Iris ID, a premier provider of iris recognition technology, announced its iCAM R100 face and iris cameras will be integrated into Mentalix, Inc.’s Fed Submit suite of live scan solutions. Fed Submit is employed by civilian and law enforcement agencies across the county, provides users with intuitive, multi-modal booking and background check systems. Mentalix, headquartered in Dallas, is an industry leader in FBI-certified identification software. Iris ID’s IrisAccess iCAM R100 camer...
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including...
Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot ge...
The rapid adoption of employee scheduling and workforce management software SmartTask gathered pace last year with record levels of growth in the UK and internationally. In particular, there was an 81% increase in the number of field service businesses using the system during 2017, which now includes over 100 manned security providers and 15% of the ACS Pacesetters. “Over the past few years we have worked hard to understand the needs of the manned security industry to develop a solution t...
SecurAmerica, a leading U.S. man-guarding security company has announced the purchase of ERMC, based in Chattanooga, Tennessee. With headquarters in Atlanta, Georgia, SecurAmerica, headed by the legendary entrepreneur Frank Argenbright, will continue its relentless focus on growth. With this expansion of infrastructure, the combined business will operate in over 650 locations, employ more than 8,000 security officers, and have annual revenues of over $300 million. SecurAmerica will now be the fi...
The physical security market continues to experience growth as users look to capitalise on the promises of emerging technologies and because of this, 2017 proved to be a great year for Oncam. In fact, this year was the best year in Oncam's history in terms of sales, as 360-degree fisheye cameras have gone from being a “specialty” camera used only in certain applications to a primary device for enabling total situational awareness. Today, many of our customers leverage 360-degree ca...
Biometric identification technologies today are becoming pervasive. Many smartphones offer fingerprint unlock options, and most organisations have at least considered the technology as a solution for their identification and access needs. While biometrics have dramatically improved in the past several years to deliver faster, more efficient and more secure solutions, not everyone is ready for the change. New York MTA case study But does that mean that organisations need to hold off on implementing biometric solutions? Or do they need to ‘force’ it upon users? A historic case study provides an excellent example of how to implement a new technology with millions of people, under pressure, allowing users to adapt slowly and the organisation to reap the benefits. In 1953, New York Metro Transit Authority (MTA), one of the world’s largest mass transit systems, began using tokens as payment for subway rides – a solution to engineers’ problem of creating a machine that could accept different types of coins for the new 15-cent fare. This technological advancement that may seems almost archaic today, served the MTA well for 40 years before the introduction of the MetroCard - a lighter, more automated solution. Technology adaption works Yet, the MTA, despite positive results from its first implementation in 1993, had both the older tokens and the new MetroCards in place, simultaneously for a full decade until 2003. This allowed “early adopters”, who understood the advantages of the MetroCard, to switch over, while allowing those that preferred their ‘trusty’ tokens to continue using them. In 2003, when tokens were finally phased out for a MetroCard-only system, only a small percentage of commuters were still using tokens; most had realised the significant benefits to the card and had switched over of their own volition. The MTA example serves as a model for how technology adoption works. From tokens to MetroCards, fax to email, landlines to cellphones –there is a distinct process new technologies go through as they are introduced and ultimately adopted by the public. Biometric technologies are no different. Yet, organisations must find way to implement new biometric systems that simultaneously provide organisations with the significant advantages biometrics offer, while ensuring that users are given time to adapt to and adopt the new technology. Let’s look at a few practical strategies for biometric adoption: 1. Optional, with added value Many facilities, such as airports, stadiums and theme parks, already use biometric technology to create ‘express lanes’ to save time and improve efficiency. Frequent fliers, VIPs and season ticketholders can enjoy faster and more personalised service with biometric identification solutions. These users can still opt to be identified the old-fashioned way, with an ID card or ticket, but doing so means they will have to line up and wait their turn as the old methods are much less efficient than biometrics technologies. Airports, stadiums and theme parks already use biometric technology to create ‘express lanes’ to save time and improve efficiency Biometrics can also be used to improve the customer experiences, or create more tailored, personalised programs. For example, the ICER (Industry, Culture, Education and Recreation) Innovation Center in the Netherlands implemented biometric visual identification technology to create customised experiences for museum visitors that were fun and interactive. Visitors could choose not to take part in the biometrics-enhanced visit and experience the baseline version of the museum, but by utilising the biometric system, museum goers are offered a tailored experience where exhibits and information are presented based on what a visitor has already seen in the museum. 2. Start with biometrics in optional locations Not all services or locations in a corporate setting are mandatory for employees to visit. For example, employee centers or health and wellness facilities are social settings for individuals to relax and connect. Implementing biometrics-based identification solutions in these types of settings allow employees to interact with the new technology in a low-stress environment and only if they choose to. For example, companies can provide an option for employees to pay for meals at corporate cafeterias using biometric identification, saving break time for those who choose to adopt the technology and enabling them to skip longer payment lines. This has the added benefit of reducing fraud resulting from lost or stolen ID cards. 3. Educate users in advance To ensure smooth deployment and adoption of biometric technology – whether partial or full – it is important to ensure that new users are educated on the new technology in advance of its deployment. For example, employees may have privacy or data security concerns. It’s critical that organisations clarify that the data being collected is kept private and secure. This information can be imparted in several ways. Organisations should be as transparent as possible and provide employees with enough information to address concerns. A Town Hall meeting can be held to explain benefits of the technology and answer questions that new users might have. Providing educational materials to new users, such as letters or videos that explain the new technology can put employees at ease. Make sure to outline how data privacy will be ensured as well as the benefits that employees stand to gain. Have management lead by example and be the first to enroll in the biometrics system. This can help inspire confidence and trust in the system. Make implementation competitive and fun. This can help users who aren’t as excited about the technology take part and learn about it. Implementation of biometric technology can still allow individuals in an organisation a choice of whether or not to partake. Over time, most people tend to adopt new technology by choice if it saves time and makes life easier. When considering biometric systems, keep in mind that it doesn’t necessarily require full adoption now and can coexist with other systems until users feel comfortable with the system, and recognise the benefits it provides.
