Coronavirus (Covid19) pandemic has hit the world unprepared for its consequences on the healthcare system and economic life. As a result, the number one priority for countries and states is to flatten the infection curve and provide them with time. Essential policies adopted to achieve this are directed at changing and controlling human daily behaviour. AI-based solutions viisights has Artificial Intelligence-based solutions to help authorities enforce those policies, help prevent the virus sp...
Pulse Secure, the provider of software-defined secure access solutions, announces a new distribution partnership with Inforte to grow and better support its channel community across Turkey, and to meet accelerating demand for Zero Trust access security. Inforte is a value-added distributor specialising in the new generation of information security solutions. Inforte provides innovative services to support its community of over 100+ partners with pre-sales and post-sales services, logistics, mar...
Digital Monitoring Products, Inc. (DMP) has announced that its XR Series control panels have added an intelligent new layer of security and awareness, giving users the ability to selectively monitor their properties and capture video for specific activities. Now, users can choose from a variety of specific camera analytic events they want to be made aware of, either by an email, text message or push notification to their Virtual Keypad app. These events can also be sent to a control station rec...
Abloy UK unveils its newest innovation in digital security, the Abloy BEAT. The new keyless solution combines three main components: a digital key, a mobile application and a heavy-duty, Bluetooth padlock, all managed with the visual Abloy OS user interface. Businesses across the UK have a growing need for the convenience and accessibility of highly secure keyless access solutions – either as an addition to existing workflows or as a standalone solution. This is particularly true in remot...
Honeywell, a pioneer in products, software and technologies for connected buildings and homes, announced that its Xtralis VCA suite of security software is available for licensing by third parties. Now, both Xtralis LoiterTrace video detection software and Xtralis IntrusionTrace video detection software will be made available to third parties looking to improve the analytics capabilities of their security offerings. Xtralis IntrusionTrace, a high-performance intrusion detection software s...
This year Counter-Terror Expo (CTX) and IFSEC International will co-locate for the first time, creating the UK’s largest security event. The two events will take place simultaneously from 19-21 May 2020 at the ExCeL, London. CTX brings together international specialists and experts from industry, government and policing to share ideas and technology within the counter-terrorism field. The content programme will feature themes including drone threats and response, securing major events and...
Everbridge, Inc., the globally renowned company in critical event management (CEM), has announced that the company has unveiled new CEM capabilities across the Internet of Things (IoT) for corporate, government and healthcare organisations to protect their people, assets, operations, supply chain and brand from critical events such as coronavirus (COVID-19). Everbridge CEM platform Everbridge’s industry renowned CEM platform will feature a new IoT extension module that will also leverage the intellectual property from recent technology acquisitions of Connexient and CNL Software. As a result, organisations will be able to gather a broader range of situational intelligence and automate targeted responses throughout their entire safety, security, and operational continuum – from across a global footprint to within campuses and facilities. Everbridge CEM platform enables organisations to utilise vast amounts of electronic data, including IoT sensors With the number of IoT devices expected to approach 75 billion by 2025, the Everbridge CEM platform enables organisations to utilise vast amounts of electronic data, including IoT sensors, to digitally transform how they manage the safety and security of their employees, customers, patients, first responders, residents, and visitors, as well as the resiliency of their operations and supply chain. Critical Event Management (CEM) for IoT CEM for IoT extends the number of use cases for the Everbridge platform within the broader critical event management market, complementing the company’s existing offerings for supply chain and wearable devices. Companies, governments and healthcare organisations utilise CEM to mitigate risks from coronavirus with several million COVID-19 related communications deployed by Everbridge in recent weeks. The expansion of CEM for IoT enhances coronavirus-related use cases to better protect people, operations, supply chain and brand. Coordination between first responders, healthcare units For example, the Everbridge ecosystem supports over 1,500 healthcare entities including the top pharmaceutical, biomedical and medical device and manufacturing companies, as well as the largest healthcare systems (overseeing more than 25 percent of all hospital beds in the U.S.), managed care organisations, pharmacies, and statewide health alert networks (HANs), including the Center for Disease Control and Prevention (CDC) and the National Institutes of Health (NIH). CEM for IoT improves the ability to coordinate first responders and other critical healthcare resources such as intensive care unit (ICU) beds, respirators, expert medical staff, etc., based on real-time data on the broader impact of COVID-19. Data security and threat identification The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats Everbridge’s IoT initiative employs the same CEM framework currently being used by global industry firms involved in aircraft manufacturing, financial services, entertainment & media, high tech, healthcare, hospitality, retail, pharmaceuticals, the federal government, and other sectors. The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats; determining the relevance of a threat to an organisation’s people, facilities, assets, supply chain and reputation based on their dynamic locations; automatically initiating and orchestrating an enterprise-wide response plan using the organisation’s policies and procedures and monitoring execution of that plan; while analysing cycle times and results to identify bottlenecks and improve future performance. The acquisitions of Connexient and CNL Software augment the IoT capabilities of the Everbridge CEM Platform bringing the total number of out-of-the-box integrations to over 225. Integrations include numerous healthcare systems, indoor positioning, digital wayfinding, building management, access control, intruder detection, video management, and many more. Safe City and Smart Building programs Everbridge solutions secure major events, cities, states, military installations, government buildings, universities, airports, corporate campuses, and healthcare facilities, providing instrumental functionality to Safe City and Smart Building use cases across multiple critical events including coronavirus. The CEM platform monitors threat data streams continuously, alerts stakeholders" “The CEM platform monitors threat data streams continuously, alerts stakeholders when there is a relevant issue, and automatically orchestrates a coordinated response—it is always on,” said Imad Mouline, Chief Technology Officer (CTO) of Everbridge Inc. Connected, IoT devices Everbridge has experience with early implementations of Safe City and Smart Building programs in both the public safety and corporate space. According to IHS Markit, the global Safe City market will reach $35.8 billion in 2024. Brand Essence Market Research forecasts the overall Smart Building market will grow to $59 billion in 2025. The utilisation of a network of connected devices, or IoT, will make up a portion of both markets.
Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, is calling for higher standards of fire door inspections, after concerns surrounding fire safety in education buildings. Shockingly, there are over 1,000 school fires a year in the UK, costing an average of £2.8m in larger incidents, with one education insurer reporting that the large majority of UK schools are found to have ‘poor’ fire protection systems. The Regulatory Reform (Fire Safety) Order 2005 requires schools to undertake risk assessments to identify the general fire precautions needed to safeguard the safety of occupants in case of fire, including their safe means of escape. But with fire protection systems failing time and time again, it is clear that more needs to be done. Fully comprehensive inspection Fire doors are one of the most important safety features in a building, and regular inspections are essential to fully ensure health and safety measures are met. Education buildings can present highly specific requirements for fire doorsets, with particularly varied legislation and building regulations surrounding fire doors in schools. Door Group provide a fully comprehensive inspection which can be carried out every three, four, six or 12 months As part of its commitment to fire door safety, Door Group provides a fully comprehensive inspection which can be carried out every three, four, six or 12 months to suit specific requirements. Following inspections, Door Group then offers detailed reports containing advice and recommendations on necessary improvements, with the knowledge that identifying any potential issues that could impact safety and product performance can be lifesaving. Improving overall fire safety If any issues do occur, a tailored repair proposal is issued to include anything from replacement doors to a regular maintenance program. Door Group inspectors are BRE-certified and will ensure that all fire doors inspected meet all necessary standards and regulations. Brian Sofley, Managing Director for Door Group, explains: “The figures we’re seeing regarding fires in the education sector are terrifying. An education building should be a safe and secure place for students and staff, to work and learn. Door Group is committed to making schools, colleges and universities across the UK fire protected. With regular and thorough inspections, we can ensure the compliance and performance of fire doorsets in an effort to improve overall fire safety in the educational environment.”
ExtraHop, the provider of cloud-native network detection and response, accelerates its market leadership with new capabilities that provide 360-degree threat visibility, detection, and response across multi-cloud, data centre, and IoT deployments in a single hosted solution. With ExtraHop® Reveal(x) Cloud™, security operations teams can harness the power of the cloud to eliminate friction in finding and addressing threats across workloads, reduce tool sprawl associated with multi-cloud and hybrid cloud deployments, and accelerate adoption of network detection and response (NDR) within their organisations. Proliferation of IoT devices More than 85 percent of organisations have workloads running in multiple cloud environments Today, more than 85 percent of organisations have workloads running in multiple cloud environments. By next year, it will be 98 percent. At the same time, the proliferation of IoT devices and the deployment of IT infrastructure across remote sites has vastly expanded the enterprise attack surface beyond cloud and data center deployments. Those challenges are compounded by the exponential increase in tooling and agents required to monitor and manage these deployments, particularly cloud workloads and IoT. Security operations teams have long viewed the cloud as part of the problem; with its latest features, ExtraHop is turning cloud into the solution. Reveal(x) Cloud is the first and only cloud-delivered, cloud-agnostic, and cloud-intelligent NDR platform providing immediate value and continuous protection across the entire attack surface. Integrated workflow with a SaaS-based solution For the first time, SecOps teams can manage detection, investigation, and response via an integrated workflow with a SaaS-based solution that scales to the demands of the business. This cloud-native model removes points of friction for security operations itself, helps to break down silos between security, IT, and cloud infrastructure teams, and gives them the tools they need to move with the speed and agility the business demands. Reveal(x) Cloud reduces friction and accelerates time to value with a fully hosted NDR solution Reveal(x) Cloud reduces friction and accelerates time to value with a fully hosted NDR solution. The SaaS offering aggregates and analyses data from sensors deployed across networks in data centers, remote offices, and multi-cloud environments, and it surfaces information in a single UI for seamless management across workloads. ExtraHop automatically updates detectors, threat intelligence feeds, and IoT profiles via the cloud, eliminating the need for manual intervention to ensure that policies or software on sensors are up to date. Cloud-based machine learning Reveal(x) Cloud integrates with AWS Traffic Mirroring, Google Cloud Packet Mirroring, and Microsoft Azure to deliver visibility, threat detection, and response capabilities across major cloud providers – as well as data centres and remote sites – in a single, SaaS-based management pane. This cloud-agnostic approach supports collaboration between security, IT, and cloud teams for better threat response across multi-cloud and hybrid deployments. A cloud record store provides streamlined investigation with index record search and query of data Reveal(x) Cloud leverages the scale and scope of the cloud to provide 360-degree visibility and situational awareness across data centre, remote site, multi-cloud, and IoT environments to monitor and respond to threats. Real-time intelligence derived from petabytes of anonymised threat telemetry collected daily makes our cloud-based machine learning uniquely reliable – all without impacting sensor performance. Cloud-scale ML provides more than 1 million predictive models for a typical enterprise deployment to identify suspicious behaviours and potential threats. A cloud record store provides streamlined investigation with index record search and query of data from every segment of the hybrid environment. Delivering global intelligence “Organisations should be able to easily secure their workloads across public, private, and hybrid clouds without requiring multiple tools or creating a management headache,” said Jesse Rothstein, ExtraHop co-founder and CTO. “ExtraHop takes advantage of the virtually unlimited compute resources of the cloud to perform machine learning at scale across more than 15 million devices – and over four petabytes of threat telemetry per day – across our customer base to deliver global intelligence to prepare every security team, from the large enterprise to the midmarket, to handle both present and future threats.” Reveal(x) Cloud for multi-cloud and hybrid cloud environments will be available in May 2020.
