Network cameras
Security dealers are often faced with finding ways to differentiate their companies and add tangible value to the services they provide. Now Connect ONE® dealers can offer expanded reporting and documentation to their customers through SmartTest™, an embedded feature of the award-winning service and management platform from Connected Technologies. SmartTest details all interaction with support documentation on exactly what was performed – so customers know what they are pa...
Hanwha Techwin has announced consultants, system designers and system integrators are now able to specify Wisenet Q series and Wisenet WAVE PoE NVRs supplied with Seagate hard disk drives (HDDs). High-density HDDs “Seagate’s space-efficient, high-density HDDs (hard disk drives) are able to perfectly meet the data storage demands of video surveillance systems and equally important, they have a reputation for being ultra-reliable,” said Uri Guterman, Head of Product & Marke...
Smart R Distribution’s appointment as a full member of the Dahua Dealer Partner Program, provides the opportunity for installers to source Dahua products from the specialist distributor of access control and video surveillance network solutions. Supplier of Dahua IP cameras, NVRs As an authorised reseller, Smart R Distribution will be supplying the entire portfolio of Dahua products, including a comprehensive range of IP security cameras, NVRs (Network Video Recorders) and video manageme...
Check Point Software Technologies Ltd., a provider of cybersecurity solutions globally, launches Check Point Harmony, the first unified solution to enable secure connectivity to any resource anywhere and give total endpoint protection for users on any device. Harmony secures both corporate and BYOD devices, and internet connections from known and zero-day attacks, while giving Zero-Trust access to business applications in a single, easy to manage solution. Securing the new work from anywhere en...
Global MSC Security will debate the ability of artificial intelligence to help Security Managers and Surveillance Camera Operators improve how live incidents are handled. Experts in facial recognition, criminal behaviour will participate in the Developing Smart Surveillance Operators free-to-attend online broadcast on 16th March at 13:00 (GMT). Keynotes will be presented by Dr. Craig Donald, Professor James Ferryman, and Tony Porter QPM LLB, with the broadcast, also featuring an in-depth Q&...
STANLEY Security, one of the UK’s pioneer security providers, launches intelligent maintenance, an innovative cloud-based service designed to keep security systems up and running, for maximum effectiveness at a minimum cost. Intelligent Maintenance is a proactive service that STANLEY Security has introduced to enhance the level of service and maintenance of CCTV and Intruder systems. The new service forms a direct connection with CCTV or Intruder systems to automatically and actively moni...
News
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, has recently unveiled its updated WizSense – a series of AI products and complete end-to-end solutions based on deep learning that focuses on humans and vehicles. It benefits users with intelligent functions, simple configuration and inclusive products. Compared to its previous version, the updated WizSense offers upgraded features that will surely transform regular monitoring to a whole new level. SMD 3.0 The SMD 3.0, an upgraded version of SMD Plus, offers elevated functions that surpassed expectations. Based on standard test scenarios, it can effectively filter out irrelevant targets such as animals, leaves, light, etc., providing an improved detection accuracy rate of 99% for both humans and vehicles. It also offers a longer detection distance of 25 meters (2.8mm fixed focal camera). This amazing feature is currently available on IPC, with plans to expand on different product lines in the future. Active Deterrence function The Active Deterrence function allows the device to deter and warn off intruders in time to avoid incidents The Active Deterrence function allows the device to deter and warn off intruders in time to avoid incidents from happening. It generates real-time push notification that shows the trigger type (human or vehicle) and enables users to easily verify alarms through captured videos. In addition, it is also equipped with a built-in mic, siren and warning light. Compared to the traditional white light of the previous version, WizSense products now offer a striking red and blue light that flashes when a target has been detected. Time-Sharing Monitoring Furthermore, the updated WizSense also includes the Time-Sharing Monitoring function, which allows users to preset positions of the camera based on time tasks to monitor different areas during different periods. In a retail shop scenario, for example, a PTZ camera (e.g., PTZ SD3A series) can actively monitor the main area of the establishment, during day time and automatically switch to the entrance, during non-business hours. When the alarm has been triggered, it will then warn off intruders using its Active Deterrence function. Two-way talk & customisable alert voice audio Similar to the previous version, the updated WizSense also features a two-way talk function that allows users to communicate with the detected target through the DMSS app or PC client. It also allows users to create ten-second customised voice audio, which can be used as greetings, reminders, warnings, etc., when a target has been detected by the camera. This function is a newly added feature and one of the highlights of this product update. Through the DMSS mobile app or NVR/XVR UI, users can activate both the siren and warning light of the camera at the same time with just a single click of a button, providing great convenience and ease of use. Updated WizSense Its perimeter protection feature allows users to draw tripwire or intrusion rules on the monitored scene The updated WizSense carries out intelligent functions from the previous version. Its perimeter protection feature allows users to draw tripwire or intrusion rules on the monitored scene, which automatically sends alarm push notifications to users once triggered. It also offers Face Recognition with up to 95% accuracy and <1s recognition speed. After an event, users can utilise the Image Search and Face Attribute Search functions to locate the person of interest quickly without the need to review massive amounts of video footage. Moreover, based on CBR (Constant Bit Rate), its AI Coding dynamically allocates bit rate, providing clear target images while saving more than 50% bandwidth and storage space compared with H.265. It also does not lose its compatibility when integrated with third-party players or platforms. Intelligent monitoring solution Furthermore, with Dahua Technology’s ISO/IEC 27701 standards certification from British Standards Institution (BSI), WizSense complies with the requirements of ISO/IEC 27701:2019 in privacy protection. Featuring the aforementioned functions, the updated WizSense can be deployed in a wide range of application scenarios such as private villas, retail shops, industrial parks, fish farms, etc., making it an ideal monitoring solution that offers intelligence, simplicity, and inclusivity to customers. With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’ to better serve its partners and customers around the world.
