTA well for 40 years before the introduction of the MetroCard - a lighter, more automated solution. Technology adaption works Yet, the MTA, despite positive results from its first implementation in 1993, had both the older tokens and the new MetroCards in place, simultaneously for a full decade until 2003. This allowed “early adopters”, who understood the advantages of the MetroCard, to switch over, while allowing those that preferred their ‘trusty’ tokens to continue using them. In 2003, when tokens were finally phased out for a MetroCard-only system, only a small percentage of commuters were still using tokens; most had realised the significant benefits to the card and had switched over of their own volition. The MTA example serves as a model for how technology adoption works. From tokens to MetroCards, fax to email, landlines to cellphones –there is a distinct process new technologies go through as they are introduced and ultimately adopted by the public. Biometric technologies are no different. Yet, organisations must find way to implement new biometric systems that simultaneously provide organisations with the significant advantages biometrics offer, while ensuring that users are given time to adapt to and adopt the new technology. Let’s look at a few practical strategies for biometric adoption: 1. Optional, with added value Many facilities, such as airports, stadiums and theme parks, already use biometric technology to create ‘express lanes’ to save time and improve efficiency. Frequent fliers, VIPs and season ticketholders can enjoy faster and more personalised service with biometric identification solutions. These users can still opt to be identified the old-fashioned way, with an ID card or ticket, but doing so means they will have to line up and wait their turn as the old methods are much less efficient than biometrics technologies. Airports, stadiums and theme parks already use biometric technology to create ‘express lanes’ to save time and improve efficiency Biometrics can also be used to improve the customer experiences, or create more tailored, personalised programs. For example, the ICER (Industry, Culture, Education and Recreation) Innovation Center in the Netherlands implemented biometric visual identification technology to create customised experiences for museum visitors that were fun and interactive. Visitors could choose not to take part in the biometrics-enhanced visit and experience the baseline version of the museum, but by utilising the biometric system, museum goers are offered a tailored experience where exhibits and information are presented based on what a visitor has already seen in the museum. 2. Start with biometrics in optional locations Not all services or locations in a corporate setting are mandatory for employees to visit. For example, employee centers or health and wellness facilities are social settings for individuals to relax and connect. Implementing biometrics-based identification solutions in these types of settings allow employees to interact with the new technology in a low-stress environment and only if they choose to. For example, companies can provide an option for employees to pay for meals at corporate cafeterias using biometric identification, saving break time for those who choose to adopt the technology and enabling them to skip longer payment lines. This has the added benefit of reducing fraud resulting from lost or stolen ID cards. 3. Educate users in advance To ensure smooth deployment and adoption of biometric technology – whether partial or full – it is important to ensure that new users are educated on the new technology in advance of its deployment. For example, employees may have privacy or data security concerns. It’s critical that organisations clarify that the data being collected is kept private and secure. This information can be imparted in several ways. Organisations should be as transparent as possible and provide employees with enough information to address concerns. A Town Hall meeting can be held to explain benefits of the technology and answer questions that new users might have. Providing educational materials to new users, such as letters or videos that explain the new technology can put employees at ease. Make sure to outline how data privacy will be ensured as well as the benefits that employees stand to gain. Have management lead by example and be the first to enroll in the biometrics system. This can help inspire confidence and trust in the system. Make implementation competitive and fun. This can help users who aren’t as excited about the technology take part and learn about it. Implementation of biometric technology can still allow individuals in an organisation a choice of whether or not to partake. Over time, most people tend to adopt new technology by choice if it saves time and makes life easier. When considering biometric systems, keep in mind that it doesn’t necessarily require full adoption now and can coexist with other systems until users feel comfortable with the system, and recognise the benefits it provides.