Vacant property protection provider Orbis Protect has joined forces with Estonian company Defendec Services OU to provide its growing number of customers with state-of-the-art security technology. The new partnership announced will enable Orbis Protect to provide clients with military-grade security equipment in a move which also means the Uxbridge-based company will be able offer the very latest video verification technology. Light in the security industry The partnership was confirmed after Orbis Protect Chief Technology Officer Shaun Wilcock headed to Defendec’s headquarters in the Estonian capital Tallinn for in-depth discussions on the company’s new products. Verifeyed+ product series, a sophisticated alarm system with video verification employs Artificial Intelligence (AI) Orbis Protect’s Chief Technology Officer Shaun Wilcock said: “Orbis Protect is proud of its position as a leading light in the security industry. We are a national business with turnover approaching £40m and employing more than 400 staff, which provides security services for the commercial and public sector and some of the biggest names in business. “Our expertise, experience and ability to think differently are an asset to our clients and a central pillar of our growth ambitions. We know our new partnership with Defendec will provide us with a vital edge and enable the company to go from strength to strength. We strive to innovate and lead the industry and that’s why the relationship with Defendec is so exciting.” Detect intruders and safeguard premises At the forefront of this new, ongoing partnership will be the Verifeyed+ product series, a sophisticated alarm system with video verification which employs Artificial Intelligence (AI) to detect intruders and safeguard premises right around the clock. Verifeyed+ is a wireless, battery-operated system which allows cameras to be deployed anywhere without hard-wiring. Thanks to its versatility, it can resolve challenges ranging from protection of construction sites and empty properties, to catching fly-tippers in the act and combating anti-social behaviour through covert operations. It is already used to protect borders in more than 25 countries and can be installed immediately, anywhere CCTV cannot typically be fitted, and as well as being rugged enough for tough outdoor use, it can produce high-definition images day or night. Security technology Vacant properties service supports thousands of property managers and owners Defendec Vice-President and General Manager UK & Ireland Simon Faulkner said: “Orbis Protect and Defendec are forward-thinking companies, united by a determination to embrace new ways that technology can overcome security challenges. We pride ourselves on an ability to develop ground-breaking security technology and Orbis Protect will harness our technical expertise which constantly pushes back boundaries in search of simple but effective solutions.” Protection of vacant properties is right at the heart of Orbis Protect’s operations. Over the last 40 years it has provided property, site and personal protection services to its clients and has grown to a business employing more than 400 people across the UK. The company’s vacant properties service supports thousands of property managers and owners and is an essential component of their business continuity plans. Specialist teams provide support to clean and clear more than 60,000 empty properties each year, playing a significant role in bringing them back into productive use.
