Live-action firefighting and emergency rescue operations, drone demonstrations, and a revamped conference discussing Artificial Intelligence, safety planning for cities of the future, and securing the Dubai Expo 2020, are some key features of Intersec 2019, as the final preparations are laid ahead of its big opening in Dubai next week. The 21st edition of the world’s leading trade for security, safety, and fire protection takes place from 20-22 January 2019, with more than 1,200 exhibitor...
The rugged build quality of the new Invictus PTZ camera from UK CCTV manufacturing company, 360 Vision Technology, has been proven in the field during a recent road traffic incident in north London, which provided a real-world test for the camera and its ‘Attack Detect’ response feature. Built into each Invictus camera, 360 Vision’s ‘Attack Detect’ automatically responds to a detected increase in camera load (such as the camera being hit by an object). On detection...
OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR and REDSCAN series sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forwar...
Senstar, a global provider of perimeter intrusion detection systems (PIDS) and video management systems (VMS), is pleased to introduce Kristen Cory as its new Vice President, Sales, North America. Effective January 1, Mrs. Cory has assumed direct responsibility for Senstar’s North American sales organisation. “I am excited to join Senstar and I am looking forward to working with the US and Canadian teams to grow the Senstar brand,” said Mrs. Cory. “Senstar’s market...
DW, the provider of digital recorders, surveillance cameras and related management software, announces the upcoming release of our 4MP MEGApix video analytics cameras. The new cameras — including fixed and varifocal lens turrets (DWC-MTT4WiA, DWC-MTT4Wi28, DWC-MTT4Wi36 and DWC-MTT4Wi6), vandal domes with fixed varifocal lens (DWC-MVT4WiA, DWC-MVT4Wi28, DWC-MVT4Wi36 and DWC-MVT4Wi6), and fixed lens bullet (DWC-MBT4Wi28 and DWC-MBT4Wi36) — offer a vast array of analytical solutions. A...
The Middle East is proving to be a hot bed of business for global suppliers of security, safety, and fire protection, with the world’s top industry players all set to converge at Intersec 2019 in Dubai to drive more double digit growth. From video surveillance technologies with Artificial Intelligence and deep learning capabilities, to cloud-based access control solutions and flame retardant protective clothing, Intersec 2019 will shine the spotlight on game changing solutions solving cha...
Steel fencing manufacturer Zaun Limited has designed a new QuickFit post system for its multi award-winning Rapid Deployment System (RDS), that was first created for political conferences and forms part of the National Barrier Asset. And they have pre-assembled a ‘plug & play’ variant of perimeter intrusion detection experts Harper Chalice’s FenceSecure to offer a speedily-installed temporary HVM and detection fencing system. RDS has been the firm favourite with police for securing party conferences since it saved up to 90% of police time and proved its rapid-install-with-high-security credentials during a whistle-stop tour from Brighton to Birmingham via Manchester for the three main UK political parties’ autumn conferences in 2012 and at the G8 summit in Northern Ireland in May 2013. RapidSecure plug & play PID system The new QuickFit post system halves the manpower for installation, with a team of two able to install a 30m run in just half an hour in trialsThe new QuickFit post system halves the manpower for installation, with a team of two able to install a 30m run in just half an hour in trials. Opposing wedge-shape protrusions on the posts and clamp bar serve as a pincer system to clamp the fence panels to the posts. They are locked in place with a single bolt fixing per post with the head of the bolt completely encapsulated inside a tube so it cannot be removed. Harper Chalice’s RapidSecure plug & play PID system is the rapid deployable version of FenceSecure, an approved solution for high security and government applications that has been deployed successfully on many high-profile projects. Providing early warning of perimeter breach RapidSecure takes that same technology and proven performance and allows it to be utilised on a rapid deployable fence. It detects intruders cutting and climbing the fence fabric to provide early warning of attempted breach of the perimeter and quick organisation of the relevant response. RDS has won a number of security innovation awards, such as the Counter Terror Expo Excellence Awards for Best Physical Security Innovation When integrated with CCTV, the solution can provide complete protection and monitoring of a secure boundary reducing the need for security patrols and allowing more centralised or focussed response teams. The overall flexibility and simplicity of installation means that the system can be operational and provides protection against intrusion very quickly. It also makes for easy moving and redeployment, making it perfect for temporary construction or road works that require a high-security solution. Winner of security innovation awards RDS has won a number of security innovation awards, including the Security Innovation Award and the Counter Terror Expo Excellence Awards for Best Physical Security Innovation. After the Labour autumn conference in 2012, Inspector Steve Worth, Specialist Operations Branch, Conference Planning Unit, Greater Manchester Police, said: “RDS is now firmly the preferred product for the delivery of security operations for party political conferences we police, fully supported by The Home Office.”