With every technological advance that canbenefit museum management comes anotherthat may assist thieves When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as mention RFID tagging in a museum environment often receive sarcastic responses reminding them that they have been asked to secure works of art – not pets or livestock. There has, however, been a gradual acceptance of RFID in the art world, particularly if the tag is small enough to occupy only the head portion of the frame of a painting and not extend to the back. But it’s unusual for museum RFID tags to have GPS tracking, and they are rarely monitored beyond a distance of 70 yards. There is no downloadable “Where’s My Painting?” app on Android or iOS. Furthermore, RFID tagging of a frame provides no protection against thieves who are willing to take a blade to the canvas. An application where RFID tagging and GPS come into their own is when items are sent on loan to other galleries and a travelling case is placed around the regular frame. The Kröller-Müller Museum in the Netherlands (known for its van Gogh collection) has recently adopted this technique. But even with such technology in place, art sector observers are disturbed by the risks inherent in what currently seem to be frenetic levels of activity, with galleries lending each other works as part of “inter-museum horse-trading.” Motion detection The video analytics lobby might point to the increasing reliability of intelligent scene analysis, but a confident thief placing a small painting in a shopping bag is not an easy scenario for an algorithm, and many types of legitimate behaviour near a painting can cause nuisance alarms. By contrast (even as a small source of comfort) it should be noted that removing an oil painting from its frame is not an easy matter and in this context “canvas” in the sense of cloth is a misnomer. Centuries-old lacquer makes many canvases as stiff as a board, and simple motion detection within a CCTV camera let alone analytics is likely to expose the hacking and sawing movements needed to cut away a painting. Simple motion detection within a CCTV camera let alone analytics is likely to expose the hacking and sawing movements needed to cut away a painting Passive infrared sensor advantages Passive infrared sensors (PIRs) have been the mainstay of protection at galleries since the 1950s and continue to be a vital tool, although ceiling height can be a limiting factor. The usual technique is to create a 4-inch deep “wall” in front of the painting by projecting downward from a ceiling-mounted detector. It was after leaning in to one of these “curtains” once too often at my favourite portrait gallery that I was finally persuaded to buy a pair of bi-focal glasses. I had been performing an elaborate ritual whereby I would come within inches of a work in order to read the information panel and then back off in order to view the whole painting. By this time an alarm had sounded or a visual alert unseen by me had attracted a guard. This odd to-ing and fro-ing among the middle-aged has been practiced by and named after one of Britain’s foremost playwrights; it’s known as “the Alan Bennett minuet.” Steven Keller of Florida-based Architect’s Security Group is a consultant whose expertise includes museum protection. He argues that, ideally, an infrared curtain should be combined with a low railing in front of pictures projecting out some three feet. This will allow responsible visitors to lean over if necessary for a better view or perhaps to indicate a detail to a companion or student without setting off an alert. The infrared field can then be tight to the picture and nuisance alarms from legitimate visitor activity will be minimised. A veteran of numerous gallery and museum installation projects, Keller makes the point that unless the wall being protected by an infrared alarm is very long – longer than the range of the detector – then the field of coverage will project into walkways or other areas where surveillance is not required. This difficulty can be solved by using two opposing detectors and wiring the devices so they must both trip before an alarm is generated, or terminating the detector into the wall before it extends beyond the desired area. Passive infrared sensors (PIRs) have beenthe mainstay of protection at galleries since the1950s and continue to be a vital tool Analytics better than infrared? If a museum has suitable cameras then video analytics can become a viable alternative to projecting infrared beams in front of pictures. Areas that are prone to nuisance alarms can be masked off, and adaptive learning analytics can be “taught” that certain types of stimuli are not an attempt to steal the item but part of legitimate ambient activity. Analytics can benefit museum curators more than infrared in so far as it may be possible to sound an alarm as soon as a sterile zone is compromised and prevent an incident whereas infrared will always be after the fact. Access control for museum security Access control has much to offer museums and, far from ignoring developments in this sector, galleries are beginning to adopt a technology that in no way compromises the safety of exhibits or visitor experience. It should be remembered that many of the access challenges presented to museum managers are in areas not seen by the public. MIFARE cards that can be deactivated at will must have solved many headaches for security directors worried that a former member of staff may pose a threat. Similarly, electronic key management (often using RFID) where traditional keys are issued on a hierarchical “right-to-have” basis creates accountability and protects paintings when they are in vulnerable locations such as a restoration studio. (Stringent access control for staff may have prevented many incidents: the FBI currently estimates that 80 percent of art crime is committed with the aid of an insider.) Passive infrared is primarily