Vicon Industries, a designer and producer of security surveillance solutions, introduces a 16-channel H.264 video encoder model that converts analogue camera inputs into streamed IP video data. The encoder incorporates high-quality H.264 video and audio encoding and compression technology and is specifically designed to support 960H, AHD and TVI analogue cameras. Perfect solution for hybrid systems The ENC-H264-16 encoder is the perfect solution for hybrid systems, as it simplifies the migration to network video without upgrading existing analogue camera systems. The encoder network-enables existing analogue cameras and creates an IP-based system, allowing integration with Vicon’s Valerus VMS. Customers benefit from leveraging the latest VMS technology while maintaining their legacy investments. This cost-effective, 16-channel video encoder supports all types of analogue cameras, including PTZ domes with full control over RS485. The H.264 video compression format drastically reduces bandwidth and storage requirements without compromising image quality. Advanced features Advanced features such as museum search, that permits users to conduct quick analysis of recorded events, as well as dynamic load balancing and automatic detection, are provided when the device is used as part of a Valerus Video Management System (VMS). The encoder device is easy to install and configure within Valerus by using an exclusive setup utility that enables quick assignment of an IP address. By upgrading to an IP-based system with Vicon’s video encoder, customers gain increased flexibility in camera management while utilising existing cameras and cabling. IP-based system allows cameras to be added one at a time, which ensures customers can future-proof their investment and continue to add the latest security technology without overhauling its infrastructure. “The new H.264 encoder is a perfect solution for hybrid systems, allowing users to benefit from the many advanced features of Valerus while maintaining use of their analogue cameras” said Guy Arazi, Vicon’s Director of Product Management.
Hikvision, a supplier of innovative video surveillance products and solutions, has followed up its launch of the world’s first Deep Learning NVRs with a new series of IP cameras. The new “DeepinView” IP Camera Series delivers power and intelligence to boost the value of surveillance system performance across a broad range of security and management applications. Deep learning algorithms Hikvision’s deep learning algorithms bear much deeper programming compared against conventional intelligent algorithms, which only operate on the surface level. These algorithms perform feature-learning and provide astonishingly accurate and consistent video content analytics (VCA) performance. When coupled with high-speed GPU processing, Hikvision DeepinView cameras demonstrate faster computing with large amounts of data. Critical analytics – such as false alarm filters, facial recognition, people counting and ANPR – can now be reliably implemented in existing and new surveillance systems with versatile applications, providing a sophisticated level of tracking and alarm activation during incidents or even for pre-incident alerts. These analytics also enable customers to reduce the manpower previously required for searching surveillance footage, as well as improve business management efficiency and commercial ROI. Human body detection and facial recognition Hikvision deep learning technology enables the DeepinView cameras to detect human bodies while filtering out insignificant objects and movements within a scene where conventional VCA systems trigger false alarms. This is particularly useful for perimeter protection, where users often spend too much time and monetary resources locating significant alarms and relevant information. Critical analytics enable customers to reduce the manpower previously required for searching surveillance footage Facial recognition can be deployed in many security and management scenarios within a variety of applications to alert system operators to the presence of persons of interest. This is achieved by the facial image modelling and similarity calculation woven into the system. This technology is becoming a crucial tool against blacklisted personnel entering casinos, as the identity of an individual can be used to alert security guards to the presence of a known offender, enabling security personnel to deny access in that casino. In this way they can potentially prevent cheating behaviours. The technology works equally well in preventing the admittance of known offenders into venues such as sports stadiums or restaurants. People counting For transportation hubs, retail stores, sports venues, visitor attractions, and car parks, the gathering and analysis of accurate visitor information can assist businesses to improve their profitability and site management. People Counting video analytics can track the number of people who enter and exit a particular area. It can record foot traffic through a retail store on a daily basis, or monitor the number of people in a venue to ensure that health & safety limits are not breached at any one time, as in a museum for example, where crowds move through on foot. Vehicle management Traffic monitoring and Automatic Number Plate Recognition (ANPR) analytics can be deployed to monitor vehicular traffic movement and enhance the efficiency of traffic management strategies. ANPR can be used to identify vehicles with listed number plates and allow them access to public and private car parks automatically. Hikvision DeepinView deep learning cameras self-learn the number plate information within a scene and recognise a larger amount of number plates than conventional ANPR systems, without the often cumbersome camera positioning adjustments. Hikvision DeepinView deep learning cameras recognisea larger amount of number plates than conventional ANPR systems DeepinView Traffic monitoring analytics, when applied in populous areas and on highways, capture traffic violations such as running red lights, wrong-way driving, illegal parking, and illegal U-turns, contributing to decreased traffic congestion and placing the public and vehicle passengers at lower risk of accidents. Deeper system functionality “Offering security professionals much deeper system functionality, the new range of Hikvision DeepinView IP cameras combine video data, immense processing power, and Hikvision’s innovative set of intelligent technologies to provide a whole new level of video surveillance performance,” says Keen Yao, VP at Hikvision International Business Centre. “With the DeepinView range, deep learning video analytics will transform standard CCTV systems into intelligent and highly-effective, HD-quality, automated detection and alert systems, to support operators and to deliver more efficient surveillance systems management.” Hikvision has taken the Deep Learning technology and innovated a family of products to maximise its use, including the DeepinView IP Camera Series, DeepinMind NVRs, and the DeepinMind Video Analytics Server. The launch dates of these products will be announced on the Hikvision website.