Meesons, the specialists in entrance control solutions, announces an exclusive agreement with Perimeter Protection Group (PPG) to distribute its Hostile Vehicle Mitigation (HVM) solutions. The exclusive distributor agreement covers the installation and maintenance of PPG HVM products in the UK. PPG pioneers the world in perimeter protection products with over 65 years’ experience in the security field. The agreement provides Meesons with exclusivity to a range of high quality HVM solutions that meet internationally recognised approvals, including PAS68, IWA14-1, ASTM and UK government approval. Preventing hostile vehicles PPG’s HVM products are tried and tested and have been installed in a number of high profile locations PPG’s HVM products are tried and tested and have been installed in a number of high profile locations in the UK and worldwide where they prevent hostile vehicles reaching their intended targets. The HVM products complement the Meesons existing Security Portals, Speed Gates and Full Height Turnstiles that are specified as anti-tailgating, physical barriers to secure entrance spaces, building façades and external perimeters. Following the growth and increased threats posed by vehicle-borne attacks over the last few years Meesons identified HVM as a key addition to their product range. These risks encompass theft and vandalism, through to sophisticated or aggressive attack by determined criminals or terrorists. They are exacerbated with the capability of hostile vehicles to carry large explosive devices. Hostile vehicle mitigation The distributor agreement extends Meesons’ ability to be a full solutions provider, allowing the company to offer clients a complete range of options when specifying internal and external physical security barriers. Meesons has over 30 years’ experience in secure access control and anti-tailgating solutions, making the HVM range a perfect product extension to its Security Portals, Speed Gates and Full Height Turnstiles. The Hostile Vehicle Mitigation range establishes Meesons as the go-to supplier The Hostile Vehicle Mitigation range establishes Meesons as the go-to supplier for proven perimeter solutions along with their Full Height Turnstiles, whilst the company’s Security Portals and Speed Gates are already routinely specified for façades, receptions and internal zones such as server rooms. Architects, security consultants, main contractors and security integrators, who regularly specify Meesons Security Portals and Speed Gates, will now be able to choose a HVM perimeter solution, saving time and resource compared to specifying multiple providers. Perimeter security solution Meesons has supported the launch of the HVM product range with dedicated resource in their commercial team, with over 25 years’ experience in the security industry, which will enable nationwide coverage. Customers will also be supported by trained technicians with nationwide service and maintenance plans. Jeremy Terry, CEO at Meesons, said: “HVM and PPG are a natural fit, strengthening our existing portfolio of entrance control solutions. It will help us build on our relationships with existing and new clients by offering them a complete façade, building and perimeter security solution. PPG are a well-established European manufacturer of high quality HVM solutions, backed by internationally recognised approvals and we look forward to working together. This is an exciting time for our business and the agreement with PPG builds on our strengths as the trusted brand in the Security industry.” Range of high security products Extending the range to include perimeter with our HVM products creates a compelling proposition" Morten Andreasen, CEO at Perimeter Protection Group, said: “We could immediately see a strong strategic fit between Meesons and PPG because they were already offering a range of high security products up to the building façade. Extending the range to include perimeter with our HVM products creates a compelling proposition for clients looking to create safe, secure buildings and estates.” “Their extensive growth in the UK security market working with high profile projects and clients along with nationwide coverage for both installation and maintenance gave us confidence that Meesons were the right partner. The UK market leads the way in HVM solutions and it was key to our business to find the right strategic partner to match our long term objectives.” High quality bespoke solutions Meesons has a unique approach to designing and supplying high quality, bespoke solutions. The company’s vision is to unite architects, contractors, consultants, clients, end-users and building owners in creating safe, secure buildings. This involves maintaining a close partnership with specifiers and facility managers, underpinned by strong corporate values and commitment to outstanding customer service. The Meesons HVM range will be featured on Meesons’ stand at International Security Expo in December, 2-3 at Olympia.
ProdataKey (PDK), manufacturer of a cloud access control platform built for mobile, announced the imminent release of a new integration between the company’s PDK IO platform and Comelit’s, ViP video door entry system. The integration will be available on March 18, 2020, coinciding with the first day of exhibits at ISC West event in Las Vegas. The PDK IO/Comelit integration will be on display at ProdataKey’s booth 20125. The combined solution brings together Italian-based Comelit’s interactive video entry technology with PDK’s powerful, mobile-first access control platform, creating a comprehensive solution that’s ideal for commercial and multi-tenant residential properties. A seamless synchronisation between Comelit’s and PDK IO’s user database enables system administrators to simultaneously register, or delete, users across both platforms. PDK IO system Furthermore, the same credential may be used to enter the property’s main gate or entryway, secured by Comelit, as well as all other perimeter doors and common areas, secured by the PDK IO system. Future enhancements to the integration will allow PDK users to view Comelit video via the PDI IO mobile interface and to unlock associated doors secured by the Comelit system. ProdataKey will be exhibiting several other products and integrations at ISC West “We see great synergy between Comelit’s and PDK’s strength in the multi-tenant residential market, and our companies’ ability to offer these customers an integrated security solution further enhances the value we offer to property managers and tenants who place a premium on convenience,” said Jeff Perri, ProdataKey’s President and COO. Integrated solution “We’re also looking forward to building upon Comelit’s success within the healthcare space, as well as leveraging our own leadership within the education market, for which the Comelit system is an ideal fit. As an integrated solution, the market opportunities are tremendous.” ProdataKey will be exhibiting several other products and integrations at ISC West. These include touch IO and touch app, cloud node, cloud node se, pedestal IO, and integrations with Savance, Digital Watchdog, Altronix and AssaAbloy’s Aperio wireless locksets.