useful in protecting exhibits from the clumsy or over-curious but it also deters thieves. A strategy intended specifically to defeat the art thief is a small wireless transmitter placed at the back of a painting and connected to an impact sensor. Unless they are exceptionally dexterous, anybody removing the painting from the wall will send a signal to an alarm panel in a control room, an off-site alarm receiving centre (ARC) or even to a smartphone app. These devices are of course reliant on a power supply in the control room and it would be interesting to know how many major art galleries have a back-up generator and how many take precautions against the possibility of thieves with electrical knowledge disabling entire power systems. Saturation motion detection ispreferable to perfect perimeterprotection since museum theftscan more easily occur by stayingbehind than by breaking in Sadly, with every technological advance that can benefit museum management comes another that may assist thieves. (I can hardly be the first person to have looked at the roofs and perimeters of London’s art galleries on Google Earth.) The sheer volume of current security innovations must however be favouring the good guys; video management systems (VMS) companies are not only allowing motion sensors or video analytics to trigger recording but they can also programme their software to send clips (playable on a tablet or smartphone) to staff who are either off-site or elsewhere in a large building. Understanding perimeter protection and motion detection Perimeter protection manufacturers have much to offer the art sector. Nobody wants a museum to look like a fortress and many of the buildings are listed architecture whose façades cannot be compromised, but buried volumetric intruder detection is contributing to the security of numerous galleries. However, Steven Keller notes that perimeter protection provides no safeguard against the “stay behind” or against perhaps the most potent threat of all, the disaffected current or recent employee lurking in the building as was the case when ‘The Mona Lisa’ was stolen from the Louvre in 1911. Keller says: “So many security designers, faced with a moderate budget, saturate galleries with motion detection rather than alarming every air intake vent in the room. While the intruder might not be immediately detected, he would eventually be apparent upon arrival in the collection-bearing area. Saturation motion detection is preferable to perfect perimeter protection since museum thefts can more easily occur by staying behind than by breaking in.” Keller is also at pains to stress that guards must also remain vigilant out of hours, and any security installation should be walk-tested every day at closing time in order to check functionality and flush out a “stay behind,” however remote this possibility may seem.
Rasilient Systems, Inc., the pioneer in forensic-grade video surveillance systems, has completed Phase II of the video surveillance system upgrade at Fairbanks International Airport (FIA) in Alaska. Phase II at FIA continued the installation of modern video surveillance for the airport to meet the stringent demands needed to provide safety and security for the thousands of passengers FIA serves daily. FIA is a state-owned, public-use airport that averages more than 328 aircraft operations each day. The Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel camerasThe Phase II video surveillance deployment includes Rasilient server and storage technology that facilitates distributed IP megapixel cameras; recording transmission and storage of forensic-based, high-quality video signals; comprehensive live viewing and playback; utilisation of purpose-built/designed digital IP networks; and intelligent processing of archived video, said Rasilient Director of Strategic Sales Engineering Dr. Edward Wassall. Increased support for surveillance cameras “These are key components that have the major video surveillance system requirements of scalability, video quality and reliability that FIA sought to implement when they chose to upgrade their security system,” said Dr. Wassall. “This current upgrade increased the number of supported video surveillance cameras as well as the efficiency associated with the management related to storage.” Phase I, completed in the summer of 2018, included the initial deployment of Rasilient’s forensic-grade series video surveillance servers and storage. Rasilient’s purpose-built server and storage products provide a video surveillance system infrastructure designed to deliver reliable and continuous video surveillance with exclusive No Frame Drop (NFD) technology that eliminates recording gaps. Enhancing visibility and storage capabilities The Rasilient system has allowed FIA to meet the needs of today as well as to provide scalability for our future needs"FIA Building and Security Representative Dana Bowen said their primary decision to upgrade the multi-camera airside and landside video surveillance system was to enhance visibility and storage capabilities. The Rasilient system has allowed FIA to meet the needs of today as well as to “provide scalability for our future needs,” said Bowen. “We are really very happy with the new airport forensic enabled storage system,” said Bowen. Small, medium to large enterprise deployments are supported by Rasilient products and technologies, and they have been deployed worldwide to protect museums, government institutions, airports, seaports, military contractors, financial institutions, educational establishments, stadiums, and residential complexes.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