Security expert Abloy is celebrating 110 years since the Finnish invention that sparked a revolution in the lock industry – founder Emil Henriksson’s disc cylinder operated lock. With its unrivalled levels of product development, for over a century, Abloy has been at the forefront of the ever-changing global security market. Offering highly advanced and unique solutions, the Abloy name has become synonymous with quality and innovation. Innovative beginnings This spirit of innovation began in Helsinki, in 1907 where precision mechanic Henrikkson recognised that the principle of the rotating detainer discs inside a cash register could be applied to locks. His initial idea for a secure and durable lock was patented in 1919, at which time, the now globally recognised Abloy trademark was also registered. Thanks to its revolutionary disc design, the lock was virtually unpickable. This led to Abloy becoming the market leader in 1930’s Finland and gaining momentum on a global scale, becoming the locking choice for some of the world’s most important buildings. Integration with technological advancement The 1960’s and 1970’s saw the integration of electromechanical technology into Henrickkson’s revolutionary mechanical lock and Abloy maintained its position as market leader during the rapid technological advancement of the following decades. In 1994, Abloy merged with ASSA to form the ASSA ABLOY group. In the last decade, Abloy has developed game-changing access control systems such as PROTEC2 CLIQ and CLIQ Connect, maximising security yet reducing the number of keys required. Growing product range Abloy’s range of products encompasses mechanical and electric locks, as well as access control systems for applications including utilities, telecoms and banking. Its innovative locking solutions can be found securing some of the world’s most iconic landmarks from museums and sporting venues to hospitals, airports and government buildings. Abloy continues to invest heavily in research and development to ensure that its product range consistently meets the changing needs of consumers, striving to offer not only what customers need, but what they will need in the future. Abloy remains proud of its roots and history, with each product maintaining Henriksson’s Finnish values of reliability, resilience and durability.
Identiv Hirsch physical access solutions include Velocity and Mx Controllers Identiv, Inc., recently announced that it will present its Hirsch and ICPAM physical access solutions in booth 8053 at ISC West 2016 in Las Vegas, Nevada on April 6 - 8, 2016. ISC West is the leading physical security event and aims to unite the entire security channel, including dealers, installers, integrators, specifiers, consultants, and end-users of physical, network, and IT products. Hirsch physical access solutions “Identiv’s Hirsch government-grade physical access solutions are backed with more than thirty years of physical security experience and features. Our solutions are designed and developed with the most secure facilities in mind, but are priced to install anywhere,” said Mark Allen, Identiv General Manager, Physical Access Systems. “Identiv helps protect museums, jails, federal training facilities, high-profile personnel, parking garages, airports, retail shops, gold mines, and many more installations that need a complete, secure, easy-to-install-and-maintain system. Government certifications, including FICAM, are also available for any installation.” Identiv’s robust, reliable, and feature-rich Hirsch physical access solutions include Velocity and Mx Controllers. Velocity is an integrated software platform that manages access control and security operations in hundreds of different facilities, from single high-security rooms to multi-building, multi-location campuses. Velocity allows end-users to control doors, gates, turnstiles, elevators, and other building equipment, monitor users as they move around a facility, prevent unwanted access, maintain compliance, and provide a robust audit trail. Live demonstration of Velocity software Identiv’s Hirsch Mx Controllers are designed to integrate seamlessly with current systems, ensuring that existing credentials, readers, and user databases can be retained. The Mx Controller is the core of Identiv’s physical access control solutions and its modular design and scalable architecture enable an installation to start small and grow large, from a single controller system to a larger, multi-site enterprise. During ISC West, Identiv will be providing demos of its Velocity software, including CCTV and DVR integrations, and Mx Controllers. During the event, Identiv will also be showcasing its FICAM solution for the U.S. federal government, uTrust Physical Access Readers — including its TS (TouchSecure) family of readers and category-defining Hirsch ScramblePads — credentials, and smart card readers. Identiv is the go-to solution for the federal government, including FICAM compliance, with the fastest, most cost-effective, federally compliant, IPv6 support on the market, and is featured on the approved FICAM solutions list. Identiv IoE solution for data aggregation Identiv will also provide demos of its ICPAM solution at ISC West. The Identiv Connected Physical Access Manager (ICPAM) solution is a distributed intelligent physical access control solution, providing state-of-the-art secure access to facilities using standards-based networking, is backwards compatible for legacy wiring topologies and devices, and seamlessly integrates within the Cisco security ecosystem. The ICPAM solution is available immediately through Cisco Authorised Technology Provider (ATP) Partners. “Through our partnership with Cisco, we are fulfilling the concept of convergence, leveraging the entire Cisco infrastructure and application ecosystem,” added Mr. Allen. “ICPAM is an Internet of Everything (IoE) solution, allowing data aggregation from physical access systems through IP-connected devices, unified security operations, and information sharing.” ISC West 2016 runs April 6 - 8, 2016 at Sands Expo in Las Vegas, Nevada.