Security managers, installers and integrators look into a wide variety of factors when selecting a remote video monitoring receiving centre to provide continued real-time surveillance of their sites. But there’s one factor which isn’t often taken into consideration, when it really should be. That’s the welfare of the CCTV operators who are tasked with responding to alarms and ensuring on-site incidents are dealt with appropriately. The fact is, in most UK monitoring centres those operators are working extremely long hours: typically 12-hour shifts, often four days in a row. The cumulative effect of that regular extreme shift pattern can be a level of fatigue which is detrimental to the performance of the operators, as well as to their own physical health and mental wellbeing. The result is a reduction in effectiveness of client video security systems. If the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffers. The central aspects of concentration and alertness I’ve worked in monitoring centres for most of my adult life, starting just out of school. When I had the opportunity to begin my own CCTV and security alarm most In UK monitoring centres, those operators are working extremely long hours: typically 12-hour shifts, often four days in a rowmonitoring centre with my business partner Andy Saile, we were clear that operator welfare was a priority. After all, the operator’s job is literally to be alert and responsive, so why would we want to do anything to detract from that? That’s certainly not the case at all remote monitoring centres, though. The vast majority follow the 12-hour shift template, usually in four days on, four off patterns. Anyone who has done any job knows that at the end of a 12-hour shift, fatigue kicks in, and the ability to focus diminishes. That’s particularly the case in roles where concentration and alertness are central to the job. For a CCTV operator in a monitoring centre, fatigue starts to affect the ability to work effectively during the stretch between 9 and 12 hours. That’s the danger period. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working. The operator is the link between the technology and the police. They are a key component of the whole system. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working Government guidance After working in remote video monitoring centres and experiencing what we considered both good and bad practice, when Andy and I established our business, we were clear that our operators would work in shifts that were no longer than nine hours at most. This delivers the best results for our customers and our staff. Our feeling was backed up by UK government guidance on designing CCTV control rooms. The Centre for the Protection of National Infrastructure has produced a detailed publication called 'Human factors in CCTV control rooms: A best practice guide'. This publication says: “12-hour shifts, although common in many settings, rIf the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffersepresent a greater risk to health and performance than 8 hour shifts in terms of higher perceptions of workload, fatigue and stress, risk of more errors and accidents, and higher health risks.” Negative impacts on health and wellbeing It further says: “Research confirms that the interruption of circadian rhythms (the 24 hour natural bodily cycle) by shift work can have a negative impact on both general wellbeing and physical health (short and long term), as well as on performance due to general fatigue (i.e. an increased likelihood of errors). Shift-patterns are often designed to meet commercial and operational requirements, but serious consideration should be given to minimising negative effects on health and well-being by the use of appropriate shift patterns.” The majority of our shifts cover seven or eight hours, and our operators never work more than four in a row. That allows for an average of three or four days between each batch of shifts. The idea is to avoid running staff into the ground, and that in turn makes our company more efficient and effective in the service of our clients. We’ve seen the results in practice: our operators only took four sick days in the past year. That’s four sick days in total, not per operator. It’s a CCTV operators have intense jobs, responsible for monitoring and responding to CCTV and intruder alarm events from commercial and domestic propertiesremarkably low figure in the remote video monitoring industry. Full readiness CCTV operators have intense jobs, responsible for monitoring and responding to CCTV and intruder alarm events from commercial and domestic properties. They liaise with the police, the customer keyholder, end users and any relevant authorities as required. Our customers are equipped with both cameras and motion sensors, which generate alarms on movement. When a movement in a specified zone occurs, the alarm is raised directly with the operator responsible for that site. The response differs from customer to customer depending on their own protocols. If there are dome cameras in place, for instance, they can be utilised to provide additional situational awareness. Escalating risks Traditional intruder alarm monitoring centres required the operator to react to an alarm by calling a keyholder, who would then respond to the incident. But remote monitoring requires concentration, focus, and deductive skills. The information required to make an informed decision isn’t immediately obvious – the The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiringoperator must work out what has moved and establish its cause. There’s no one to provide extra detail. The operator’s art is in working out for themselves what is relevant information in a scene and what isn’t. That requires their full attention. When operators work four days of 12-hour shifts in a row, risks escalate as a result. The risk that the wrong decision can be made. The risk that customers or police are not notified when they should be. There is a real-world cost associated with those decisions. The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiring, whether there’s an incident to respond to or whether the operator is simply prepared to act. Operator skills are diluted if their shift patterns are not considered. Why would you hire someone based on their skillset, and then work them into the ground until they’re too tired to execute those skills? Choosing a monitoring centre Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretation. A CCTV operator is an Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretationinvestigator and a conduit, bridging the divide between images, alarms and authorities, be they police, security guarding operations or keyholders. To run them into the ground is to diminish their ability to make intelligent decisions. It makes sense, then, to opt to work with a monitoring centre which puts the welfare of its operators at the forefront of its business. Start by asking your prospective RVRC about their shift patterns. A monitoring centre with respected and happy staff is a monitoring centre best able to provide a fully effective service, optimising your security systems and maximising your investment.