Acronis, a pioneer in cyber protection, and Williams Racing announce the renewal of their technology partnership, extending the areas of cooperation and driving the adoption of award-winning cyber protection technology across the entire Williams Racing IT infrastructure. As part of the Official Cyber Protection partnership, Williams Racing will continue the use of Acronis Cyber Protect across their IT infrastructure. The innovative solution, used by elite sports teams around the world, integrates fast and reliable backup, AI-powered anti-malware and antivirus, and comprehensive endpoint management, all managed from a single interface. Unique cyber protection Unique cyber protection approach eliminates the complexity and makes it simple for teams to manage workloads The unique cyber protection approach eliminates the complexity and makes it simple for teams to manage and monitor workloads, data, applications, and systems across an entire network. “Acronis Cyber Protection encompasses all areas of workload protection, simplifies data management, and prevents cyberattacks. It’s a constantly changing environment. To have a technology partner whose technology meets the modern-day needs and leads the market is critical for our team to regain competitive advantage,” said Graeme Hackland, Williams Racing Chief Information Officer. During the last year, more than 15 new teams partnered with Acronis, pushing the total number of sports teams in the Acronis #CyberFit Sports portfolio to over 50. San Diego Padres, Washington Football Team, Atlético de Madrid, TOYOTA GAZOO Racing, Roborace, Airspeeder, and many other teams chose Acronis to protect their edge. Keeping data tamper-free “Acronis technology is designed to address the safety, accessibility, privacy, authenticity, and security (SAPAS) challenges of modern organisations – at the highest levels of business and competitive sport. This design methodology ensures the highest calibre of cyber protection for all workloads, data, applications, and systems, keeping data tamper-free and easily accessible for smooth day-to-day operations. Data is critical in Formula One and we are proud of being part of Williams Racing’s journey,” said Jan-Jaap Jager, Acronis Chief Operating Officer. Acronis is also proud to announce that its #CyberFit Sports programme is now open to managed service providers (MSPs) who are invited to deliver Acronis Cyber Protection solutions to world-class sports properties on behalf of Acronis and enjoy a rich world of sports benefits and brand exposure.
Following the outbreak of COVID-19 and the pandemic everyone is living through, the uptake in touchless access control which was previously gaining in popularity has been accelerated driving digital transformation across many industries and technologies. Among these is the rapid growth of mobile and cloud-based systems that make access control a simple and secure solution for businesses to manage keys, users, and doors across multiple locations, simply and conveniently. SALTO Systems, which has been delivering state-of-the-art wire-free and keyless electronic access control solutions since 2001, is acknowledged as a pioneer in the manufacture of these electronic access control solutions. Access control products But with that convenience can come risk and security vulnerabilities for the unwary which is why it’s important to consider that as access control products – both hardware and software - become increasingly attached to networks and other smart systems via the Internet of Things (IoT) cybersecurity needs to be front and centre if it is not to provide a pathway for cyber criminals and hackers. Smart devices commonly use wireless transmission of information often referred to as OTA to deliver software Smart devices commonly use wireless transmission of information often referred to as over-the-air (OTA) to deliver software, firmware, or configuration updates. This can include the use and configuration of security devices for use on networks using NFC, BLE, and RFID. To avoid security breaches and unauthorised attempts to access or unlock data, manufacturers should encrypt and authenticate OTA data and updates and deliver them to end-users via a secure protocol. Secure opening procedure When it comes to mobile technology and the use of ‘virtual’ keys sent to smartphones, one way to do this is to use AES 128 bit encryption which helps prevent skimming, eavesdropping, and replay attacks and a secure opening procedure with the key received securely encrypted using SSL. Another is to ensure products are certified to BSI Enhanced Level IoT Kitemark™ standard which demonstrates that a connected product has a higher level of security controls in place than the market standard for its type and is generally suitable for higher value or risk applications. Assessment to this level involves BSI’s most in-depth and exacting testing and analysis. SALTO has always applied the highest security standards to both its hardware and software products which is why its access control solution was among the first from any major security manufacturer to hold both ‘Secured by Design ‘accreditation and IoT Enhanced Kitemark™ status. Eliminating security flaws Its XS4 electronic escutcheon family, as well as its associated gateways, controllers and wall readers, are all Enhanced Level IoT Kitemark™ approved under the scheme as is the NEO electronic cylinder family and its tough new NEOxx electronic padlock product. Some manufacturers do not invest enough in eliminating potential security flaws from their systems" SALTO Systems Limited MD, Ramesh Gurdev says: “New security challenges will confront us as technologies accelerate and it’s important to stay ahead of the curve. Some manufacturers do not invest enough in eliminating potential security flaws from their systems, and this can be common in many entry level access products imported from Asia and elsewhere. At SALTO we’re driven by continuous improvement and committed to developing the most technologically advanced and flexible electronic locking solutions for any kind of door and user need.” Access control technology “Now we are synonymous with innovative solutions that set new standards in security, manageability, flexibility, and design that bring real-world benefits and this continues to set us apart. More recently, SALTO’s technological expertise has brought us to a leading position in both cloud-based access control technology and mobile access solutions.” “We’re proud that our NEO cylinder family now holds both ‘Secured by Design’ accreditation and Enhanced Level IoT Kitemark™ status as both are increasingly important in the specification of access control systems. Such awards mean we exceed the market standard for a number of security products across our access range which provides SALTO customers with the confidence that they are using some of the most technologically advanced and secure products available on the market today.”
Alarm.com is connecting your car and home through its integrated security platform to help people stay informed about their vehicle’s status and unlock more home automation capabilities. Alarm.com Connected Car, developed in collaboration with vehicle telematics solutions pioneer CalAmp, offers all the benefits of a vehicle monitoring solution plus the unique benefit of deep integration with the Alarm.com smart home security system. Vehicle insights, notifications and home automation features are all accessible through one interface – the Alarm.com mobile app. “We’re excited to extend the technology and benefits of Alarm.com to include cars,” said Alarm.com Chief Product Officer Dan Kerzner. “Connected Car, like the rest of our offering, helps people monitor and manage the things they care about most on a unified platform with a seamless user experience. Adding cars is another step forward in our ongoing commitment to helping our partners improve the lives and safety of their customers.” About Connected Car Compatible with most cars manufactured since 1996, the Connected Car device plugs into a vehicle’s OBD-II port for easy self-installation, reducing the need for costly truck rolls to add the device. Connected Car uses a dedicated cellular connection and has a battery backup, so it communicates with the home system and end-user, even when the vehicle’s engine is off. With CalAmp’s telematics technology integrated with the solution, users can create rules so they receive Alarm.com notifications about specific vehicle details or activity, such as: Diagnostics and potential repairs (check engine light on, low battery or low fuel) Driving Behavior (sudden acceleration, hard braking, excessive speeding) Unexpected Movement (vehicle moves while the engine is off, indicating it may have been towed, crashed into, or stolen) Automated rules and reminders Connected Car trigger automation rules and reminders via user’s existing Alarm.com-powered smart home security system Vehicles with Connected Car installed can be added to a user’s existing Alarm.com-powered smart home security system to trigger automation rules and reminders using the vehicle’s location. For example, lights turn on and the temperature adjusts as a driver arrives home. Or, alerts are sent to a driver’s mobile device if they leave without closing the garage door or locking the front door of their home. Authority Statements “I love having my home and car connected through one system and the consistency of Connected Car,” said Taylor Proudfit, COO at Titan Alarm in Phoenix, Ariz. “It's always on and works really well with the Z-Wave rules that I created to turn on the lights when my car pulls into the driveway. This takes security technology to a whole different level.” “We are very excited to be partnering with Alarm.com,” said Jeff Gardner, President and CEO of CalAmp. “By integrating CalAmp’s innovative telematics technology, Alarm.com customers now have seamless access to real-time information that will improve driver safety, enhance vehicle security and allow customers to stay on top of vehicle maintenance needs.” Connected Car is available through authorised Alarm.com service providers in the U.S. and Canada as a standalone solution or add-on to an existing Alarm.com-powered system.
Quantum Corporation announces that its StorNext® File System is the fastest file system for video workloads. In testing using the independent SPEC SFS 2014 benchmark, the StorNext 7 system outperformed all other file systems across all three performance metrics, using a reference architecture with 57% fewer storage nodes than the next nearest vendor and at a much lower cost per concurrent stream. These results demonstrate that StorNext provides the best performance and best value for any workload that requires massive streaming performance with a large number of concurrent users or processes. Video surveillance capture Use cases in media and entertainment, video surveillance capture and retention, and earth and life sciences with large digital image files can all benefit from the streaming performance and data lifecycle management of the StorNext system. The SPEC SFS 2014 SP2 Video Data Application (VDA) test, which is designed to simulate a high-performance video-based workload at scale, was conducted on the StorNext File System and Quantum F-Series NVMe storage servers. The Quantum StorNext system set new performance records for: The highest aggregate throughput (34,391 MB/sec) The lowest latency (0.9 milliseconds overall response time) The highest number of concurrent streams (7,450 streams) Performance storage systems StorNext is well positioned to help enterprises ingest, process, and manage this type of data across its lifecycle" “Video creation is growing exponentially across all industries — whether for entertainment, marketing, communications, training, or surveillance — and customers require extremely high-performance storage systems to ingest and process their video content,” said Brian Pawlowski, Chief Development Officer, Quantum. “These test results clearly demonstrate that StorNext is the fastest file system on the planet for video workloads. And thanks to the architecture of the StorNext File System, it achieved these record-breaking results with substantially less hardware than the nearest competitor.” “The record-setting results in this SPEC SFS testing validate the StorNext system’s performance leadership for video and other large file workloads,” said Eric Burgener, Research Vice President, Infrastructure Systems, Platforms and Technologies Group, IDC. “And since explosive growth of this type of data is occurring across many industries, StorNext is well positioned to help enterprises ingest, process, and manage this type of data across its lifecycle.” Endorsing standardised benchmarks The reference architecture uses generally available products, configured as a single StorNext 7 File System running on Quantum Xcellis® appliances, with 10 Quantum F-Series NVMe storage servers. The StorNext File System was connected to clients via iSER (iSCSI Extensions for RDMA) over a 100GbE dual network, with an additional 1GbE network for metadata and administration. Full details of the architecture used are publicly available on the SPEC website. The Standard Performance Evaluation Corporation (SPEC) is a non-profit corporation formed to establish, maintain and endorse standardised benchmarks and tools to evaluate performance and energy efficiency for the newest generation of computing systems. SPEC develops benchmark suites and also reviews and publishes submitted results from its member organisations and other benchmark licensees.