With every technological advance that canbenefit museum management comes anotherthat may assist thieves When protecting art treasures, the first instinct for many security professionals may well be to look at recent advances in technology. Hasn’t the advent of IP-addressable devices provided sufficient tools to protect art exhibits from theft in a discreet manner? Apparently not, and entrenched attitudes abound among curators. Consultants who so much as mention RFID tagging in a museum environment often receive sarcastic responses reminding them that they have been asked to secure works of art – not pets or livestock. There has, however, been a gradual acceptance of RFID in the art world, particularly if the tag is small enough to occupy only the head portion of the frame of a painting and not extend to the back. But it’s unusual for museum RFID tags to have GPS tracking, and they are rarely monitored beyond a distance of 70 yards. There is no downloadable “Where’s My Painting?” app on Android or iOS. Furthermore, RFID tagging of a frame provides no protection against thieves who are willing to take a blade to the canvas. An application where RFID tagging and GPS come into their own is when items are sent on loan to other galleries and a travelling case is placed around the regular frame. The Kröller-Müller Museum in the Netherlands (known for its van Gogh collection) has recently adopted this technique. But even with such technology in place, art sector observers are disturbed by the risks inherent in what currently seem to be frenetic levels of activity, with galleries lending each other works as part of “inter-museum horse-trading.” Motion detection The video analytics lobby might point to the increasing reliability of intelligent scene analysis, but a confident thief placing a small painting in a shopping bag is not an easy scenario for an algorithm, and many types of legitimate behaviour near a painting can cause nuisance alarms. By contrast (even as a small source of comfort) it should be noted that removing an oil painting from its frame is not an easy matter and in this context “canvas” in the sense of cloth is a misnomer. Centuries-old lacquer makes many canvases as stiff as a board, and simple motion detection within a CCTV camera let alone analytics is likely to expose the hacking and sawing movements needed to cut away a painting. Simple motion detection within a CCTV camera let alone analytics is likely to expose the hacking and sawing movements needed to cut away a painting Passive infrared sensor advantages Passive infrared sensors (PIRs) have been the mainstay of protection at galleries since the 1950s and continue to be a vital tool, although ceiling height can be a limiting factor. The usual technique is to create a 4-inch deep “wall” in front of the painting by projecting downward from a ceiling-mounted detector. It was after leaning in to one of these “curtains” once too often at my favourite portrait gallery that I was finally persuaded to buy a pair of bi-focal glasses. I had been performing an elaborate ritual whereby I would come within inches of a work in order to read the information panel and then back off in order to view the whole painting. By this time an alarm had sounded or a visual alert unseen by me had attracted a guard. This odd to-ing and fro-ing among the middle-aged has been practiced by and named after one of Britain’s foremost playwrights; it’s known as “the Alan Bennett minuet.” Steven Keller of Florida-based Architect’s Security Group is a consultant whose expertise includes museum protection. He argues that, ideally, an infrared curtain should be combined with a low railing in front of pictures projecting out some three feet. This will allow responsible visitors to lean over if necessary for a better view or perhaps to indicate a detail to a companion or student without setting off an alert. The infrared field can then be tight to the picture and nuisance alarms from legitimate visitor activity will be minimised. A veteran of numerous gallery and museum installation projects, Keller makes the point that unless the wall being protected by an infrared alarm is very long – longer than the range of the detector – then the field of coverage will project into walkways or other areas where surveillance is not required. This difficulty can be solved by using two opposing detectors and wiring the devices so they must both trip before an alarm is generated, or terminating the detector into the wall before it extends beyond the desired area. Passive infrared sensors (PIRs) have beenthe mainstay of protection at galleries since the1950s and continue to be a vital tool Analytics better than infrared? If a museum has suitable cameras then video analytics can become a viable alternative to projecting infrared beams in front of pictures. Areas that are prone to nuisance alarms can be masked off, and adaptive learning analytics can be “taught” that certain types of stimuli are not an attempt to steal the item but part of legitimate ambient activity. Analytics can benefit museum curators more than infrared in so far as it may be possible to sound an alarm as soon as a sterile zone is compromised and prevent an incident whereas infrared will always be after the fact. Access control for museum security Access control has much to offer museums and, far from ignoring developments in this sector, galleries are beginning to adopt a technology that in no way compromises the safety of exhibits or visitor experience. It should be remembered that many of the access challenges presented to museum managers are in areas not seen by the public. MIFARE cards that can be deactivated at will must have solved many headaches for security directors worried that a former member of staff may pose a threat. Similarly, electronic key management (often using RFID) where traditional keys are issued on a hierarchical “right-to-have” basis creates accountability and protects paintings when they are in vulnerable locations such as a restoration studio. (Stringent access control for staff may have prevented many incidents: the FBI currently estimates that 80 percent of art crime is committed with the aid of an insider.) Passive infrared is primarily useful in protecting exhibits from the clumsy or over-curious but it also deters thieves. A strategy intended specifically to defeat the art thief is a small wireless transmitter placed at the back of a painting and connected to an impact sensor. Unless they are exceptionally dexterous, anybody removing the painting from the wall will send a signal to an alarm panel in a control room, an off-site alarm receiving centre (ARC) or even to a smartphone app. These devices are of course reliant on a power supply in the control room and it would be interesting to know how many major art galleries have a back-up generator and how many take precautions against the possibility of thieves with electrical knowledge disabling entire power systems. Saturation motion detection ispreferable to perfect perimeterprotection since museum theftscan more easily occur by stayingbehind than by breaking in Sadly, with every technological advance that can benefit museum management comes another that may assist thieves. (I can hardly be the first person to have looked at the roofs and perimeters of London’s art galleries on Google Earth.) The sheer volume of current security innovations must however be favouring the good guys; video management systems (VMS) companies are not only allowing motion sensors or video analytics to trigger recording but they can also programme their software to send clips (playable on a tablet or smartphone) to staff who are either off-site or elsewhere in a large building. Understanding perimeter protection and motion detection Perimeter protection manufacturers have much to offer the art sector. Nobody wants a museum to look like a fortress and many of the buildings are listed architecture whose façades cannot be compromised, but buried volumetric intruder detection is contributing to the security of numerous galleries. However, Steven Keller notes that perimeter protection provides no safeguard against the “stay behind” or against perhaps the most potent threat of all, the disaffected current or recent employee lurking in the building as was the case when ‘The Mona Lisa’ was stolen from the Louvre in 1911. Keller says: “So many security designers, faced with a moderate budget, saturate galleries with motion detection rather than alarming every air intake vent in the room. While the intruder might not be immediately detected, he would eventually be apparent upon arrival in the collection-bearing area. Saturation motion detection is preferable to perfect perimeter protection since museum thefts can more easily occur by staying behind than by breaking in.” Keller is also at pains to stress that guards must also remain vigilant out of hours, and any security installation should be walk-tested every day at closing time in order to check functionality and flush out a “stay behind,” however remote this possibility may seem.