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandalism to SMB is around $3,370 per incident (US Small Business Administration), including a staggering 692 vehicle vandalism claims per day. Likewise, the average cost of theft to SMB is about $300 per shoplifting incident and $1,500 per employee theft incident, which accounts for 38% and 34.5% of all theft instances, respectively (National Retail Security Survey). High-performance artificial intelligent systems can automate the monitoring tasks Vandalism and theft have proven time and time again to be inconvenient and deconstructively harmful towards SMB. However, these financial burdens can be prevented with the use of the right security system. AI-based security systems with Deep Learning contain many features that many SMB owners find advantageous in their pursuit to stop unwarranted and unwanted money loss. Intrusion and loitering detection The first of many features that can help with vandalism and theft prevention is Intrusion Detection. High-performance artificial intelligent systems can automate the monitoring tasks for high-risk sites to provide a high level of security and security personnel monitoring efficiency. Traditional intrusion detection systems detect objects based on size and location, but they do not recognise the type of objects. Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognise a plethora of different object types, can distinguish objects of interest, thus significantly decreases the false-positive intrusion rate. The more advanced AI-based systems, like those we offered at IronYun, enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customisable in particular systems, which allows for a range of detection options. Advanced loitering detection software as such can detect and trigger real-time alerts for both people loitering and/or vehicles that are illegally parked in certain areas of interest. A benefit, which only certain advanced systems contain, is the ability to send trigger actions to 3rd-party systems in reaction to receiving an alert of loitering and/or intrusion detection. These trigger actions can be set to contact authorities immediately and/or trigger a scare tactic alarm or announcement to intruder/loiterer. Certain Face Recognition and License Plate Recognition software can record individual people/vehicles Face and license plate recognition In addition to the activity detection solutions, certain Face Recognition and License Plate Recognition software can record individual people/vehicles and use pre-configured lists to identify particular faces or plates that may be of interest, such as those in watchlists. These systems can also enable the users to upload images of faces not in the lists and search for them in the camera recording. For instance, if a person is detected several times loitering outside a store, one may save one of the detection photos into the watchlist, and set up an alert when said face is recognised again outside the building in the future. The alerts will help to deter and prevent vandalism or theft, and notify the authorities to the scene before the troublemaker completes the act. The main attributes of high-performance Face Recognition systems which maximise assistance with vandalism and theft management include: Face match rate > 90% with good camera angles and lighting. Processing multiple streams and multiple faces per image. Live face extraction and matching to databases of thousands of faces within 3 seconds. State-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR camerasIf the watchlist individual is wearing a mask or their face is not in view of the camera, their license plate may be a good indicator. If a particular car is detected several times loitering in the parking lot or street outside a store, the user can set the alerts for such car to get notified in the future. With an AI solution like this, common street cameras should be equipped with LPR capabilities. So, state-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras. High-performance alert mechanisms A high-performance AI solution, in addition to having high accuracy, should be able to: Easily integrate with 3rd-party systems Work well with all ONVIF IP cameras including infrared and thermal ones (for Intrusion detection) Analyses video streams in real time and trigger alerts within a few seconds Send alerts to multiple VMSs, connect with signalling devices such as loud speakers or flashing lights Send email notifications to security staff and police departments Send notification on mobile device using AI NVR mobile app Maintains a record of all alerts to provide evidence of intrusion and loitering instances for police and insurance agencies. To assist in theft and vandalism prevention, AI-based security systems with deep learning will do all of the tedious work for you. Their low cost and high performance also make them the most accessible security solutions in the market with large return on investment. Stopping crimes is a difficult, ongoing challenge, but with the right AI software, business vendors and police departments can do so with more ease.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organisation’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organisations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorised staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organisation will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organisation. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organisation’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organisations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorised person into a facility. Deploying video cameras, sensors Some organisations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimise throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorised persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cyber security, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analogue cameras. A higher percentage of commercial customers use mobile applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Upgrading a two-wire analogue intercom to a conventional IP video system typically involves messy and costly rewiring work. So what happens when there is a need to install over 500 IP systems into a single building? One company, Hikvision, has developed an innovative two-wire solution, which is already making waves at the luxurious RiverGate condominium in Singapore. “If someone rang the bell at the side entrance, it wouldn’t always ring in my apartment upstairs,” says the Chairman of the Condo Council, who lives at the RiverGate condominium in River Valley, Singapore. “Visitors often had to call me to let them in, and I would have to travel down 20 floors to the main entrance. It became incredibly frustrating.” Switching from analogue to IP system The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it" The resident’s story is typical of millions of residents across Asia, where high rise living is the norm. In Singapore, the first condominiums were built back in the 1960s, to tackle the challenge of high population density and soaring land costs. Today, high-rise living in Singapore is not only necessary but highly desirable, with many condominiums offering swimming pools, spas, sky-gardens and a host of other deluxe facilities at exclusive locations across the island. Nevertheless, even the most luxurious apartment blocks are wrangling with aging access control systems. Many systems only work intermittently, while all but the newest builds feature intercoms that use out-dated two-wire analogue cabling. “The intercoms in Asia’s condos are crying out for an upgrade to IP, but the infrastructure just doesn’t support it,” says Daniel Han, Engineering Director at Serron Technology. Hikvision IP security systems Making the move to IP