Altronix, the globally recognised company in power and data transmission solutions for the professional security industry, has announced that its award-winning Tango PoE Driven Power Supply/Chargers are now UL 294 listed for access control applications. This reaffirms the high quality and performance of Tango solutions that end-users, architects and security consultants demand for mission critical access control applications. Tango PoE Driven Power Supply/Chargers Tango leverages low-voltage installation methods, eliminating the need for an electrician and dedicated conduit and wire runs. This unique solution delivers 12VDC and 24VDC simultaneously from any 802.3bt PoE source up to 90W such as Altronix NetWay injectors. When combined with Altronix stackable sub-assemblies, Tango can support up to 8 locking devices with power for controllers and ancillary devices. A single Lithium Iron Phosphate battery (LiFePO4) provides backup for 12VDC and/or 24VDC systems, adding to the systems ROI. Plug-and-play option to deploy access control UL 294 listed for access control, Tango is documented to operate with the highest levels of reliability and safety" “Tango provides system designers and installers with a cost-effective and efficient means to power access control and security devices by employing the latest PoE technology,” said Ronnie Pennington, National Sales Engineer, Altronix Corporation. Ronnie adds, “Now UL 294 listed for access control, Tango is documented to operate with the highest levels of reliability and safety, providing a plug-and-play option for deploying access control systems.” Flexible to accommodate Altronix sub-assemblies The Tango Series is available in myriad configurations to meet a wide variety of system applications. All models are equipped with LiFePO4 (Lithium Iron Phosphate) battery backup. Tango solutions are flexible to accommodate Altronix sub-assemblies, including the Altronix PDS8 Dual Input Power Distribution Modules that distribute 12VDC and/or 24VDC over a total of eight (8) fuse or PTC protected selectable outputs and Altronix ACMS8 Dual Input Access Power Controllers that distribute power over a total of eight (8) fuse or PTC protected Fail-Safe, and/or Fail-Secured relayed outputs. Additionally, network versions of these boards with embedded remote power management. Altronix products are manufactured in the U.S.A. and backed by a lifetime warranty.


Expert commentary
For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown, organised, sometimes armed, gangs moved into its crumbling stations to steal the valuable copper from the lines. Now, more than two months after that lockdown ended, the commuter rail system, relied on by millions of commuters, is barely operational.” Private security firm Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa. In 2001, SABC TV broadcast a story following two members of a private security firm working for Telkom, a major telecoms provider. In the segment, the two guards, working in Amanzimtoti on the south coast of KwaZulu-Natal, head out to investigate a nearby alarm that has been triggered. They reach a telecoms cabinet and discover that it has been compromised, with the copper cable cut and telephone handsets strewn across the ground. In the dark, they continue to search the area when one of the guards discovers the problem: 500 metres of copper wire has been ripped out. In their haste, the thieves have dropped their loot and fled. Widespread cable theft Had they managed to get away, they would have melted the cable to remove the plastic insulation and sold the copper to a local scrap dealer for around 900 Rand, about $50 US dollars. For the company whose infrastructure has been compromised, it may cost ten times that amount to replace and repair the critical infrastructure. The disappointing takeaway from this story is that two decades on from this incident the country still faces widespread cable theft, whether it’s copper cables from mines, pipelines, railways, telecoms or electrical utilities. In fact, the South African Chamber of Commerce and Industry estimates that cable theft costs the economy between R5–7 billion a year. The answer to the problem must go further than the existing measures used by companies. Detect power failure Most businesses already invest in CCTV, fences, barriers and even patrol guards, but this is not enough. Take the mining sector, for example. These sites can be vast, spanning dozens of kilometres - it’s simply not cost effective to install enough fences or employ enough guards or camera operators. As monitoring technology gets better, the company has seen site managers increasingly use cable alarms in recent years that detect when a power failure occurs. The idea is that, if one can detect a power failure, they can detect whether the cable has been cut The idea is that, if one can detect a power failure, they can detect whether the cable has been cut. The problem is though: how does one distinguish the difference between a situation where a cable has been cut intentionally and a genuine power outage? Power outages in South Africa are an ongoing problem, with the country contending with an energy deficit since late 2005, leading to around 6,000 MW of power cuts in 2019. Remote terminal units Eskom Holdings SOC Ltd., the company that generates around 95 per cent of South Africa’s power has already warned of further blackouts as the company works to carry out repairs to its power plants. According to a statement on the company’s website, “Eskom spends in the region of R2 billion a year replacing stolen copper cables." The result is that criminals take advantage of the gaps in power to steal cable, timing their robberies to coincide with the published load shedding schedules. The basic alarms used to detect power outage won’t recognise the theft because they register a false-positive during a power cut. By the time the power comes back on, the deed has been done and the criminals have gotten away with the cable. The good news is that recent breakthroughs in cable monitoring technology are helping tackle just this problem. New alarms on the market now combine sophisticated GSM-based monitoring systems that use battery powered remote terminal units. Legitimate supply chain Unlike the basic alarms that look for the presence or absence of power, these new systems monitor whether the cable circuit is in an open or closed state. In the event of a power outage, the unit continues to run on battery power and can detect if a cable has been cut, sending a priority SMS alert to the site manager immediately, giving them a fighting chance to prevent a robbery in progress. Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem across the supply chain in South Africa. In recent years, the combination of unscrupulous scrap dealers, the alleged involvement of large scrap processing companies and lax penalties meant that much of the stolen copper ended up back in the legitimate supply chain. However, recent changes in the law have sought to take a tougher stance on copper theft. Alarm monitoring technology According to the Western Cape Government, “The Criminal Matters Amendment Act, regulates bail and imposes minimum offences for essential infrastructure-related offences." The act, which came into effect in 2018, recommends sentencing for cable theft, with the minimum sentence for first-time offenders being three years and for those who are involved in instigating or causing damage to infrastructure, the maximum sentence is thirty years. It seems to be working too. In January 2021, the South African reported that a Johannesburg man was sentenced to eight years behind bars for cable theft in Turffontein. While the longer-term outlook is a positive one for industry, the best advice for businesses seeking to alleviate the problem of cable theft in the immediate future is to invest in the latest cable-theft alarm monitoring technology to tackle the problem and make life difficult for criminals.
Supermarket employees have been the hidden key workers of the past year, keeping shelves stocked and queues under control as panic buying gripped the nation. As a result of being expected to enforce face covering and social distancing regulations, they also been asked to act as de-facto security guards alongside their existing duties. This is problematic as many employees have never had to deal with this kind of responsibility before, let alone received any conflict de-escalation training. In order to maintain the safety and security of their staff retailers must take additional steps to uphold their duty of care, with the NPCC recently specifying that it is the responsibility of retailers ‘to manage entry to their stores and compliance with the law while customers are inside’. Supermarkets in particular need to be aware of this requirement, as the big four recently announced that their employees would now be challenging customers shopping in groups and those not wearing masks. Verbal abuse from the public Crime against retail employees has already been a major issue over the course of the pandemic, confirmed by research from the Union of Shop, Distributive and Allied Workers that found 90% of retail staff in the UK experienced verbal abuse last year. The Co-op has recently been vocal about the effects of the pandemic and lockdown-related frustrations on its employees.90% of retail staff in the UK experienced verbal abuse last year The supermarket reported a 140% increase in crime within its stores over the past year, with many of the 200,000 cases related to verbal and physical abuse experienced by employees. Jo Whitfield, Co-op Food chief executive, confirmed that the number of issues has already increased drastically as a result of staff enforcing COVID-secure guidelines. So, what steps must retailers take to ensure their duty of care remains intact as employees take on new enforcement responsibilities? Introducing real-time surveillance technology to support security guards and shop floor employees alike is vital. Bolstering front line defences Security guards posted at supermarket entrances are the first line of defence against shoppers determined to break the rules. However, they are now being pulled in multiple directions with queues to monitor and occupancy to manually keep track of, along with the usual security alarms to respond to. With one person usually posted at the entrance at any one time it’s simply impossible to have eyes everywhere, which is where automated video surveillance comes in. COVID-specific technologies, such as mask detection and occupancy management systems, are now the golden bullet to retail safety and security.Mask detection and occupancy management surveillance tools can automatically alert a shopper Mask detection and occupancy management surveillance tools can automatically alert a shopper whether or not they are allowed to enter the store on their approach to the door. The system surveys the person and a screen will automatically display different instructions depending on the situation: whether they must put a mask on before they enter, wait until capacity is low enough to enable social distancing or, if the previous criteria are fulfilled, that they are free to enter. COVID-secure safety This stand-off technology minimises the need for contact between security personnel and shoppers, allowing security guards to complete their usual duties, safe in the knowledge that the store is being managed in a COVID-secure way. With a hands-off approach enabled by surveillance technology, the potential for tense confrontation is greatly diminished as customers will usually comply to the reminder shown to them and put on a mask or wait without further prompting from staff. With security personnel able to better focus their attention on the stubborn rule-breakers,It is crucial that retailers choose a solution embedded in real-time connectivity this responsibility will no longer land with staff on the shop floor who are often ill-equipped to deal with this situation. It is crucial that retailers choose a solution embedded in real-time connectivity that will allow all store entrances to be screened simultaneously. Nobody can be in multiple places at once, but this connectivity allows alerts to be streamed instantly to any connected device that can be monitored by just one employee, meaning they can review the alerts that require their attention without needing to be physically present or re-tasked away from their day-to-day duties. Instant reassurance with body worn tech As a customer-facing role, there can be no guarantee that shop workers will never experience a potentially violent confrontation with a customer, which is where the presence of live streaming body worn cameras can help. While they may not always be trained to de-escalate a risky situation, being able to discreetly call for assistance can provide the reassurance employees need to feel safe and supported at all times. If an employee asks a customer to put a mask on while they’re in the store or step back from another shopper and the situation turns abusive – verbally or physically – a live streaming-enabled body worn camera can be triggered to stream a live audio and video feed back to a central control room manned by trained security personnel.A live streaming-enabled body worn camera can be triggered This real-time footage gives security staff exceptional situational awareness, allowing them to fully assess the situation and decide on the best course of action to support the employee in distress, whether that is going to the scene to diffuse the situation or contacting the police in more serious circumstances. Bolstering front line security This goes one step further than record-only body worn cameras, the capabilities of which these next generation devices match and exceed. Record-only cameras are well-suited to provide after-the-fact evidence if a customer interaction turns sour, but they do little to provide reassurance to out of depth employees in the moment. The duty of care grocery retailers must provide to their employees has never been more important, with staff taking on new mask and social distancing enforcement responsibilities and managing interactions with frustrated customers. Bolstering front line security and giving staff extra reassurances with the introduction of real-time video surveillance technology is a crucial step for retailers striving to keep employees and shoppers safe during these challenging times.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organisations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centres or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognise individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analysing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognise. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the centre of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
Security beat
At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorised users. The source of the unauthorised access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasises the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defences have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorised to connect to an organisation's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorised devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organisations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organisations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.” “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul. “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says. Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organisations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organisations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organisations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-life balance In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and travelling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasising both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
Case studies
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced how commercial real estate provider, Westminster Property Ventures has made innovative use of a range of Genetec solutions to make each of its premises safe from COVID-19 virus spread for staff, tenants and visitors. Westminster Property Ventures’ buildings house critical businesses, such as international banks, law firms and consultancies who can be assured that amidst a global pandemic their offices remain highly secure and equipped for their return. Genetec Mission Control The newly introduced processes and technologies make smart use of Westminster Property Ventures’ existing video and access control infrastructure. For example, using the Genetec Mission Control collaborative decision management system, Westminster Property Ventures is collecting and qualifying data from thousands of sensors and security devices, before guiding security operators in their response to routine and unanticipated situations. Among other current and critical capabilities, this helps ensure the seamless transition of out-of-hours monitoring between Westminster PV’s in-house security team and security provider, Wilson James’ monitoring centre, ensuring comprehensive levels of security at all times. “Our clientele continue to expect the highest level of security and service from us whether or not they are currently choosing to work inside our buildings,” said Andrew Forbes-Jones, Facilities Manager, Westminster Property Ventures, adding “We’re grateful to Genetec and Wilson James for keeping us at the forefront of innovation and compliance in all aspects of our security and operations.” Security Center Synergis access control system COVID-19 has created new challenges for Westminster Property Ventures’ security and operations teams in maintaining a secure and safe environment for both home and remote workers, as well as those still working inside the facilities. Using the Genetec Security Center Synergis access control system, Westminster Property Ventures is taking advantage of many COVID-19 specific features, developed over the last year, to help them directly address the challenges of the global pandemic. Synergis Proximity Report Westminster Property Ventures has deployed the Genetec’s ‘Synergis Proximity Report’ Along with the system’s new occupancy management capability, Westminster Property Ventures has deployed Genetec’s ‘Synergis Proximity Report’, first deployed at McCormick Place in Chicago, North America’s largest convention center that was repurposed as a COVID-19 field hospital in spring of 2020. Drawing data from the Synergis access control system, the solution allows Westminster Property Ventures to quickly identify individuals visiting one of their buildings, who may have come in contact with someone known to have tested positive for COVID-19 infection. Efficient protection against COVID-19 virus “I’m constantly impressed by the ability of our partners and end users to adapt quickly to changing requirements and bring the latest innovative solutions online to address them,” said Paul Dodds, Country Manager UK at Genetec, Inc. Paul adds, “Westminster Property Ventures’ rapid response to the challenges of the pandemic mirrors our own and validates our investments in technologies that can help make our workplaces safer, healthier and more secure.”
Domino's Pizza is one of the largest and fastest growing food service company in India with a network of 850+ restaurants in more than 200 cities. The Pizza delivery expert is a renowned provider of the organised pizza market with 70% market share in India. With its most famous half an hour delivery strive, Domino's Pizza marks the importance of communication and time growing towards its vision of exceptional people on a mission to be the best pizza delivery company in the world. Today's retail supply chain executives are moving more products farther and faster than ever before. Communication is a critical parameter when it comes to the Pizza industry as it directly affects, delivery on time, order noting, supply chain relationship and most importantly food management process. In the era of fast life, demanding consumers putting pressure on the supply chain process, Domino's Pizza required all its branches to work in synchronisation managing food delivery on time. Advanced communication system The major challenge was to connect multiple branch offices with headquarters for day-to-day communication. Following it, Domino's Pizza also required 30+ lines as a trunking solution for voice calling at all the branch offices with minimum infrastructure cost. Products And Solutions Offered: Matrix and its channel partner Sun Line Communications Systems worked together and provided an IP enabled PBX solution - ETERNITY GE for all multi-site telephony needs of Domino's Pizza. ETERNITY GE is an advanced communication system offering convenient features and flexible functionalities in line with the changing needs of organisations. The reliable architecture and easy to use platform delivers the unmatched performance to meet the needs of controlling costs and managing operational expenses. ETERNITY GE supports any combination of TDM, IP, GSM PRI trunks and subscribers along with networking of multiple systems across locations. Centralised management of IP-PBX System With IP telephony, Domino's Pizza saves telecom costs by any call placed between head office and branch offices Peer-to-Peer connectivity over IP between IP-PBX at HO and 15+ ETERNITY GE located in branch offices for seamless connectivity. With installation of 15+ ETERNITY GE at branch offices, Matrix connected all the locations with head office over IP to provide seamless integration all over India for Domino's employees for quick connectivity. With IP telephony, Domino's Pizza saves telecom costs by any call placed between head office and branch offices. IP telephony feature of ETERNITY GE provides simple 3-digit dialling, call transfer, conference, voice mail access and other call management features for inter-branch communications With the requirement of 30+ trunks at every branch location for voice calling, PRI acts as a perfect network to not only save telephony cost but also saves cabling cost as 30 channels are offered on a single line. Unified communication for workforce With the web based Remote Management feature, all the systems can be centrally managed by the IT administrators from a single location without visiting any branch offices. Innovative SPARS M2S - Mobile Softphone application enables supervisors to carry office extensions wherever they go. They can reach each other by simply dialling an extension number or browsing through the corporate directory. Enhanced collaboration with video calling, instant messaging and presence sharing, voice mail features. Results : Unified Communication for workforce collaboration and better customer responsiveness Low terminating cost of PRI lines as compared to analogue lines for each user Reduced call traffic as high as 40% Future-proof solution with scalability for further expansion plans
Johan Cruijff ArenA will utilise innovative video analytics to improve visitor flow, optimise parking utilisation and offer fans an anonymous way to provide feedback about the stadium experience, among other uses. The Security & Safety Things IoT platform for smart cameras will integrate into the ArenA’s operational software to provide key insights into stadium operations and ongoing health and safety measures, especially useful since the pandemic. The partnership will provide a potential model for other organisations looking to deploy technology solutions to safely reopen. IoT platform for smart cameras Security and Safety Things GmbH and the Johan Cruijff ArenA are partnering up and will deploy S&STs IoT platform for smart surveillance cameras to enhance overall fan experience, optimise ArenA operations and increase visitor security and privacy. The ArenA is home to AFC Ajax and the internationally renowned Amsterdam Innovation ArenA (AIA), a living lab established by the ArenA and the City of Amsterdam to enable development and testing of innovative stadium and smart city solutions. Security & Safety Things IoT platform S&ST IoT platform and network of cameras is integrated into the ArenA’s dashboard software The Security & Safety Things (S&ST) IoT platform and network of cameras is integrated into the ArenA’s dashboard software to provide information and analysis for safety and security as well optimisation of stadium operations and visitor engagement. “Every technology selected for our innovation environment is strategic because of the potential benefits not only to our ArenA, but to the City of Amsterdam and other stadiums and large event venues seeking technological solutions to help to re-open safely and operate their facility more intelligently,” said Sander van Stiphout, Director International, Johan Cruijff ArenA. Sander van Stiphout adds, “The unique flexibility of the Security & Safety Things approach enables us to simultaneously deploy COVID-19 health and safety analytics along with business optimisation tools and easily re-equip the cameras with other analytic applications as our needs change.” AI-enabled video analytic applications A series of smart cameras on the S&ST IoT platform are installed in key areas throughout the stadium. Using specialised, Artificial Intelligence-enabled video analytic applications from the S&ST Application Store that run directly on each camera, each device will provide the ArenA with valuable operational insights. When the stadium reopens, crowd detection analytics will monitor social distancing compliance and visitor flow around entrances and food or merchandise kiosks. License plate recognition cameras will assist with real-time occupancy monitoring for parking and traffic flow optimisation. Queue detection applications Queue detection applications can be employed to reduce visitor wait times by directing fans to less busy areas and by providing the insights required to optimise staffing levels at peak times. In one specific area, a camera also provides the ability for visitors to provide feedback about their stadium experience in an anonymous and contact-free way by detecting the visual of a ‘thumbs-up’ or ‘thumbs-down’ from a visitor, collecting only the rating without disrupting people flow. Smart camera platform We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner" “The flexibility of our smart camera platform and the ArenA’s mission of innovation are very well matched to produce the intelligence necessary to address real world issues of privacy, health and safety but also new and creative ideas for stadium and event management,” said Hartmut Schaper, Chief Executive Officer (CEO), Security & Safety Things GmbH. Hartmut adds, “We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner and to help them provide a seamless and safe visitor experience.” Smart surveillance camera system The camera system and how it is used complies with all European and Dutch privacy regulations. Furthermore, there are various advantages to this camera system, when it comes to privacy. These cameras are equipped with powerful processors that analyse the images directly on the camera, reducing the need for a constant video stream to be passed on to a central location, where it can be monitored or further processed. Instead, the cameras can be configured to send only the information about relevant events such as when a long queue is forming, groups of people gather too closely, or individuals are not wearing face coverings as required. Only then will respective images be passed along. This reduces the processing of visitors’ personal information to an absolute minimum as opposed to a traditional set-up where all footage is transmitted and centrally processed at all times.
The city of Arnhem has chosen Nedap to regulate vehicle flows and to provide a seamless vehicle access experience in its city centre. Due to the increase in the number of vehicles in the city centre, it was a challenge for Arnhem to ensure that the traffic flow runs smoothly and safely, to keep the historic and tourist centre accessible and livable. Vehicle identification solutions With the implementation of Nedap’s vehicle identification solutions, authorised vehicles and drivers can access the city in a safe and seamless way. The combination with Nedap’s MOOV City Access software ensures that vehicle access in the city centre easily can be regulated. The city of Arnhem wants to regulate vehicle access to the centre and ensure only authorised vehicles can enter The city of Arnhem is located in the east of the Netherlands. Because of the historical centre, cultural sights and a wide range of entertainment facilities, it is also an attractive city for tourists. To ensure that the city centre remains traffic and pedestrian friendly, the city of Arnhem wants to regulate vehicle access to the centre and ensure only authorised vehicles can enter. MOOV City Access platform By limiting traffic flows, the narrow streets in the historic centre of Arnhem turned into an attractive and safe public place for pedestrians and cyclists, creating a livable city. The city of Arnhem has chosen Nedap for its MOOV City Access platform combined with its advanced solutions for automatic vehicle identification, based on long-range RFID (Radiofrequency Identification) and ANPR (Automatic Number Plate Recognition) technology. Authorised vehicle access in specific zones The solution is supplied and installed by Nedap’s partner - ST&D. Nedap’s MOOV City Access platform is implemented to control vehicle access in specific zones. With this, Arnhem ensures that only authorised vehicles can enter these zones and only if they have permission to do so. With the implementation of RFID readers and ANPR cameras, vehicles can be identified from a long distance, ensuring automated and safe vehicle throughput. Nedap’s long-range RFID solution, TRANSIT will be used to ensure that local residents, emergency vehicles, licenced taxis and municipal services have easy access to the city centre, without compromising on safety. TRANSIT long-range RFID solution Authorised vehicles equipped with a RFID tag will have fast access at vehicle entrances TRANSIT is a proven technology that enables highly secure identification and tracking of vehicles and drivers, up to a distance of 10 metres. Authorised vehicles equipped with a RFID tag will have fast access at vehicle entrances, without the need to stop. The all-in-one licence plate camera, ANPR Lumo will grant access to vehicles based on their license plate number. Licence plate recognition is a perfect solution for specific user groups or situations, in which vehicles require access temporarily or incidentally to the city centre. For example, retail delivery trucks can be given access at pre-defined locations, assigned days and time zones, regulating vehicle access to the city by reason. Digitisation of city access “By choosing and implementing Nedap’s MOOV City Access platform in combination with Nedap’s licence plate recognition solution, we have taken a major step in the further digitisation of our city access in Arnhem,” said Hans ten Barge, Chain Director Parking at the Municipality of Arnhem. Nedap Identification Systems is a specialist in Automatic Vehicle Identification and Vehicle Access Control solutions, for over the past decades. Nedap has developed a unique portfolio of proven long-range RFID and ANPR solutions that enable seamless third-party system integration. Vehicles and drivers are identified automatically, securing a free-flow yet highly secure vehicle access experience. MOOV City Access is Nedap’s vehicle access control solution, specifically designed for regulating vehicle flows in inner cities. MOOV’s hardware and software are compatible with Nedap’s RFID readers and ANPR cameras. This complete solution ensures a livable and safe city.