The Canadian Warplane Heritage Museum was founded in 1972 and is the largest in Canada to house priceless and restored World War I and II warplanes, including bomber planes used by the Canadian military in Iraq and Afghanistan. The non-profit organisation is mandated to acquire, document, preserve and maintain a complete collection of aircrafts that were flown by Canadians and the Canadian military from the beginning of World War II to the present. Their role is to preserve the artifacts, books, periodicals and manuals relating to this mandate. Today, the Museum houses almost 50 aircrafts, an extensive aviation gift shop and exhibit gallery as well as host private events and offer group tours. The museum’s responsibility of staying open daily, year-round also requires a full-time staff making security a crucial priority. The primary objective is to secure indoor and outdoor premises, including visitor’s parking lot next to Hamilton International Airport. The main purpose is to deter all potential crime, vandalism and theft of property, and mainly to secure priceless World War I and II airplanes. VIVOTEK cameras with IR capabilities Deploying VIVOTEK cameras at the Warplane Heritage Museum was an ambitious task due to the structure of the site being an airplane hangar housing over 50 Warplane Heritage airplanes. The outside perimeters of the museum contain extremely dark zones and parking lots, requiring equipment with very strong IR capabilities to provide sufficient monitoring. Securing the indoor and outdoor premises, including a 400-vehicle parking lot adjacent to Hamilton International Airport took careful planning and a specific camera surveillance system to cover the extensive property. A new and upgraded security system would also deter potential vandalism and theft of property and vehicles, especially securing the priceless airplanes. VIVOTEK’s IB836B-HT Bullet Network camera was installed throughout the premises Earlier this year, the Ontario Government through the Ministry of Citizenship, Culture and Recreation, launched a project designed to update and improve the Museum’s existing video surveillance system. The process culminated in the selection of VIVOTEK’s valued partner, A.S. Security & Surveillance, Inc., a systems integration company headquartered in Southern Ontario that specializes in various residential, commercial, industrial and corporate security surveillance system installations. New VIVOTEK surveillance system The new video surveillance system features sixteen VIVOTEK Network cameras including a 32-channel Network Video Recorder, ND9541. VIVOTEK’s IB836B-HT Bullet Network camera was installed throughout the premises with its 2-Megapixel full HD sensor enabling smooth viewing resolution, capable of capturing high quality and high-resolution video with WDR and SNV technology, regardless of high contrast or low light environments. IB836B-HT is equipped with built-in IR illuminators up to 30 metres for superior image quality 24 hours a day and can withstand inclement weather and the IP66 and IK10-rated housing protects the unit against acts of vandalism, making these units a great selection for installation throughout the Canadian Heritage Warplane Museum. VIVOTEK’s PoE switch – IP surveillance Apart from the VIVOTEK cameras being used in the installation process, the ND9541, H.26 network video recorder equipped for up to 32-Channel network cameras with 4 hard drives offered ample storage space and AW-GEV-264-370, VivoCam Layer 2+ Managed PoE Switch provided extra power for all cameras used. VIVOTEK’s PoE switch enables IP surveillance management functions by not only being a standard Layer 2+ PoE switch, but also enabling set up and configuration of VIVOTEK IP cameras, NVR and CMS. Due to the building structure, AP-FXC-0210 was needed to extend the range for two cameras located indoors. The indoor PoE extender allows a daisy-chain installation with up to a 300M installation.
Whoever honours the homeland Switzerland visits this museum: The Landesmuseum Zurich. A huge medieval castle, it lies in the turbulent heart of the city. The values and history of the country that are preserved by the museum deserve the utmost protection. This is ensured by the security personnel at the front desk. The renovation of the museum (from 2013 to 2016) included a new security loggia. The goal was to ease the control and monitoring of all security systems and building technology from two desk positions, each with four / ten monitors, using a single multifunctional keyboard per desk. The solution integrated some seven different functions: Access control, management systems, video surveillance with 130 cameras, a legacy workplace from the old security counter, some pre-existing WEYTEC components and two IT system rooms. The goal was to enable the security staff to provide enhanced security in a more effective and intuitive manner. A turnkey solution and a migration plan without interruption to ongoing operations were further requirements. WEY Distribution Platform bundles and distributes KVM signals A WEY Distribution Platform bundles and distributes KVM signals between the equipment in the system rooms and the security desk. The staff, located at the security desk, controls and steers all the networked sources and monitoring functions using WEYTEC SMARTtouch keyboards. Video images and other information can be switched to and displayed on the monitors with the touch of a button. The security staff has a 24/7 view of the entire museum in real time. They also manage access control, alarms and much more. Non-disruptive migration to new systemWEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia One of the biggest challenges was to ensure a non-disruptive migration to the new system. The Landesmuseum remained open and was monitored continuously during the renovation and installation work. After weeks of preparation and meticulous coordination between installation technicians, the change over was completed within one day. The old security counter remained fully functional at first. Meanwhile, the two security desks in the new loggia were configured, linked to existing and new systems and finally put into operation. WEYTEC solutions do not require any software or driver installations. They use KVM signal transmission that connects computer interfaces to KVM switches and works independently of hardware platforms and operating systems. The concept is compatible with almost any established IT infrastructure and can be implemented during ongoing operations. Thus, WEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia. Security operator responsibilities Security operators at the Landesmuseum are responsible for a multitude of tasks. Among other things, they track images from 130 video cameras that monitor 6,100 sqm of exhibition space. They oversee movement and intrusion sensors, fire detectors and elevators. They control lighting, window shades and air-conditioning systems. All alarms must be processed immediately. The operators are also responsible for access control. They issue badges when someone needs to enter secure rooms. They keep track of the opening and closing of doors. The WEYTEC SMARTtouch keyboards facilitate multitasking. They store central functions, workflows and alarm processes that are immediately available per click. Screen layouts can be arranged and re-arranged efficiently. The security personnel always have the overview of surveillance cameras, management systems and all other sources, data and applications. Remote system rooms eliminate computers under desks Remote system rooms eliminate computers under desks. WEYTEC recommends this solution for every control room, including the security desk in the Landesmusuem. System rooms provide a protected, air-conditioned and easy-to-maintain environment