intercom systems is a logical step, as it would offer a host of benefits to Asia’s high rise residents. First of all, IP systems are video-based and can work with HD cameras, giving homeowners crystal clear images of who is at the door potentially dozens of floors below. What’s more, they also typically link to an app, so residents can see and interact with the person at the door – even when they’re not in the apartment. “Video IP systems are much more functional, more future-proof, and incredibly reliable,” adds Daniel. The problem is, most of today’s IP intercom systems typically need to replace wire for an internet connection – and that means an upgrade to the building itself. “To upgrade to an IP system across a whole condominium is a massive job,” Daniel confirms, adding “Chasing out walls and replacing wiring is disruptive, messy and a time-consuming task. In addition, the task is also expensive, and management companies would have no choice but to pass this cost on to the residents." Two Wire IP Video Intercom System Although it may seem like an impossible problem, one company – Hikvision – has provided an excellent solution. As its product name suggests, the company’s Two Wire IP Video Intercom System is purpose-built to work over existing two-wire cabling, so that two wires supply power and transmit voice, video and control signals at the same time. At the heart of the Hikvision two-wire system is the Two-Wire Video/Audio Distributor (DS-KAD706). It’s this intelligent box that makes the two-wire solution possible by consolidating power and internet connectivity, enabling it to be distributed out to the external door video stations and the indoor video units. Hikvision two-wire solution Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station with a video screen At Singapore’s luxurious RiverGate Condominium complex, the management team was so impressed with the potential of the Hikvision two-wire solution that they have already installed it into the condominium. Each of the 545 apartments within RiverGate has a Hikvision Intercom Indoor station (DS-KH6320-WTE2) featuring a video screen, while each of the entrances to the building has a Video Intercom Door Station (DS-KD8102-V) featuring an HD camera. If someone calls an apartment via a door station downstairs, it rings the appropriate indoor screen. The resident can see the visitor and have a conversation with them, before letting them in with a simple tap of the screen. Hikvision Video Intercom Master Station (DS-KM8301) The RiverGate central management offices also have the Hikvision Video Intercom Master Station (DS-KM8301), to monitor the building perimeter and control entry. Plus the complex has installed a number of Hikvision’s Waterproof and Vandal-proof Card Readers (DS-K1104M), to ensure that only authorized individuals can move around the building. What’s more, by downloading the HikConnect app, residents can be alerted to a visitor when they’re away from the video unit, or when they’re out of the premises entirely. The app offers the same functionality as the video screen – allowing residents to see visitors, speak to them, and even choose to let them into the building. Reliable and innovative IP-based solution The benefits of the new Hikvision system are far-reaching. From a building management perspective, the ability to use the existing two-wire system has kept installation costs to a minimum. The ability to use the existing two-wire system has kept installation costs to a minimum “Hikvision’s Two Wire Video Intercom System is a state-of-the-art product, and ideal for retrofitting and modernising large residential and office building projects. Across Asia, there are thousands of high rise buildings whose access control systems desperately need upgrading. This sleek system provides a cost-effective and elegant IP-based solution – one that’s ideal for high end residential or commercial environments – for minimal cost and disruption.” said Jacky Xie, the Project Manager at Hikvision, who is very optimistic about the potential of the company’s two-wire IP solution. High-performance video and access control system And of course, it’s had a huge impact on RiverGate’s residents. One of the residents’ of the Condominium said, “The new intercom does more than the old system. I particularly like the functionality of mobile app – I can use my phone to let visitors come in even when I don’t have access to the indoor device, like when I’m not at home or using the bathroom. It’s also such a relief to have an access control system that works reliably. I love it; it’s more convenient, it’s really easy to use, and I feel safer.”
Intelligent LiDAR sensor technology from OPTEX, a globally renowned sensor manufacturer, is helping to protect the Belfast Call Centre premises and employees of a Fortune 500 company. Redscan laser sensor The Redscan laser sensor, which was installed by ZEST Fire & Security, a fire and security systems specialist, was required by the company to increase security in private areas of the facility only accessible to authorised personnel. This area, however, is only separated from the rest of the office space by partition walls which leave a gap between the wall and ceiling. OPTEX LiDAR creates a ‘virtual’ detection area that cannot be seen by the naked eye and that can be easily adjusted to the site requirement using the configuration software. In this instance, the REDSCAN RLS-2020S creates a virtual wall between the top of the partition wall and the ceiling of the building, and monitors movement or objects being thrown from one side to the other. OPTEX LiDAR technology OPTEX LiDARs work by analysing the speed, size and distance of the objects detected OPTEX LiDARs work by analysing the speed, size and distance of the objects detected, meaning they track the objects within the detection area and understand the ratio size/distance of the object. This provides the ability to accurately detect a specific size of object either at a distance or close up. In the event of any movement being detected, a security alarm is raised, and alerts are immediately sent to the 24-hour on-site security team. Masaya Kida, Managing Director of OPTEX EMEA, says “OPTEX’s LiDAR technology delivers the greatest accuracy of detection. We are constantly working to improve our technology to provide the highest quality sensing solutions.” REDSCAN RLS-2020 series Masaya adds, “Thanks to the high sensitivity and high-speed detection of the Redscan LiDAR sensor, it is able to detect a thrown object as small as a USB stick. The exact point of detection can also be mapped and associated with the cameras monitoring this area.” Justin Doherty, Director at Zest Fire & Security, said, “OPTEX provided us with great support and service throughout. The client was very pleased with the speed and simplicity of the installation, and is very happy with the performance of this new solution.” REDSCAN RLS-2020 series provides 95° detection and either 20x20m or 30m radius detection range and PoE connectivity.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