Interface Security Systems, a renowned managed service provider delivering business security, managed network, UCaaS and business intelligence solutions to distributed enterprises, announced that El Pollo Loco, one of the nation’s fastest-growing restaurant chains that specialises in fire-grilled chicken, is relying on Interface's managed video verified alarms and intrusion alarm monitoring to reliably detect intrusions and minimise false alarms. With Interface, El Pollo Loco saves several thousand dollars in annual false alarm penalties across 198 restaurants. When Louis Burke, Senior Manager, Safety & Loss Prevention, joined El Pollo Loco, he had to contend with numerous alarm management protocols as El Pollo Loco had half a dozen vendors for intrusion alarms. Every vendor had different terms of engagement and there was no way to hold anyone responsible even when the alarm systems failed. Security alarm system “When I first started, I received a call from a restaurant about their missing safe. When I called the large well-known alarm company, I was told that they had stopped receiving signals from the alarm system at the location for over six months. Apparently, we had not signed up for a separate add-on service that would have ensured the communication channel between the alarm and the monitoring center was working." We untangled ourselves from the maze of alarm vendors and work with a company that understood our needs" "All along, we were paying service charges with no one monitoring our location and no communication from the alarm company." This incident marked a turning point in El Pollo Loco’s approach to loss prevention and paved the way for a complete review of how intrusion monitoring was implemented. “We decided to untangle ourselves from the maze of alarm vendors and work with a company that understood our needs and was willing to take ownership for the service. That’s why we decided to hire Interface,” said Burke. Alarm monitoring systems The service scope included replacing outdated alarm systems with a state-of-the-art new system along with Interface’s 360 Alarm Maintenance Service that ensured all maintenance issues with duress buttons, connectivity, and the alarm panels were proactively addressed along with a comprehensive yearly technical inspection to ensure the alarm systems remain operational at all times. The revamped managed alarm service by Interface became the gold standard for El Pollo Loco, as Burkes team insisted on following a similar engagement model and protocol with other service providers as well. Once El Pollo Loco streamlined the basic alarm monitoring systems, Burke set his eyes on rolling out cameras to the remaining 40% of restaurants that still did not have a video in place. However, the team wanted to effectively demonstrate ROI on the proposed investment first. Video verified alarm service As Burke was reviewing the security operations, the hefty false alarm fines that added up to several thousands of dollars every year stood out. Working with Interface, El Pollo Loco piloted a video verified alarm service at a few of their restaurants where cameras were already installed. The results of the pilot project were eye-opening. Every time a restaurant location had an alarm event, Interface’s remote monitoring team would verify if the alarm required a call to the local law enforcement or not. Only 5% of the alarm events actually required police intervention. The rest were all false alarms. The pilot project paved the way for the installation of security cameras at all El Pollo Loco locations. Interface’s video verified alarm was then made available in all the locations and directly contributed to thousands of dollars in savings per year as El Pollo Loco cut down false alarm penalties and associated costs by 95% across their corporate-owned restaurants. Eliminating false alarms The Interface Command and Control Center identified the burglary in progress and immediately dispatched police “In addition to the direct savings associated with eliminating false alarms, our store associates are happy as they are no longer being woken up at odd hours with a false alarm. Every time they receive an emergency call from Interface, our associates know that they have a verified event,” says Burke. The custom-built video verified alarm solution is also helping to prevent crime at El Pollo Loco. Recently, a serial burglar attempted to make off with a significant amount of cash stolen from the smart safe at a Los Angeles-area location. The Interface Command and Control Center identified the burglary in progress and immediately dispatched police. The burglar was arrested on the scene. Convert alarm panels Interface is currently in the process of working with El Pollo Loco’s IT department to also eliminate expensive POTS lines and convert their alarm panels to help them reduce costs for all their locations. According to Burke, “The biggest advantage of working with Interface is not just the value for money, it’s the robust, process-oriented culture, the willingness to listen to customers, and the ability to creatively solve problems keeping the interest of the customer in mind.”
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc. (Genetec), a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. Genetec Security Center The three-year project, which is expected to be completed by the end of 2023, will see Genetec Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract for Changi Airport Group was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights that Genetec Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.


Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
Products


White papers

Making sense of today’s security camera options
Download
Smart security cameras: excellence in retail
Download
Access control & intelligent vehicle screening
Download
How to get buy-in from IT departments on IP video installations
Download
Hikvision DarkFighter Technology for high-quality images at night
Download
Enhanced Ethernet Technology (ePoE)
Download

Videos
Network cameras: Manufacturers & Suppliers
- Dahua Technology Network cameras
- Axis Communications Network cameras
- VIVOTEK Network cameras
- Hikvision Network cameras
- Arecont Vision Network cameras
- Messoa Network cameras
- Panasonic Network cameras
- Sony Network cameras
- Hanwha Techwin Network cameras
- Vicon Network cameras
- LILIN Network cameras
- Bosch Network cameras
- Pelco Network cameras
- FLIR Systems Network cameras
- eneo Network cameras
- Surveon Network cameras
- IDIS Network cameras
- Brickcom Network cameras
- Visionhitech Network cameras
- D-Link Network cameras

How to ramp up perimeter security with license plate reader technology
Download
Solve access control challenges in the healthcare sector
Download
Getting the most value from Software Subscription Agreements
Download
Shifting trends in operation centers and control rooms for 2021
Download