as well as room for growth. With the WEY Distribution Platform, remote computers are operated latency-free over long distances, while a single keyboard operates any number of machines. The KVM signals are transmitted via Ethernet. The Landesmuseum maintains two system rooms. One hosts security systems and video system clients, the other facilities management, access control and office IT systems. WEYTEC seamlessly integrates new and existing equipment in both rooms into the solution infrastructure. The systems are connected to the KVM switch matrix via IP Remote transmitters located in one of the system rooms. From there, the signals are routed via IP Remote receivers to the desks and screens. Landesmseum Zürich, Château de Prangins, Swiss History Schwyz united under Swiss National Museum Three museums, the Landesmseum Zürich, the Château de Prangins and the Forum of Swiss History Schwyz are united under the Swiss National Museum umbrella organisation. The museums present Swiss history from its beginnings to the present day, and explore Swiss identity and the diversity of the country's history and culture.Using a single keyboard to operate all seven of our systems simplifies our work enormously" The Landesmuseum is located in the heart of Zurich. The museum management describes the building as an "ensemble of a fine old historical building and a new sculptural wing". The edifice was first built in 1898 by the architect Gustav Gull, a pupil of Gottfried Semper. Gull drew upon a variety of historical architectural elements from the late Middle Ages to modern times and brought them together to form a whole.Everything runs more efficiently, faster and we have a better overview" Due to a shortage of space, the Landesmuseum was expanded for the first time from 2013 to 2016. The new wing, designed by the Swiss architects Christ & Gantenbein and opened in 2016, complements Gustav Gull's building. It houses flexible exhibition halls, a modern library and an auditorium for public events. Equipped by WEY Technology, the museum's new security loggia is located at the juncture between the old and new buildings. Operating seven security systems “Using a single keyboard to operate all seven of our systems simplifies our work enormously. Everything runs more efficiently, faster and we have a better overview. We are very satisfied", said Heinz Baumann, Head of the Security Loggia Landesmuseum Zürich. Mr. Baumann also confirms: A decisive advantage of the WEYTEC solution was its trouble-free implementation with the existing security systems. The head of the security desk at the Landesmuseum Zurich recommends that other museums use WEY Technology control room solutions.
The Musical Instrument Museum (MIM) in Phoenix, Arizona, hosts more than 300,000 guests each year to view its collection of more than 13,000 instruments and associated objects, and to attend live performances in the MIM Music Theater. As the world’s only global musical instrument museum, MIM creates an exciting experience for guests, immersing them in cultural traditions from around the world. With a mission to collect, preserve, and make accessible an astonishing variety of musical instruments and performance videos from every country in the world, MIM offers guests a welcoming and fun experience throughout the day with multiple live evening performances each week. The safety and security of visitors and staff and the protection of the museum’s extensive collection is an essential aspect of fulfilling its mission. The safety and security of visitors and staff is an essential aspect of fulfilling the museum's mission To enhance the security of its exterior spaces, the museum recently worked with IES Communications, a nationwide provider of integrated security solutions, to upgrade its outdoor surveillance system. Now, a combination of Bosch AUTODOME IP starlight 7000 HD, FLEXIDOME IP starlight 6000 VR, and AUTODOME IP 5000 IR cameras provide high-quality images of the museum’s outdoor areas, which include an impressive courtyard at the main entrance, an additional courtyard at the student entry, an outdoor café and seating area for guests, as well as special events, and two parking lots. Full-colour night images Bosch cameras with starlight technology provide clear images regardless of lighting conditions, delivering full-colour images in the dark beyond the point where other cameras turn to monochrome images. Supported by new exterior LED lights, the Bosch starlight cameras at the museum produce full-colour images throughout the night. The intelligent cameras also feature built-in video analytics to alert the museum’s security operators to possible risks, such as detecting objects left behind or the gathering of large crowds that may create congestion in an area. With Intelligent Tracking, AUTODOME IP starlight 7000 HD cameras can also automatically track objects of interest as they move throughout a scene. “The low light performance of the Bosch starlight cameras is completely unmatched. They are producing beautiful colour images all through the night,” said David Burger, security manager at the Musical Instrument Museum. The cameras also feature built-in video analytics to alert the museum’s security operators to possible risks, such as detecting objects left behind In addition, Bosch AUTODOME IP 5000 IR cameras are strategically placed in perimeter and other areas of the museum exterior where there is limited lighting at night. These pan-tilt-zoom cameras feature a built-in intelligent IR beam that ensures optimum illumination of objects regardless of the level of zoom. “The quality of the images, the onboard video analytics that are included without an additional cost, and the reliability of the moving cameras were key factors in our decision,” continued Burger. “Our security operators are thrilled with the quality and operation of the cameras.” Long distance data delivery One challenge with the installation was how to deliver data from the security cameras over long distances, between remote locations and the head-end network switches and servers. After receiving recommendations from IES Communications and Bosch, the museum selected Altronix’s PaceTM Long-Range Ethernet Solutions. Utilising a Pace8PRM multi-port receiver at the headend, along with Pace1ST transceivers at each device, the museum successfully deployed the Bosch high-resolution IP cameras beyond the standard Ethernet range of 100 meters. Using existing CAT6 cable, Pace transmits Ethernet data at 100Mbps at distances of up to 500 metres, which exceeded the museum‘s requirements.The design of the solutions are rugged enough to handle the intense heat and other weather conditions With the Altronix Pace solution, the museum did not need to replace existing cabling, which delivered a cost savings for the overall project without sacrificing performance. It also provided a higher return on the museum’s initial infrastructure investment. “We are definitely pleased with the ease of use of the Altronix Pace system,” Burger said. “It’s a completely plug-and-play system. It works great with all of our existing network equipment and infrastructure. It was pretty seamless for us to achieve integration with the new Bosch cameras.” Real-time video monitoring In addition, said Burger, the design of the Altronix Pace solution is rugged enough to handle the intense heat and other weather conditions related to Arizona’s weather and climate. “It speaks to the quality of the manufacturers: both Altronix and Bosch,” added Burger. Video throughout the exterior and interior of the museum is monitored around the clock by utilising Security Center from Genetec. Real-time monitoring allows museum staff to proactively address possible risks, as they are happening, to enhance overall security and safety at the museum.
Porto is home to one of Portugal’s most important art and architecture foundations, the Serralves Foundation, which governs the Serralves Museum of Contemporary Art and Serralves Park. Both are National Monuments, Portugal’s most important heritage classification. Managing visitor flow Over the past years, the Serralves Museum has become Portugal’s most popular museum: visitors now exceed 300,000 per year. They are drawn by world-class cultural events – such as a recent exhibition of Spanish artist Joan Miro. Many of the more than 80 works had never before been shown publicly. With such high visitor numbers, the Serralves Foundation searched for support in managing their visitor flow. Administrators wanted to identify high- and low-traffic days, so they could adjust staffing levels and thereby prevent long queues at entrances and dangerous overcrowding of exhibition rooms. Bosch FLEXIDOME cameras Bosch supported the Foundation by installing FLEXIDOME IP panoramic 7000 video cameras inside and outside the museum. Then the cameras were connected to the Bosch Remote Portal. Bosch supported the Foundation by installing FLEXIDOME IP panoramic 7000 video cameras inside and outside the museum The cameras provide a complete 360-degree view of a certain scene without blind spots. Thanks to their build-in video analytics function, the panoramic cameras are enabled to interpret what they see. In this way they not only capture and transmit video images, but they can also transmit associated data, like object type, size, speed and much more. Remote Portal is a software that as a service allows installers to access via the cloud any Bosch IP camera to configure applications, monitor the health status of the camera or set up camera counter reports. Visitor traffic report data Thus, this solution enables the Museum’s administration to count visitors – and report the count in real time. The Remote Portal allows for the creation of visitor traffic reports over a day, a week or several months. All data can be easily exported to other applications. With the help of this information, the Serralves Foundation plans and relocates staffing as well as other resources well in advance. Also, if needed, security guards can avoid the entrance of more people to the Miró Museum. It manages visitor traffic over the course of the year, so all visitors can indulge fully in experiencing fine art – rather than the art of being stuck in a crowd.
"Many disasters have occurred in the world, but few have also provided so much delight for posterity." There probably are no better words to describe Pompeii than Goethe’s during one of his trips to Italy – the area of Pompeii encompasses 440,000 square meters that include the archaeological excavations of the ancient Roman city submerged by the eruption of Mount Vesuvius in 79 AD, frozen in time by the sudden rain of ash and lava rock that preserved it for centuries. In 1997 UNESCO declared Pompeii a World Heritage Site, on account of the fact that the extraordinary findings in the cities of Pompeii, Herculaneum and neighbouring cities buried by the eruption provide a complete and vivid picture of society and daily life that have been preserved nearly intact for two millennia. Presently Pompeii is the flagship of the Pompeii Authority, an Institute of the Ministry of Cultural Heritage and Activities and Tourism provided with special autonomy, which is active in the area of protection, conservation, and public access to cultural heritage sites. The Great Pompeii project: video security needs The need to install a video security system was born of the Great Pompeii project, an undertaking ordered by the Italian Government for the purpose of reinforcing the effectiveness of the conservation actions and programmes in the archaeological area of Pompeii, by developing an extraordinary and urgently needed programme of conservation, prevention, maintenance, and restoration. An important and demanding operation, also in financial terms – €105 million from Fesr and national funding – with the objective of modernising the Pompeii archaeological site, not only by stabilising and restoring decorated walls and surfaces, but also by means of security and leveraging the video security system. Metoda's technical expertise "The reasons underlying theneed to implement a videosecurity system included protection of archaeological findings, to tourist control" The project, supported and accompanied by a suitable scientific and technical study plan for the purposes of identifying, researching the scientific knowledge and guiding the operating choices, called for launching a bid for tenders for a new video security system, which was eventually awarded to Metoda in August 2014. An Italian company in the providing solutions, software projects, and consulting in diverse IT and tele-communications sectors – from mobile payments to building management, including civil protection, security and networking – Metoda employs more than 300 experts, from professionals and specialised technicians involved in the business units dedicated to specific applications, including research and development, which collaborates with prestigious research institutes and universities for many years. "The feather in the cap for Metoda is SOA certification, which was received precisely because of our complex internal organisation and attests to the financial and technical capacity of the firm to qualify for designing and implementing large scale public tenders," explains Cesare Gonnelli, Deputy Manager of Metoda. From "under observation" to "under video surveillance" "The reasons underlying the need to implement a video security system were multifaceted, from protection of the archaeological findings, which are often the object of theft and vandalism, to tourist control," adds Gonnelli. The archaeological site, which may receive up to 15,000 tourists in a single day – a numerical turnout second to only the Coliseum – sends us very frequent reports of graffiti, scratches, and defacing of the walls and frescoes of the Roman Domus villas, which are at the heart of the archaeological site. These acts of vandalism are carried out by tourists with their pens and fingernails when they somehow manage to stay within the walls on purpose even after the site is closed to the public. Furthermore, as a result of the recent terrorist attacks, the Authority evaluated the opportunity of utilizing an advanced video security system in support of the physical surveillance activity of the guards. "In fact one of the priorities was being able to clearly distinguish the face of the people and monitoring behaviour that looked out of place inside the area, as well as any objects left behind and considered potentially suspicious," continues Gonnelli. MOBOTIX video surveillance solution Cameras were installed on light posts along the perimeter, and on the walls of the Roman Domus villas Partnering with MOBOTIX since 2011, Metoda had no doubt about the best product to offer to the Pompeii Authority for implementing the video surveillance project. "MOBOTIX easily satisfied the requirements of the bid for tenders, and was in fact the only technology truly capable of providing an answer to the actual requirements of the Authority. A resounding victory, most of all because of the quality of the images, which completely surpassed all the expectations of the customer.". The installation of the first video cameras – almost all of them D15, with the exception of about ten D25 chosen to blend with the architecture and style – started in July 2015, but already in December Pompeii was under surveillance by 240 video cameras, with the objective of reaching more than 380 before the end of the summer, installed both on the light posts placed both along the perimeter of the archaeological site, and on the internal and external walls of the Roman Domus villas. In any event, the video security system is a much more complex IT and telecommunications project, as it required the implementation of a complex network support infrastructure (12 fibre optic rings and 88 nodes) thanks to the strong expertise of Metoda in networking, with a department specifically dedicated to software development and the integration of IT and telecommunication systems. Event-activated video surveillance The video cameras are in operation 24 hours a day, but with the exception of special particular requirements, are only event-activated, in order not to overload the storage, notwithstanding the 700-TB NAS archive system. The recordings can later be viewed on nine 42-inch monitors in a dedicated control room provided with four workstations dedicated for the monitoring personnel. The cameras are event-activated, in order not to overload the storage, notwithstanding the 700-TB NAS archive system No issues were encountered during neither the installation phases nor the deployment of the system, thanks also to the technical expertise of Metoda. "Likewise, no complaints from the personnel in charge of using the system (for the time being the same guards at the park), who received a minimum amount of training, but certainly cannot be called ‘expert’ in the utilisation of advanced technology systems. The ease of use of MOBOTIX solutions certainly gave us an advantage in the quick deployment of the project," concludes Gonnelli. High image quality As in most of the projects implemented by MOBOTIX, the praise should also be attributed in this case to the excellent quality of the images, which cannot be compared – also according to Metoda – to any other system available in the market. Certainly the decentralised concept of MOBOTIX played an important role in promoting all the virtues of the system, especially because of the number of video cameras involved, which prevents overloading the network under "critical" utilisation conditions. Both Metoda’s and the end user’s needs have been satisfied – a fact only confirmed by the idea that considerations are being made to implement a video analysis system to support the anti-graffiti activities, with the objective of studying behaviours considered "suspicious." As such, they could prevent acts of vandalism that could cause irreparable damage to the artistic and cultural heritage.
The municipal council of Odense, Denmark’s third biggest city, uses Vanderbilt’s SPC Connect to help monitor and maintain public buildings such as schools, libraries, museums, gyms, housing, and government offices. Remote and instant access Due to the number of buildings under their authority, the municipality of Odense needed a security solution that would provide remote and instant access to deal with potential alarms from any location, at any time. For example, a janitor in charge of maintaining several buildings throughout the municipality, could not be in all places at once should an alarm trigger. Or, if an alarm triggered in the middle of the night, the team leader at a government office might have to leave their bed and drive into the workplace to investigate. SPC Connect is helping to solve this problem. Vanderbilt's SPC currently protects 36 buildings in the municipality of Odense. Therefore, upgrading to SPC Connect was a natural progression for the municipal council. SPC Connect SPC Connect is a cloud-based service that can be used by installers or end system users to access their SPC systems securely. The SPC panel and Connect communicate using FlexC. This is a powerful protocol and can be used to support multiple paths such as Ethernet, GRPS, and 3G. This ensures the system is always connected.SPC Connect is a cloud-based service that can be used by installers or end system users to access their SPC systems securely With SPC Connect, the municipality of Odense’s end users are benefiting greatly from the SPC Connect app. This can be downloaded free of charge from the Apple App Store or Google Play. The app provides them with an interface that contributes clearer arming and status information and allows for remotely carrying out tasks such as controlling doors, setting or unsetting an alarm, or isolating a zone. This instant and remote access to any potential alarms helps save a huge amount of time for those involved in maintaining the system. For example, say a caretaker oversees maintenance for a dozen or so buildings, and an alarm is triggered in one of the buildings. If he happens to be working on the other side of the town and physically getting to the incident is logistically difficult, all he needs to do is take out his smartphone, access the SPC Connect app, view the event investigate further remotely. Simple as. Real-time security alerts The SPC Connect app allows you to receive real-time security alerts. You can then immediately investigate the issue and act if necessary. When an alarm is triggered, you will receive an email notification to your smartphone and then, with your IP cameras connected to SPC, you can check the live video feed on your smartphone to examine the alert further. It saves a lot of time and money, but it also brings comfort and peace of mind to the end user as well. All the user’s interactions through SPC Connect are secured with financial grade SSL security, giving peace of mind alongside powerful control.