The Canadian Warplane Heritage Museum was founded in 1972 and is the largest in Canada to house priceless and restored World War I and II warplanes, including bomber planes used by the Canadian military in Iraq and Afghanistan. The non-profit organisation is mandated to acquire, document, preserve and maintain a complete collection of aircrafts that were flown by Canadians and the Canadian military from the beginning of World War II to the present. Their role is to preserve the artifacts, books, periodicals and manuals relating to this mandate. Today, the Museum houses almost 50 aircrafts, an extensive aviation gift shop and exhibit gallery as well as host private events and offer group tours. The museum’s responsibility of staying open daily, year-round also requires a full-time staff making security a crucial priority. The primary objective is to secure indoor and outdoor premises, including visitor’s parking lot next to Hamilton International Airport. The main purpose is to deter all potential crime, vandalism and theft of property, and mainly to secure priceless World War I and II airplanes. VIVOTEK cameras with IR capabilities Deploying VIVOTEK cameras at the Warplane Heritage Museum was an ambitious task due to the structure of the site being an airplane hangar housing over 50 Warplane Heritage airplanes. The outside perimeters of the museum contain extremely dark zones and parking lots, requiring equipment with very strong IR capabilities to provide sufficient monitoring. Securing the indoor and outdoor premises, including a 400-vehicle parking lot adjacent to Hamilton International Airport took careful planning and a specific camera surveillance system to cover the extensive property. A new and upgraded security system would also deter potential vandalism and theft of property and vehicles, especially securing the priceless airplanes. VIVOTEK’s IB836B-HT Bullet Network camera was installed throughout the premises Earlier this year, the Ontario Government through the Ministry of Citizenship, Culture and Recreation, launched a project designed to update and improve the Museum’s existing video surveillance system. The process culminated in the selection of VIVOTEK’s valued partner, A.S. Security & Surveillance, Inc., a systems integration company headquartered in Southern Ontario that specializes in various residential, commercial, industrial and corporate security surveillance system installations. New VIVOTEK surveillance system The new video surveillance system features sixteen VIVOTEK Network cameras including a 32-channel Network Video Recorder, ND9541. VIVOTEK’s IB836B-HT Bullet Network camera was installed throughout the premises with its 2-Megapixel full HD sensor enabling smooth viewing resolution, capable of capturing high quality and high-resolution video with WDR and SNV technology, regardless of high contrast or low light environments. IB836B-HT is equipped with built-in IR illuminators up to 30 metres for superior image quality 24 hours a day and can withstand inclement weather and the IP66 and IK10-rated housing protects the unit against acts of vandalism, making these units a great selection for installation throughout the Canadian Heritage Warplane Museum. VIVOTEK’s PoE switch – IP surveillance Apart from the VIVOTEK cameras being used in the installation process, the ND9541, H.26 network video recorder equipped for up to 32-Channel network cameras with 4 hard drives offered ample storage space and AW-GEV-264-370, VivoCam Layer 2+ Managed PoE Switch provided extra power for all cameras used. VIVOTEK’s PoE switch enables IP surveillance management functions by not only being a standard Layer 2+ PoE switch, but also enabling set up and configuration of VIVOTEK IP cameras, NVR and CMS. Due to the building structure, AP-FXC-0210 was needed to extend the range for two cameras located indoors. The indoor PoE extender allows a daisy-chain installation with up to a 300M installation.
Whoever honours the homeland Switzerland visits this museum: The Landesmuseum Zurich. A huge medieval castle, it lies in the turbulent heart of the city. The values and history of the country that are preserved by the museum deserve the utmost protection. This is ensured by the security personnel at the front desk. The renovation of the museum (from 2013 to 2016) included a new security loggia. The goal was to ease the control and monitoring of all security systems and building technology from two desk positions, each with four / ten monitors, using a single multifunctional keyboard per desk. The solution integrated some seven different functions: Access control, management systems, video surveillance with 130 cameras, a legacy workplace from the old security counter, some pre-existing WEYTEC components and two IT system rooms. The goal was to enable the security staff to provide enhanced security in a more effective and intuitive manner. A turnkey solution and a migration plan without interruption to ongoing operations were further requirements. WEY Distribution Platform bundles and distributes KVM signals A WEY Distribution Platform bundles and distributes KVM signals between the equipment in the system rooms and the security desk. The staff, located at the security desk, controls and steers all the networked sources and monitoring functions using WEYTEC SMARTtouch keyboards. Video images and other information can be switched to and displayed on the monitors with the touch of a button. The security staff has a 24/7 view of the entire museum in real time. They also manage access control, alarms and much more. Non-disruptive migration to new systemWEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia One of the biggest challenges was to ensure a non-disruptive migration to the new system. The Landesmuseum remained open and was monitored continuously during the renovation and installation work. After weeks of preparation and meticulous coordination between installation technicians, the change over was completed within one day. The old security counter remained fully functional at first. Meanwhile, the two security desks in the new loggia were configured, linked to existing and new systems and finally put into operation. WEYTEC