The Smart Cities Mission is an innovative initiative by the Government of India to drive economic growth and improve the quality of life of people. It aims to achieve this by enabling local development and harnessing technology as a means to create smart outcomes for citizens. A hundred cities across the country were shortlisted by the government, which were to be promoted as ‘Smart Cities’. Vadodara was selected among those 100 cities to be developed as a smart city in India, to enhance economic growth, and improve the quality of life of people by enabling local area development, deploying smart solutions and harnessing technology. Optimising city traffic management Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimising traffic management With a population of approximately 2.39 million, Vadodara is the third largest city of Gujarat, and a major industrial, cultural and educational hub of western India. The city is compact and crowded, with a vibrant cultural life that draws a lot of traffic. It is vulnerable to situations of overcrowding, road accidents, criminal activity, and natural disasters. Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimising traffic management, without disrupting daily lives. To this end, they sought a state-of-the-art, open platform that could expand in phases, in sync with the city’s growth. Unified Video Computing Platform As Vadodara’s expansion plans are underway, so too are discussions about growing the city-wide surveillance system. As part of the initial process, a project team comprising Smart City officials, Videonetics, and technology partners did an extensive research to mark out key areas and traffic junctions across the city. Going a step further, Videonetics developed a solution based on its Unified Video Computing Platform (UVCP) for the entire city, so that its people, property, and assets remain secure. State-of-the-art AI & DL powered Intelligent VMS and Video Analytics to provide continuous viewing and recording, enabling security operators and law enforcement to proactively identify, and effectively respond to, events to mitigate their impact. Specifically, now the law enforcement authorities can automatically detect overcrowding, unattended baggage, and perimeter intrusions, even under the cover of darkness. Automatic Number Plate Recognition (ANPR) system across 15 traffic junctions in Vadodara, to identify suspected/ unwanted vehicles and non-standardised number plates, as well as to generate detailed reports on vehicle movements, and much more. Command Control Centre, to provide a bird’s eye view to operators, about what is happening across the city. From traffic control to citizen security, operators remain alert and ready. With greater situational awareness, municipality officials are proactively responding to incidents such as garbage overfill, incidents of water-logging, traffic congestions, hazardous debris on roadways, illegal parking, and more. Video surveillance systems Videonetics’s solution manages over 550 IP cameras throughout the city of Vadodara Under the project, video surveillance was deployed along public ways, in urban passenger transport stations, municipal buildings, traffic junctions, entry and exit connecting roads to city, and more. To date, Videonetics’s solution not only manages over 550 IP cameras throughout the city of Vadodara, but also proactively identifies and effectively responds to events, to mitigate their impact. Furthermore, the video surveillance system helps in the maintenance of peace in the city, in upholding law and order, and providing better policing services. The key results are: 1. Increased safety and security with 24x7 monitoring of city area, 2. Faster crime investigations, 3. Traffic police having in-depth knowledge on vehicle count and movement, and 4. Swift action by on-site traffic police, as they get alerts on traffic congestion, unwanted/ hot-listed vehicles, and so on. City surveillance Moreover, Videonetics’s solution has also been able to help the police in monitoring celebration of festivals and VIP movement in the city, and building a security net for its citizens. Overall, it has been successful in ensuring the safety and security in the city of Vadodara, and has played an important role in becoming a smart and connected city.
The prestigious Jewel complex at Singapore’s Changi Airport is receiving the highest standards of perimeter protection, thanks to the manufacturer of road blockers, bollards and vehicle barriers, ATG Access. Singapore's Changi Airport, which has scooped the title of the world's best airport for seven years running, has strengthened its position with the launch of Jewel – a mixed-use, lifestyle hub for visitors. Taking more than four years and $1.25 billion to build, Jewel covers 1.46 million square feet and includes sky gardens, the world’s largest indoor waterfall, aviation lounges, restaurants and over 300 shops. The extension to Changi Airport aims to position the facility as a leading, competitive, and safe international airport for its millions of visitors. As such, it needed the very best in perimeter security. Tested lift-out bollards In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product As the main airport site is fully operational 24/7; the security measures placed around the terminal needed to be installed quickly and effectively. With this in mind, ATG Access utilised its reputable shallow mount technology, which delivers maximum security with minimum disruption. More than 1,000 impact-tested Shallow Mount Bollards and Shallow Mount Lift-out Bollards, requiring a foundation depth of just 112 mm, were deployed around the airport. To ensure the security products complemented the aesthetics of the terminal and surrounding areas, they were coated in varying shades of silver to suit. In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product, meaning it was one of the first impact tested lift-out bollards in the industry. Critical national infrastructure Following this, all of the products were developed at ATG’s manufacturing facility in Singapore. Gavin Hepburn, Managing Director at ATG Access, said: “With over 66 million passengers travelling through the airport each year; the new and iconic Jewel project required outstanding perimeter security measures to protect the asset and its passengers. Changi airport has taken its security very seriously over the last eight years, ensuring all terminals are protected from potential terrorist attacks or security breaches - after airports have been identified by security services as critical national infrastructure. This project has been our third biggest perimeter project to date, after Hamad International Airport Project (Doha) and Jubail Industrial Project, KSA, and we are proud to have been selected as their security provider.”
Haier Group, China’s home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realise multiple tasks within the whole industrial park. First, to prevent theft and timely detect people climbing over the perimeter fence. Second, to provide comprehensive monitoring in the whole industrial park and inside the factory which includes: monitoring of production line and employees’ smoking behaviour during working hours at office areas; efficient employee attendance; vehicle identification at the entrance and exit areas of the industrial park; and the overall management of all devices, data report output, etc. Intrusion detection The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the system also supports further device upgrade based on customer’s future plan for the next several years. AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. The combination of advanced AI analytics and real-time alerts to a desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. Smart IR technology The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. These cameras are equipped with smooth control, high quality image and good protection As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Face recognition Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR Cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognise the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle colour detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices At the management centre, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Up-to-date Dahua AI equipment Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost. Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation,” said Zhao Shengbo, Regional Director of Dahua CIS. “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals