Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Mat...
Hikvision, the world’s supplier of innovative security products and solutions, will be exhibiting its innovations at Intersec 2020, a security exhibition in the Middle East, January 19-21 in Dubai, UAE. Emerging technologies and applications opened up new possibilities for the security industry. This year, visitors can experience Hikvision’s products and solutions for users across various industries. Multi-dimensional perception Hikvision’s multi-dimensional perception was c...
“Normally when we talk about trends and the future, we are actually thinking more about the present. The reason we are keen on understanding trends is because we want to know how they will affect our current business and how we should act now to avoid being outdated.” Significant changes have shaped the security industry during the last decade, and more exciting innovations should be expected in the 2020s. Emerging technologies and applications, such as multi-dimensional perception,...
MOBOTIX has been awarded ‘Secure by Default’ certification in the UK. The certification for the new MOBOTIX 7 platform includes the new IP video system M73, launched at the MOBOTIX Global Partner Conference in October 2019, as well as the Mx6 product line. This highlights MOBOTIX’ ongoing focus on cyber security and privacy protection. MOBOTIX has been approved based on the 12 Guiding Principles of the Surveillance Camera Commissioner. The company is now globally enabled...
CNL Software, globally renowned developer of Physical Security Information Management (PSIM) software solution, is pleased to announce that it will be exhibiting at Intersec 2020. CNL will focus on the technology that is driving the digital transformation of control rooms across the Middle East region. CNL will be joined by Cepton Technologies, Inc. a developer of industry-leading 3D sensing solutions, who will be showcasing their latest correlation of LiDAR data with real time video visualisati...
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandal...
Allegion, a provider of security products and solutions, and CBORD, a provider of campus card technology solutions, announced a new integration that strengthens perimeter security across colleges and universities in the U.S. Allegion’s Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options will now extend the impact of CBORD’s card software system for greater control of secondary doors over perimeter access. The integration improves perimeter security by providing electronic override of mechanical dogging so lockdown can occur from the CBORD interface. To ensure peace of mind, remote monitoring capabilities are also available through the integration. Security issue on campus Colleges need to be able to lock down immediately if there is a security issue on campus" This integration also makes Allegion and CBORD one of the first to bring this solution to higher education campuses for access control at this scale. Higher education campuses face a unique challenge when it comes to security – they are larger, open by design, and tend to have more buildings than other learning institutions, making security a demanding task for facility personnel. “This is one of the most critical security hurdles universities face,” said Robert Lydic, Vice President of PACs OEM business at Allegion. “Due to the required circulation between buildings, colleges need to be able to lock down immediately if there is a security issue on campus.” Electronic access control system Yong Lacy, category leader of openings at Allegion, added, “It is not feasible for universities to leave perimeter doors locked during operating hours because students, faculty and visitors constantly need to move across campus buildings with ease. Remote undogging and monitoring can enhance security to avoid putting the college community at risk in emergency situations.” Many secondary doors are not connected to a campus’ electronic access control system, exposing universities to potential security breaches, especially during emergency lockdowns. The Von Duprin RU and RM options, coupled with CBORD’s software, are designed to extend the benefits of electronic access control to these openings. This integration provides higher education customers a wide range of affordable solutions to meet their perimeter electronic access control needs, seamlessly integrating with security systems like Schlage’s electronic locks, readers and credentials. Access control software The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring" “CBORD has been a provider of campus technology for more than forty years and works with partners like Allegion to design innovative solutions as security risks continue to evolve,” said Jim Hoefflin, CBORD president. “We’ve taken a best-of-breed in security solutions and integrated it with our industry-leading access control software for a smart integration that responds to the market’s increasing need for improved campus perimeter security.” The Von Duprin RU option is a retrofit kit for exit devices that enables remote undogging for centralised lock down and door status monitoring with integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signaling capabilities. The RU option connects wirelessly via BLE to the ENGAGE Gateway, providing real-time, bi-directional communication to the Open Options DNA Fusion software via IP network connection directly to the Gateway. Advanced access control adoption The RU option is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A series devices. The RM option is the sensor-only configuration for exit-only or fire-rated doors that require monitoring. It provides visibility to door status with the same RX, LX and DPS signals as the RU option, without the centralised lockdown component. This integration is part of the next wave in Allegion’s quest to work with the leading players in the industry to spearhead advanced access control adoption, making seamless security the new standard at higher education institutions.
IDIS is poised to extend its deep learning capabilities, and to lead the sector with more advanced projects in the Middle East, with the launch a powerful line-up of Edge VA bullet and fixed domes featuring essential on-board analytics, to be showcased at Intersec (19-21 January in Dubai) on stand SA-A28. Crucially, the new camera range will allow users to leverage the power of IDIS Instant Meta Filtering, with the ability to access and search video data, stored on IDIS NVRs, through the totally cost- and license-free IDIS Centre VMS. This makes it easy to search by colour and type of object (for example, people, cars, and bicycles) and number, to deliver significant labour efficiencies and reduce investigations from days and hours to just minutes. At the same time, a new mapping tool will allow users to select a specific camera on an intuitive layout plan, and live view or playback video in the corner of the screen to further improve control room and operator efficiency. IDIS Deep Learning Analytics (IDLA) technology IDLA is proving to be the industry’s most accurate AI solution for security and life safety applications The biggest draw for visitors to the IDIS stand is sure to be the latest iteration of IDIS Deep Learning Analytics (IDLA) technology that is available as a modular IDIS Solution Suite VMS service, or via the cost-effective AI in the Box appliance for smaller applications. IDLA is proving to be the industry’s most accurate AI solution for security and life safety applications, with a tested 98% accuracy rate. IDLA enables a higher level of protection for people, facilities and assets, by significantly reducing false alarms and ensuring critical incidents are never missed. For example, IDLA can recognise an intrusion, loitering, trespassing or a person falling over, all in real-time, and trigger a notification. In practice this means that critical events need never go undetected, and control room operators can initiate the most rapid, appropriate responses to incidents. DC-C4212RX 2MP micro dome camera Offering even more choice for retail applications, IDIS will be showcasing an extended line up of analytics appliances and specialist cameras, which now includes new 12MP and 5MP Super Fisheyes, giving complete situational awareness from a single camera, while the new DC-C4212RX 2MP micro dome camera will also make its Middle East debut. Available in a wide choice of colours, the micro dome enables less noticeable surveillance, blending discretely with the aesthetics of high-end locations such as jewellery stores and designer boutiques, as well as up-market restaurants and luxury hotels. IDIS will highlight a compliant end-to-end offering for financial institutes New reporting capabilities will also be unveiled within the popular retail plug-and-play, VA in the Box analytics appliance, which gives retail managers the ability to compile and access business intelligence reports for multiple stores and branches all from the convenience of a web browser. IDIS Critical Failover In addition, following its significant success in the Middle East banking sector, IDIS will highlight a compliant end-to-end offering for financial institutes that includes convert modular cameras perfect for ATMs, ruggedised mobile cameras and NVRs featuring a durable, anti-shock and anti-vibration design for cash-in-transit vehicles, together with the powerful range of 8400 NVRs that come with server-crushing 370Mbps throughput, IDIS Intelligent Codec H.265/H.264 performance, RAID support and the multi-layered protection of IDIS Critical Failover. Other camerasecur debuts ideal for banking and other critical infrastructure sectors will include a range of thermal options and an explosion-proof camera designed for robust perimeter protection. “Middle East buyers today are clearly focused on solutions that give them tangible benefits, including ease of installation combined with reliable, high-performance technology that is cybersecure and backed by industry-leading warranties from a manufacturer they can trust, and that is exactly what IDIS is offering,” says Harry Kwon, General Manager, IDIS Middle East and Africa (MEA). “And with our end-to-end video solutions and advanced analytics tools, we are delivering immediate advantage and long-term value for security integrators, consultants and end-users.”
FLIR Systems, Inc. announces three dome-shaped, Pan-Tilt-Zoom (PTZ) security cameras, including two dual-sensor camera series for critical infrastructure locations, the FLIR Elara™ DX-Series and the FLIR Saros™ DM-Series, and a high-resolution visible camera for safe city deployments, the FLIR Quasar™ 4K IR PTZ. The latest FLIR security products offer multiple lens options for long- and short-range needs to enable accurate perimeter protection of critical infrastructure, remote facilities, and in urban city environments, day or night. Superior perimeter security protection Both series offer eight lens options, enabling customers to choose the most appropriate lens for their application Critical infrastructure sites, such as utility substations and transportation centres, have significant and often increased security requirements. The latest FLIR Systems cameras featuring thermal imaging and 4K high-resolution sensors, the Elara DX-Series and Saros DM-Series, help deliver superior perimeter security protection where it matters most. With the ability to see through fog, rain, sun glare, and snow, both series provide the ability to spot heat signatures at all hours. The FLIR Elara DX-Series features longer viewing range capabilities, infrared illumination, and a wiper blade that can be remotely operated for use in harsh conditions to ensure a clear view. The more compact Saros DM-Series provides shorter viewing range capabilities in a weatherised housing. Both series offer eight lens options, enabling customers to choose the most appropriate lens for their application. Complementary solution with integration The Quasar 4K IR PTZ delivers high-resolution visible video quality with the best-in-class low light capabilities For the growing metropolitan city safety and security market, the Quasar 4K IR PTZ delivers high-resolution visible video quality with the best-in-class low light capabilities to give operators superior monitoring in large coverage areas. Providing VMS integration with FLIR United VMS and all major platforms, these latest FLIR security cameras can provide a comprehensive end-to-end experience with a seamless integration to the FLIR United VMS platform or a complementary solution with integration available to all major platforms. Perimeter protection cameras “With our latest products, FLIR is delivering advanced cameras purpose-built for perimeter protection and the evolving security needs of critical infrastructure sites and cities,” said Travis Merrill, President of the Commercial Business Unit at FLIR. “For surveillance in critical environments, including utility substations, airports, train stations, or stadiums, these perimeter protection cameras are designed to withstand harsh environments to help keep sites secure and people safe.” The Saros DM-Series is available for purchase immediately while both the Elara DX and Quasar IR PTZ will be available in the first half of fiscal 2020, all through FLIR Systems’ network of established dealers and integrators.
Wind River, globally renowned company in delivering software for the intelligent edge market, will exhibit a technology showcase at the Consumer Electronics Show (CES) 2020 in Las Vegas on January 7 – 10, 2020. Demonstrations will highlight technologies that advance intelligent and autonomous systems as well as security, safety and reliability across markets including automotive, avionics, industrial, medical, and telecommunications. “5G connectivity will have a transformative impact across industries. The stakes are especially high in areas such as autonomous vehicles, unmanned aircraft and drones, and medical systems, and these use cases drive highly intensive requirements,” said Michel Genard, vice president of Product at Wind River. “We can deliver proven solutions that can address the complex demands around the need for increased security, safety, and compute power, while helping companies keep to their business objectives.” Demonstrations by WindRiver at CES 2020 include: Service-Oriented Architecture (SoA) for Connected, Autonomous, and Electrified Vehicles: This Wind River demonstration showcases virtualisation with hypervisor enabling multiple HMI displays, each with its own OS instance, to demonstrate GPU sharing. The VxWorks real-time OS (RTOS) and Automotive Grade Linux will run on Renesas R-Car hardware. On an Intel board, a hypervisor will enable Baidu Apollo software to run on Wind River Linux, alongside VxWorks. The two ECUs can communicate over SOME/IP protocol based on Wind River’s’ Adaptive AUTOSAR software, which has received concept approval of ISO 26262 ASIL-D–level functional safety from certification authority TÜV SÜD. The Rolling Lab: Housed within a Honda Odyssey vehicle, this live demonstration features production-ready over-the-air updates (OTA) and electronic control unit (ECU) consolidation technologies with an integrated digital instrument cluster running on the VxWorks RTOS together with the Android In-Vehicle Infotainment system. Connectivity Control Unit with Hyundai Autron: The demonstration highlights a connectivity solution framework for integrating advanced compute features found in autonomous driving running on NXP hardware. The platform runs Wind River Linux with an AUTOSAR Adaptive software platform that was jointly developed by Wind River and Hyundai Autron. Safety Certifiable Advanced Driver-Assistance Systems (ADAS) with Intron Technology: This demonstration highlights an ADAS domain controller developed jointly by Wind River and Intron, featuring VxWorks, Wind River Helix Virtualisation Platform, and SOME/IP-based interoperability between AUTOSAR Classic Platform and the performance computation unit, all running on Xilinx hardware. Vehicle-to-Cloud OTA with Airbiquity: This demonstration showcases an open, flexible, end-to-end software lifecycle management solution for autonomous vehicles that combines Wind River Edge Sync and Airbiquity OTAmatic technologies, enabling secure and intelligent OTA software updates and data management. Interactive Virtual 5G Experience: This virtual tour highlights demanding use cases across mission-critical industries that require the highest levels of cybersecurity and safety, such as Kubernetes-based Wind River Cloud Platform for managing 5G edge cloud telecom infrastructure, intelligent industrial and robotic systems, urban air mobility, and next-generation telemedicine. Electrification and Autonomous sessions The panel discussion “Electrification and Autonomous” during the Connect2Car conference track on January 7 at 11:30 a.m. at N258 in North Hall. Speaking session “The Next Phase for Autonomous Cars – Conquering Real World Business Challenges” on January 9 at 9 a.m. at RTI booth #713 in the Westgate Convention Center. Wind River will be exhibiting at the Consumer Electronics Show (CES) 2020 in Las Vegas from January 7 to 10 at booth #9029 in the North Hall at the Las Vegas Convention Center in Las Vegas, Nevada, United States of America.
The Horwitz-Wasserman Holocaust Memorial Plaza, located in the heart of Philadelphia, is a living testament and tribute to the victims of the atrocities of the Holocaust. The goal of the Memorial Plaza is to educate visitors on this shameful time in history and compel them to work towards a world of tolerance and enlightenment wherein nothing like this could ever occur again. The Delaware Valley Intelligence Center (DVIC), weighed in on the needed security measures. Under the institutional umbrella of the Philadelphia Police Department, DVIC serves as the regional fusion center and utilises a collaborative and proactive approach to forecasting, preventing and/or responding to all-threats, all-hazards and major events. They assessed the video surveillance requirements of the Memorial Plaza. Video surveillance cameras The Foundation’s construction company then compiled the specifications, based on the DVIC’s recommendations, and Convergint Technologies, a global, service-based systems integration company, delivered the best proposal to suit their needs. Convergint specified video surveillance cameras from Hanwha Techwin. Because of the large size of the Memorial Plaza and park area, a standard definition camera wouldn’t suffice, so Convergint opted for Hanwha’s high resolution PNO-9080R 4K Network IR Bullet Camera. This model allows the viewer to zoom in and see, in close detail, the face of someone passing by the camera who may be a suspect. The PNO-9080R from Hanwha's Wisenet P series performance IP camera line is a 4K camera key in capturing people and events in full detail. IR bullet camera This 5 megapixel resolution camera works well in both day and night conditions For the actual Memorial site at large, such high resolution wasn’t required, but Convergint, in the interest of overall protection, recommended and installed the XNO-8080R 5 megapixel network IR bullet camera to ensure safety all around the perimeter of the park and Memorial Plaza area. This 5 megapixel resolution camera works well in both day and night conditions, and features analytics for loitering, directional detection, fog detection, audio and tampering detection, as well as digital auto tracking and sound classification. The Hanwha cameras are tied into a Genetec Security Center VMS, which allows authorised administrators from as well as the local Police Department to log in and view the video footage at any time. The Horwitz-Wasserman Holocaust Memorial Plaza was not spared from anti-Semitism. Positive identification of suspect It was vandalised by a man who etched the initials “REM” and two SS bolts – a known Nazi symbol – into the memorial’s pillars. With the help of the Hanwha surveillance cameras, the perpetrator was quickly apprehended. “The cameras proved to be fantastic in resolving the June incident,” said Jennifer Wright, Project Manager at the Philadelphia Holocaust Remembrance Foundation. “I looked at the footage and was able to get a few different angles of the person responsible for the crime. The footage was of good quality and I could clearly see him. We sent it to Philadelphia Police Department and they put out a media advisory; we also shared images of the person responsible for the defacement of the Six Pillars on Facebook. Footage of the incident was shared thousands of times on social media. Public sharing of these images eventually led to a positive identification of a suspect.”
360 Vision Technology, globally renowned UK-based CCTV manufacturer, has announced that they will showcase their latest range of high-performance surveillance cameras on the Nukleas Integrated Security Solutions booth, Sheikh Saeed 2, G35, at Intersec 2020, 19-21 January, Dubai. ‘TX’ video transmission cameras For those looking for a reliable 3G/4G/LTE ‘wireless’ camera video solution, 360 Vision will be showing the ultimate performance Predator, Invictus and lightweight VR Dome PTZ wireless ‘TX’ video transmission cameras. Saving installers and end-users money on installation time, the TX Range needs no fixed infrastructure and provides 3G/4G/LTE wireless transmission in difficult environments. Suitable for rapid or temporary redeployable, or permanent deployment applications, 360 Vision’s TX technology delivers video & PTZ control from just 6 Kbps and Full 1080p HD edge recording, with remote retrieval on demand. Wireless video transmission systems Predator Radar scans 360 degrees once every second, to detect and track multiple objects simultaneously “Unlike traditional off-the-shelf wireless video transmission systems, the new 360 Vision TX Range has been specifically designed to suit low-bandwidth or unreliable network conditions, such as satellite or cellular networks,” says Mark Rees, Managing Director at 360 Vision. “IK10 certified, TX Range cameras include built-in cyber security, local point-to-point Wi-Fi access, and easy Plug & Play set-up, require no fixed infrastructure and can be easily integrated into any leading VMS control systems.” 360 Vision will also be showing their latest Predator Radar compact camera. Perfect for a wide range of electronic surveillance applications, Predator Radar scans 360 degrees once every second, to detect and track multiple objects simultaneously (with 400m coverage) - providing a highly effective surveillance camera solution for wide area security monitoring and intruder detection, such as within borders and compounds. Advanced SSL & 802.1 encryption protection Safeguarding against hacking and ransomware attacks, 360 Vision cameras feature advanced SSL & 802.1 encryption protection, and high-performance camera technology designed to deliver secure 24/7 video imaging, reliability and performance within any application. “We’re delighted to be at the show as part of Nukleas, the Integrated Security Solutions consortium that combines British industry excellence to support customers with complementary solutions designed to offer a refreshingly coordinated approach to all types of security projects,” Mark continues. Single integrated solution He further adds, “The Nukleas single integrated solution combines 360 Vision Technology’s robust camera surveillance solutions, along with the consortium members’ command and control systems, secure wireless transmission and networking, integrated communication hubs, incident management, perimeter intrusion detection, video analytics and safety solutions, all tailored and scalable for each unique project requirement.”
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organisation’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organisations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorised staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organisation will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organisation. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organisation’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organisations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorised person into a facility. Deploying video cameras, sensors Some organisations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimise throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorised persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cyber security, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analogue cameras. A higher percentage of commercial customers use mobile applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Haier Group, China’s home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realise multiple tasks within the whole industrial park. First, to prevent theft and timely detect people climbing over the perimeter fence. Second, to provide comprehensive monitoring in the whole industrial park and inside the factory which includes: monitoring of production line and employees’ smoking behaviour during working hours at office areas; efficient employee attendance; vehicle identification at the entrance and exit areas of the industrial park; and the overall management of all devices, data report output, etc. Intrusion detection The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the system also supports further device upgrade based on customer’s future plan for the next several years. AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. The combination of advanced AI analytics and real-time alerts to a desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. Smart IR technology The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. These cameras are equipped with smooth control, high quality image and good protection As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Face recognition Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR Cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognise the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle colour detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices At the management centre, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Up-to-date Dahua AI equipment Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost. Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation,” said Zhao Shengbo, Regional Director of Dahua CIS. “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
Patriot One, developer of the PATSCAN Multi-Sensor Covert Threat Detection platform, is pleased to announce a collaboration partnership with Los Angeles Football Club (LAFC), part of Major League Soccer (MLS), to pilot its PATSCAN platform at Banc of California Stadium. Threat and intrusion detection “We are excited to announce this PATSCAN pilot deployment project with another U.S. major sport franchise,” said Martin Cronin, Patriot One CEO and president, adding “In the New Year, our installation team will begin work with the Los Angeles Football Club and Banc of California Stadium on this important game safety initiative. MLS fans will enjoy an added layer of security while attending their favorite team’s home games in Southern California”. Martin further said, “Our vision is to not only to create a world safe from acts of violence, but also to help save a way of life people have come to expect in their normal everyday lives, and that includes participating in professional sports and entertainment activities with their fellow fans.” PATSCAN Multi-Sensor covert threat detection The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at LAFC The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at Los Angeles Football Club, where they will be joined by Banc of California Stadium security and Patriot One implementation engineers to begin the integration and pilot deployment project. Specific location of the Platform’s deployment will not be disclosed. “Customer safety is our number one priority at Banc of California Stadium,” said LAFC Vice President of Information Technology Christian Lau. “We are excited to work with Patriot One to give customers an extra layer of security while attending events at our world-class venue in the heart of Los Angeles.” Stadium security Following the initial pilot deployment of the PATSCAN platform with LAFC at an undisclosed location within Banc of California Stadium, Patriot One will work with the team and stadium management to broaden deployment throughout the complex.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honoured to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
An Oxford University facility has enhanced its security with the help of world technology pioneer in integrated access control, intruder alarms management and perimeter protection. Saïd Business School, the University of Oxford’s centre of learning for undergraduate and graduate students in business, management and finance, has replaced its former system with an integrated Gallagher Security access control solution to protect it against theft and create a safe environment for visiting dignitaries. Saïd Business School is located right next to a train station – a heavy transit route into Oxford. While this location is convenient for students and staff, proximity to the station was making it easy for organised thieves to target the school and use the train to get in and out quickly. As hosts to international heads of state, royalty and others with strict personal security requirements, the school also saw a clear need to upgrade its security system to achieve a higher level of security. Safe from unauthorised intruders T-series were installed on doors throughout the building and new access cards were issued to all Saïd Business School wanted a system which could meet its need for complete control, yet maintain an open and welcoming feel on campus. “We needed to ensure only current employees and students had access to the school, and that those people were only accessing the areas relevant to them,” says Martin Boyt, Estates Operations Manager at Saïd Business School. “We also needed it to be easy and efficient to manage cardholder permissions, with the flexibility to adapt as the school grows.” Gallagher T-series readers were installed on doors throughout the building and new access cards were issued to all employees and students. Gallagher Command Centre is used to manage access control groups and set privileges to enable varying levels of access to different parts of the building. Students and staff can now easily move around the school and access the rooms and resources they need on a day-to-day basis, with confidence they’re safe from unauthorised intruders. Certified security installer Access control has been integrated with the student and staff induction process, meaning access control cards are not issued until induction has been completed. The school also uses the new system to issue event and conference visitors with temporary cards that have restricted access suited to the purpose of their visit. Boyt says protecting their people is of paramount importance. “Schools can be vulnerable to vandalism, theft and, increasingly, violence and terrorism by individuals or groups, so security is a top priority. We want our students and staff to have peace of mind that they are studying and working in a safe and secure place.” Partnering with Gallagher Security and a Gallagher certified security installer streamlined the process of installing the new system. Boyt says working with someone who understood their needs made all the difference. Building integrated security system Saïd Business School is using its learnings to improve security at its other university facilities“Translating the needs of our staff and faculty into workstreams and access control groups was a complex undertaking, and having trusted advisors on hand helped us get it right the first time.” Built-in reporting tools enable the estate managers to carefully monitor the system to keep the site secure. “We can run reports to check on occupancy levels and usage of certain areas, helping to reallocate rooms quickly and efficiently,” says Boyt. Saïd Business School is an active member of the Tertiary Education Security Network (TESN), organised by Gallagher. The aim of the group is to bring Gallagher customers together to build relationships and share knowledge. Boyt says: “We have found this group to be extremely useful as we continue our journey of building an integrated security system that meets our needs. We have learned a lot about campus security by attending TESN events and working closely with Gallagher and our security installer.” Learnings to improve security Saïd Business School is using its learnings to improve security at its other university facilities. “We want to integrate the CCTV cameras at our Park End Street events venue with Gallagher Command Centre to improve our monitoring capability,” says Boyt. “We will also insist the Gallagher system and CCTV integration is installed on future projects, including the redevelopment of Osney Power Station which is set to become a world-leading centre for executive education.”
Since 1964 the Central Bank of Jordan has played a crucial role distributing currency, maintaining national reserves of gold and foreign currencies, supporting economic development and ensuring the stability of the country’s financial system. For the bank, maintaining the most robust, up-to-date standards of security is not just mission critical, it’s a matter of national importance. IDIS technology is now trusted to provide full video protection. IDIS Solution Suite video management software (VMS) is at the heart of the Central Bank’s new video system, with the first phase encompassing 425-plus cameras upgrading its headquarters and protecting three branches. Cost-efficient remote firmware updates The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate IDIS Solution Suite’s hybrid capability not only enabled seamless switchover from the bank’s legacy analogue cameras, it is easier to operate than competitive systems and will allow cost-efficient remote firmware updates and system maintenance. Ametrad implemented powerful IDIS DR-8364D 64-channel NVRs, with a super-fast 900Mbps throughput to ensure high performance and simultaneous live view and playback with no degradation of image quality or latency. The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate, while supporting RAID 1, 5 and 10 and uses IDIS’s iBank file structure to deliver an unprecedented level of resilience. Multi-layered protection against video data loss The NVRs also offer the advantage of flexible H.265 and H.264 dual codec performance allowing the Central Bank to reap the benefits of high-definition H.265 recording, while viewing in H.264. IDIS Intelligent Codec offers further storage and bandwidth savings of up to 90% when combined with Motion Adaptive Transmission (MAT). IDIS Solution Suite further optimises network bandwidth through dynamic multi-stream control IDIS Solution Suite further optimises network bandwidth through dynamic multi-stream control by detecting overloads to prevent network strain. And, importantly, it improves the control room operator’s quality of experience in the face of varying network bandwidth. IDIS Critical Failover technology provides multi-layered protection against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. Improving maintenance standards This ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings. Testing at project handover confirmed that the Failover metrics fully met the client’s expectations. The IDIS solution was also selected because of its IDIS Ultimate Warranty, and ease of future expansion with guaranteed forward and backward combability. Security directors at the Central Bank wanted to replace their existing video system with the best new generation and futureproof solution that would deliver simultaneously high performance live view and recording. The bank identified the need to improve maintenance standards, eradicate system failures and ensure a low total cost of ownership. They also wanted to mitigate against video data loss, protect against cyber threats, and have a solution that would be easier for operators to use, with faster footage search and retrieval. Mission-critical projects Integrator Ametrad Technology Services won a hard-fought tender process against top competitors The control room at the bank’s headquarters needed a complete upgrade with the ability to centrally manage and control surveillance across all its branches. It was essential for the entire project to be delivered with minimum disruption that ensured no loss of video coverage during the phased implementation. Following a competitive proof of concept demonstration with the latest IDIS technology, integrator Ametrad Technology Services won a hard-fought tender process against top competitors, including the long-established previous contract holder. The successful partnership between Ametrad Technology Services and IDIS resulted in efficient project delivery, on time as promised, and has put the two companies a lead position for other mission-critical projects across the Levant region. Password breaches and cyber security loopholes In operation the bank’s new system has lower bandwidth requirements and faster recording retrieval time, making the security operation both more effective and more economical. The bank’s central monitoring team can now work more efficiently, with their new IDIS VMS providing event forwarding, acknowledgements, notifications, live pop-ups and other valuable functions. IDIS’s true plug-and-play technology is also less vulnerable to password breaches and cyber security loopholes, as installation engineers don’t need to manage IP addresses or manually enter passwords for each device. And IDIS’s Linux based servers and proprietary protocols ensure the highest level of resistance to hacking. Highest standard of video surveillance As the system expands FEN will act as force multiplier by reducing installation costs IDIS’s For Every Network (FEN) capability, which uses peer-to-peer technology, also allowed Ametrad engineers to quickly name each branch and connect the system to IDIS Solution Suite. As the system expands FEN will act as force multiplier by reducing installation costs, speeding up implementation time and protecting against human error by eliminating the complexity and cyber challenges associated with multi-site surveillance. "Working in close partnership with IDIS we were able to deliver a smooth, staged technology migration at these critical security sites, with no delays, problems or interruptions to recording," said Ahmad Shanawani, Managing Director of Ametrad Technology Services. Meanwhile, the Central Bank’s engineering department confirms that the IDIS solution now provides the uncompromising standard of protection they need, with lower ongoing costs, easier operation and the assurance that they will continue with the highest standard of video surveillance going forward.
Carlisle Support Services are pleased to announce that they have been awarded a 3 year contract to provide Manned Security and Stewarding services to the All England Lawn Tennis Club (Championships) Limited (AELTC). The AELTC is one of the world’s oldest and most prestigious private members’ tennis clubs and the home of The Championships, Wimbledon, one of the sporting events. Building a good working relationship In addition to the 24-7/365 Site Security, Carlisle will also be providing in excess of 350 event staff during the two weeks of The Championships. Adrian White, Operations Director at Carlisle, said: “We are delighted and honoured to be working with this Iconic venue.” “Already we have built a good working relationship with the AELTC Security Team and we understand the culture of the venue and the goals they are looking to achieve. Wimbledon is a unique event and location, for 50 weeks of the year it is a tennis club and for 2 weeks of the year it takes centre stage in the sporting calendar.” Understanding the contrasting needs of the service “Our experiences with other major sporting venues that have similar calendars, such as Ascot and Lords, meant we understood the contrasting needs of the service. We are really looking forward to a positive working relationship” Stephen Grainger, AELTC Head of Security, said “We are delighted to have selected Carlisle Support Services to deliver an important component of our security provision for both our year-round operations and The Championships and we look forward to working with them and our other providers.”
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?