solutions do not require any software or driver installations. They use KVM signal transmission that connects computer interfaces to KVM switches and works independently of hardware platforms and operating systems. The concept is compatible with almost any established IT infrastructure and can be implemented during ongoing operations. Thus, WEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia. Security operator responsibilities Security operators at the Landesmuseum are responsible for a multitude of tasks. Among other things, they track images from 130 video cameras that monitor 6,100 sqm of exhibition space. They oversee movement and intrusion sensors, fire detectors and elevators. They control lighting, window shades and air-conditioning systems. All alarms must be processed immediately. The operators are also responsible for access control. They issue badges when someone needs to enter secure rooms. They keep track of the opening and closing of doors. The WEYTEC SMARTtouch keyboards facilitate multitasking. They store central functions, workflows and alarm processes that are immediately available per click. Screen layouts can be arranged and re-arranged efficiently. The security personnel always have the overview of surveillance cameras, management systems and all other sources, data and applications. Remote system rooms eliminate computers under desks Remote system rooms eliminate computers under desks. WEYTEC recommends this solution for every control room, including the security desk in the Landesmusuem. System rooms provide a protected, air-conditioned and easy-to-maintain environment as well as room for growth. With the WEY Distribution Platform, remote computers are operated latency-free over long distances, while a single keyboard operates any number of machines. The KVM signals are transmitted via Ethernet. The Landesmuseum maintains two system rooms. One hosts security systems and video system clients, the other facilities management, access control and office IT systems. WEYTEC seamlessly integrates new and existing equipment in both rooms into the solution infrastructure. The systems are connected to the KVM switch matrix via IP Remote transmitters located in one of the system rooms. From there, the signals are routed via IP Remote receivers to the desks and screens. Landesmseum Zürich, Château de Prangins, Swiss History Schwyz united under Swiss National Museum Three museums, the Landesmseum Zürich, the Château de Prangins and the Forum of Swiss History Schwyz are united under the Swiss National Museum umbrella organisation. The museums present Swiss history from its beginnings to the present day, and explore Swiss identity and the diversity of the country's history and culture.Using a single keyboard to operate all seven of our systems simplifies our work enormously" The Landesmuseum is located in the heart of Zurich. The museum management describes the building as an "ensemble of a fine old historical building and a new sculptural wing". The edifice was first built in 1898 by the architect Gustav Gull, a pupil of Gottfried Semper. Gull drew upon a variety of historical architectural elements from the late Middle Ages to modern times and brought them together to form a whole.Everything runs more efficiently, faster and we have a better overview" Due to a shortage of space, the Landesmuseum was expanded for the first time from 2013 to 2016. The new wing, designed by the Swiss architects Christ & Gantenbein and opened in 2016, complements Gustav Gull's building. It houses flexible exhibition halls, a modern library and an auditorium for public events. Equipped by WEY Technology, the museum's new security loggia is located at the juncture between the old and new buildings. Operating seven security systems “Using a single keyboard to operate all seven of our systems simplifies our work enormously. Everything runs more efficiently, faster and we have a better overview. We are very satisfied", said Heinz Baumann, Head of the Security Loggia Landesmuseum Zürich. Mr. Baumann also confirms: A decisive advantage of the WEYTEC solution was its trouble-free implementation with the existing security systems. The head of the security desk at the Landesmuseum Zurich recommends that other museums use WEY Technology control room solutions.
The Musical Instrument Museum (MIM) in Phoenix, Arizona, hosts more than 300,000 guests each year to view its collection of more than 13,000 instruments and associated objects, and to attend live performances in the MIM Music Theater. As the world’s only global musical instrument museum, MIM creates an exciting experience for guests, immersing them in cultural traditions from around the world. With a mission to collect, preserve, and make accessible an astonishing variety of musical instruments and performance videos from every country in the world, MIM offers guests a welcoming and fun experience throughout the day with multiple live evening performances each week. The safety and security of visitors and staff and the protection of the museum’s extensive collection is an essential aspect of fulfilling its mission. The safety and security of visitors and staff is an essential aspect of fulfilling the museum's mission To enhance the security of its exterior spaces, the museum recently worked with IES Communications, a nationwide provider of integrated security solutions, to upgrade its outdoor surveillance system. Now, a combination of Bosch AUTODOME IP starlight 7000 HD, FLEXIDOME IP starlight 6000 VR, and AUTODOME IP 5000 IR cameras provide high-quality images of the museum’s outdoor areas, which include an impressive courtyard at the main entrance, an additional courtyard at the student entry, an outdoor café and seating area for guests, as well as special events, and two parking lots. Full-colour night images Bosch cameras with starlight technology provide clear images regardless of lighting conditions, delivering full-colour images in the dark beyond the point where other cameras turn to monochrome images. Supported by new exterior LED lights, the Bosch starlight cameras at the museum produce full-colour images throughout the night. The intelligent cameras also feature built-in video analytics to alert the museum’s security operators to possible risks, such as detecting objects left behind or the gathering of large crowds that may create congestion in an area. With Intelligent Tracking, AUTODOME IP starlight 7000 HD cameras can also automatically track objects of interest as they move throughout a scene. “The low light performance of the Bosch starlight cameras is completely unmatched. They are producing beautiful colour images all through the night,” said David Burger, security manager at the Musical Instrument Museum. The cameras also feature built-in video analytics to alert the museum’s security operators to possible risks, such as detecting objects left behind In addition, Bosch AUTODOME IP 5000 IR cameras are strategically placed in perimeter and other areas of the museum exterior where there is limited lighting at night. These pan-tilt-zoom cameras feature a built-in intelligent IR beam that ensures optimum illumination of objects regardless of the level of zoom. “The quality of the images, the onboard video analytics that are included without an additional cost, and the reliability of the moving cameras were key factors in our decision,” continued Burger. “Our security operators are thrilled with the quality and operation of the cameras.” Long distance data delivery One challenge with the installation was how to deliver data from the security cameras over long distances, between remote locations and the head-end network switches and servers. After receiving recommendations from IES Communications and Bosch, the museum selected Altronix’s PaceTM Long-Range Ethernet Solutions. Utilising a Pace8PRM multi-port receiver at the headend, along with Pace1ST transceivers at each device, the museum successfully deployed the Bosch high-resolution IP cameras beyond the standard Ethernet range of 100 meters. Using existing CAT6 cable, Pace transmits Ethernet data at 100Mbps at distances of up to 500 metres, which exceeded the museum‘s requirements.The design of the solutions are rugged enough to handle the intense heat and other weather conditions With the Altronix Pace solution, the museum did not need to replace existing cabling, which delivered a cost savings for the overall project without sacrificing performance. It also provided a higher return on the museum’s initial infrastructure investment. “We are definitely pleased with the ease of use of the Altronix Pace system,” Burger said. “It’s a completely plug-and-play system. It works great with all of our existing network equipment and infrastructure. It was pretty seamless for us to achieve integration with the new Bosch cameras.” Real-time video monitoring In addition, said Burger, the design of the Altronix Pace solution is rugged enough to handle the intense heat and other weather conditions related to Arizona’s weather and climate. “It speaks to the quality of the manufacturers: both Altronix and Bosch,” added Burger. Video throughout the exterior and interior of the museum is monitored around the clock by utilising Security Center from Genetec. Real-time monitoring allows museum staff to proactively address possible risks, as they are happening, to enhance overall security and safety at the museum.
Porto is home to one of Portugal’s most important art and architecture foundations, the Serralves Foundation, which governs the Serralves Museum of Contemporary Art and Serralves Park. Both are National Monuments, Portugal’s most important heritage classification. Managing visitor flow Over the past years, the Serralves Museum has become Portugal’s most popular museum: visitors now exceed 300,000 per year. They are drawn by world-class cultural events – such as a recent exhibition of Spanish artist Joan Miro. Many of the more than 80 works had never before been shown publicly. With such high visitor numbers, the Serralves Foundation searched for support in managing their visitor flow. Administrators wanted to identify high- and low-traffic days, so they could adjust staffing levels and thereby prevent long queues at entrances and dangerous overcrowding of exhibition rooms. Bosch FLEXIDOME cameras Bosch supported the Foundation by installing FLEXIDOME IP panoramic 7000 video cameras inside and outside the museum. Then the cameras were connected to the Bosch Remote Portal. Bosch supported the Foundation by installing FLEXIDOME IP panoramic 7000 video cameras inside and outside the museum The cameras provide a complete 360-degree view of a certain scene without blind spots. Thanks to their build-in video analytics function, the panoramic cameras are enabled to interpret what they see. In this way they not only capture and transmit video images, but they can also transmit associated data, like object type, size, speed and much more. Remote Portal is a software that as a service allows installers to access via the cloud any Bosch IP camera to configure applications, monitor the health status of the camera or set up camera counter reports. Visitor traffic report data Thus, this solution enables the Museum’s administration to count visitors – and report the count in real time. The Remote Portal allows for the creation of visitor traffic reports over a day, a week or several months. All data can be easily exported to other applications. With the help of this information, the Serralves Foundation plans and relocates staffing as well as other resources well in advance. Also, if needed, security guards can avoid the entrance of more people to the Miró Museum. It manages visitor traffic over the course of the year, so all visitors can indulge fully in experiencing fine art – rather than the art of being stuck in a crowd.