New for the UK and Republic of Ireland security markets, the Pyronix Enforcer Perimeter Protection Kit ensures that intruders are detected before they gain access to residential or small commercial properties. Two-way wireless technology Featuring secure Enforcer two-way wireless technology and a combination of shock sensors and magnetic contacts, the Enforcer Perimeter Protection Kit provides an effective, alternative solution to internal, volumetric motion detection. Our new Enforcer Perimeter Protection Kit meets the growing demand for security systems that raise the alarm before property intrusion occurs" Laurence Kenny, Marketing Manager at Pyronix comments: “Pyronix is committed to providing installers and system integrators with a great range of solutions and options to promote to end-users and our new Enforcer Perimeter Protection Kit meets the growing demand for security systems that raise the alarm before property intrusion occurs.” The new Enforcer Perimeter Protection Kit comprises: 1x Enforcer all-in-one two-way wireless control panel with DIGI-WIFI communicator 4x Combined wireless shock sensor and magnetic contact (MC1/SHOCK-WE) 1x Wireless mini magnetic contact (MC1MINI-WE) 1x Wireless Deltabell module (DELTA/MOD-WE) Pyronix Enforcer Perimeter Protection Kit The Perimeter Protection Kit provides greater opportunity for early detection and prevention of break-ins and has additional benefits: End-user convenience and protection - the perimeter protection kit enables the end-user to move around their property whilst continuously protecting it. Installer convenience – an all-in-one, great value kit that’s ready for installation; easy to handle and quick to install. Wireless solution - possesses advantages over wired solutions; faster and easier to fit with minimal disruption. Easy ordering – all that the security professional needs in one pack; no individual product ordering to construct the equivalent system. Building on the award-winning Enforcer’s status as “the installer’s choice” and featuring robust design and materials, the new Enforcer all-in-one Perimeter Protection Kit provides security professionals and end users with a convenient and highly effective first layer of defence.
The original rapid-deploy anti-vehicle and electric barrier fencing system – first used in tandem on the London 2012 Olympics – is now even quicker and easier to roll out with a pre-configured ‘ends’ to pulse-protected ‘zones.’ SecureGuard HVM temporary barrier fencing system Three renowned names in perimeter security have collaborated to incorporate the new rapid-deploy electric fence technology into the established SecureGuard HVM temporary barrier fencing system. Electric and electronic fencing expert, Harper Chalice Group Limited has developed RapidPulse, a pre-configured ‘start’ and ‘stop’ to each pulse-monitored ‘zone’, to allow rapid deployment of its PulseSecure system. PulseSecure system Steel fencing manufacturer, Zaun Limited has created special pairs of posts for the anchor point fencing panels Steel fencing manufacturer, Zaun Limited has created special pairs of posts for the anchor point fencing panels, with crossed bracing bars to bear the load of the electric cabling. The system can be supplied with any of Zaun’s existing fencing panels – including HiSec, HiSec Super 6 or ArmaWeave – all deployed super-fast with no foundations on top of SecureGuard HVM barriers from Highway Care Security. “This is set to revolutionise the market for temporary high security utilities, roadworks and construction compounds without the need for any civil or ground works,” says Zaun sales and marketing director Chris Plimley. Perimeter intrusion detection Trial installations have seen Harper Chalice, Highway Care Security and Zaun deploy 30m of HVM barriers and fencing with perimeter intrusion detection in just one hour. The partners first proved the concept at the London 2012 Games, at which they secured various sections of the Olympic Park perimeter with temporary HVM barriers and fencing combined with PulseSecure. RapidPulse perimeter security system The overall system provides a psychological barrier as well as a physical deterrent" The RapidPulse innovation now makes it possible to install perimeters temporarily, break them down, and redeploy them in a fraction of the time, making secure but mobile compounds a reality as works progress during a project. Harper Chalice MD Chris Hackett says: “The overall system provides a psychological barrier as well as a physical deterrent. And it offers a fantastic solution for ongoing security when a breach in a permanent perimeter is required temporarily for repair, maintenance or upgrade, without reducing the overall protection of the site.” The system is fully compliant with BS 1722 Part 14 and Part 17 and can be supplied either galvanised or polyester powder-coated with all components manufactured in the UK. CCTV columns, turnstiles and access portals Each post and panel can also be supplied up to 3.5 metres total in height, while pedestrian and vehicle gates can also be incorporated, as can CCTV columns, turnstiles and access portals. The system is ideal for using around high security temporary utilities and construction sites, to protect road works or at major events that might be at risk of protests, riots or terrorist activity. SecureGuard with RapidPulse for effective intrusion detection SecureGuard with RapidPulse provides protection against vehicle attack, pedestrian intrusion and rock fall and debris dispersion SecureGuard with RapidPulse provides protection against vehicle attack, pedestrian intrusion and rock fall and debris dispersion. SecureGuard was developed specifically for the G8 Summit in Northern Ireland and has since been deployed at the Glasgow Commonwealth Games, the NATO Conference in South Wales and the Nuclear Security Summit in The Hague. It forms part of the National Barrier Asset and has been used to secure the main political parties’ party conferences over recent years. Mobile high security solutions SecureGuard is a mobile high security range of products from Highway Care all tested to PAS68:2010 to withstand multiple attacks by a 7.5 tonne truck at speeds of 20, 30 and 50mph without them breaching a security perimeter. Mat White, Highway Care Security sales director, says: “The increased threat of terrorism and high value crime is driving the need to provide high security sites and critical infrastructure with safe and effective physical protection. This provides the ultimate in rapid rollout solutions.”
Intrusion is the act of intruding, forcible inclusion or entry in an area that is not welcome. Track is the act of following the movements or trail of someone or something, typically in order to find them or note their course. Without staring monitors for 24/7, Intrusion Video Analytics can help partners to detect the act of intrusion and give alerts, and Track Video Analytics can help users to find the direction of moving object, give alert if the object goes to wrong direction. Most intrusion and track related video analytics on the market are available with Surveon, providing partners many options to meet different projects' requirements. Surveon provides a variety of video analytics to meet different projects' needs. They have been broadly divided into two categories - Intrusion and Track with numerous sub-categories under their ambit: Intrusion video analytics solutions Intrusion Detection - It detects malicious activities, policy violations or invasion; once detected, it will trigger alarm. It can be used in places where safety and security are top priorities, for example hard shoulders and the sensitive area in campus or airport. Forbidden Area Detection – Setting a detection zone as forbidden means there should be no trespasses in the set area; any incoming will trigger alarm. It can be applied for places where perimeter security is required such as server room and data center. Virtual Fence – Setting a virtual fence means drawing a line that should not be crossed; it will trigger alarm when the line is crossed. It can be employed in places where crossing will cause damage, for example country borderline and waiting line on station platform. Going Out Detection – By setting a detection area, boundaries and the object size, objects can move around in the set detection area but cannot cross the set boundaries, otherwise it will trigger alarm. This can be applied for attendance checking, preventing a student leaves the classroom or an employee gets off work before the schedule time. Track video analytics solutions Fisheye Auto Tracking - The windows show the movements of object with 360° surround and 180° panoramic viewing angles, which allow fisheye to work as PTZ camera, performing wider monitoring. It can be applied for place with valuable things and needs to be monitored intensely, for example boutique stores. Tailgating Detection - The alarm will be triggered when an object moves in the same direction but does not stop or stays too close to the previous one when crossing the dividing line in the detecting area. This can be used when the act of passing through needs to be charged or in access control, for example station gates, parking lots, toll booths, and the ATM. Surveon intrusion video analytics It is hard for most video analytics to accurately distinguish two objects when they pass each other. By analysing certain specific physical features, Surveon intrusion video analytics help partners to easily recognise two objects' behaviors even when they move side by side or cross to each other. With conventional solution, when an intrusion object goes through a pillar for seconds and shows up again, the system will wrongly recognise the object as a new intrusion object. With Surveon intrusion VA solutions, the system can resume detecting work automatically when the object passed a pillar and showed up again, giving partners an accurate alert for detecting unwelcome visit.
Senstar, global perimeter intrusion detection and video management solutions provider, is pleased to announce its Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system has received the Fixture Seal of Approval (FSA) from the International Dark Skies Association (IDA). IDA is the recognised authority on light pollution. Its mission is to preserve and protect the nighttime environment and the heritage of dark skies through environmentally responsible outdoor lighting. To help accomplish this, IDA developed the FSA program to provide objective, third-party certification for lighting that minimises glare, reduces light trespass and doesn’t pollute the night sky. Hybrid perimeter intrusion detection system The Senstar LM100 combines two key security functions in one cutting-edge product, acting as a powerful deterrent against intruders by detecting and illuminating them at the fence line. Its engineered lighting is environmentally friendly (its power-efficient LED technology uses 95% less power than traditional security lighting systems) and is specially-designed to minimise light pollution. “The minimised light pollution of the LM100 makes it ideal for deployment in urban and residential environments where legislation is changing, and general environmental awareness continues to grow,” said Product Manager Todd Brisebois. “Senstar takes pride in developing high quality products that take into consideration environmental impact and receiving the FSA is testament to our commitment to environmental preservation. Thank you to the IDA for this approval.”
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's prisons, particularly as a means of smuggling. SPYNEL 360° thermal imaging sensors To protect prisons, borders and critical infrastructures from smuggling and terrorism, Electro Optical Industries upgraded their most powerful 360° thermal imaging sensors SPYNEL-X and SPYNEL-S, integrating a visible channel and a laser rangefinder to the thermal cameras. The new V-LRF option aims to facilitate the tracking and the identification of a detected threat, thanks to the full HD visible cameras’ optical zoom (x30). The exact distance of the threat is provided by the laser rangefinder in real time, an option particularly adapted to the detection, tracking and recognition of the smallest targets, like UAVs. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification An innovation it is, as all other systems on the market must use separate sensors to get similar functions: one sensor for detection, a radar for instance, and another sensor for identification, such as a PanTiltZoom (PTZ) camera. Xavier Elbaz, Sales Manager at Electro Optical Industries explains: "With separate systems, it is hardly possible to ensure a real 360° coverage for detection and identification because of blind sectors created by the mechanical supports. Moreover, separate sensors must be integrated and calibrated to properly operate together. SPYNEL & its V-LRF option ensure no blind sector for a real 360° coverage in all surveillance phases: detection & identification." SPYNEL V-LRF with CYCLOPE detection software In addition, most of the time, UAVs' small size and low electromagnetic signature go unregistered by traditional detection measures. With SPYNEL's thermal imaging technology, it is impossible for a drone to go unnoticed: any object, hot or cold will be detected by the 360° thermal sensor, day and night. SPYNEL V-LRF and its automatic detection & tracking software CYCLOPE are easy to deploy and to use, and the system is easily interfaceable for multi-sensor protection of critical infrastructure like prisons. Data is smoothly merged with other sensors’ data like radars, AIS, fence vibration sensors, etc., and displayed on the same interface, whereas separate sensors must be integrated and calibrated to operate properly together.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable entry management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorised individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorised access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable hardware components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorised employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing security needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorisations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorisations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion alarm systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customised intrusion systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customise the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video management system A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full alarm and event management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analysing video content over large distances Intelligent Video Analytics have the unique capability of analysing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical security solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented security measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organisers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organisers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current screening methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, CCTV, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security method limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding security reach with FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognising moving magnetic signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organised into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective mass screening solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defence force. Wireless technology for cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need for more security in K-12 schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging the gap between IT and physical security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT and cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training courses for integrators and partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instil added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new centre in Barcelona (in addition to current R&D centres in Copenhagen and Sofia, Bulgaria). Making camera installation easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the colour of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras with sound detection technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analysing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralise systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine learning engine for crime prevention In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focussed on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyse shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition of IP door intercom company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analogue components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that RagingWire Data Centers has installed Boon Edam’s Tourlock 180+90 security revolving doors as part of its integrated access systems that protect their data centers in Ashburn, Va. and Sacramento, Calif. Founded in 2000, RagingWire was one of the first companies that helped to build the multi-billion dollar global data center colocation industry. Now, RagingWire is the North American data center platform within the portfolio of NTT Communications, which operates 140 data centers in 20 countries worldwide, making RagingWire one of the largest and most financially solid data center companies in the world. Demanding hyperscale cloud RagingWire is recognised as an industry leader in data center security and overall customer experience" RagingWire uses Tourlock security revolving doors at its Ashburn VA3 Data Center, which features 245,000 square feet of space and 16 megawatts of critical power, and its Sacramento CA3 Data Center, which is a 180,000 square foot facility with 14 megawatts of critical power. VA3 and CA3 are part of RagingWire’s portfolio of data centers in Ashburn, Northern California and Dallas, Texas. “As the colocation data center of choice for some of the most demanding hyperscale cloud and enterprise companies, RagingWire is recognised as an industry leader in data center security and overall customer experience,” said Mark Borto, CEO of Boon Edam Inc. “We are proud to provide an important part of RagingWire’s sophisticated, multi-layer, integrated security system.” Provide efficient passage Boon Edam’s security revolving doors provide efficient passage for hundreds of people daily at RagingWire’s data centers. The doors prevent piggybacking and tailgating during both entry and exit by using a combination of sensors to recognise shapes, size and volume in three dimensions, and then stopping the door when a violation occurs. Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate"The state-of-the-art system also generates an accurate picture of exactly who is in the building at all times. “Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate,” said Eddie Ankers, Director of Corporate Security at RagingWire. Analyse suspicious behavior “By adding these doors to our defense-in-depth security strategy, we are providing the best possible protection system for our customers’ mission critical equipment.” In addition to Boon Edam’s Tourlock security revolving doors, RagingWire’s layered security approach features highly trained, 24x7 security staff, biometric scanners, badge readers, intelligent high-definition video cameras that analyse suspicious behavior, anti-tailgate mantraps, a building-within-a-building design, anti-climb perimeter fencing, concrete bollards in front of building entryways, and an anti-ram security gate.
CaleyLock Edinburgh was established in 1973 and is one of the longest established locksmiths in Edinburgh – the current owners took it over in 2011 and moved into their brand-new purpose-built premises in December 2017. CaleyLock installs and commissions as well as builds cylinders and padlocks in-house and their main customers belong to utilities, commercial, high-end residential, banking, local authorities and leisure sectors. When preparing to move to their new premises, they needed a security solution which would not only secure their premises, but also enable them to create a Showroom for customers – this is where CLIQ from Abloy came in. CaleyLock worked together with Abloy UK to install CLIQ throughout their premises to secure a number of external and internal doors. A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for employees CLIQ monitoring & access solutions A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for people including employees, and monitor the access to restricted areas. The owners also now have peace of mind that nobody can access unauthorised areas outside of work hours and lost or stolen keys can easily be deleted from the system. CaleyLock are also delighted to now have a CLIQ Showroom to be able to demonstrate PROTEC2 CLIQ from Abloy to customers and end-users in a real-life working environment, which has proven to be efficient in displaying the benefits that CLIQ can bring to any organisation, big or small. Ross McKay, Director of CaleyLock Edinburgh said of the installation “We find CLIQ is working really well for us, as our new premises are purpose built – there were no locks installed initially so this has been a great upgrade to the security. As part of the system, we also have a low energy Bluetooth key which is ideal for people working in remote areas as we can see from the audit trail who has accessed specific sites, and when.”
Covering hundreds of acres, Dunsfold Park near Guildford began life as a military airfield in 1942, before making its mark in aviation history for multiple innovations as part of BAe Systems until 1960. Later, the estate was acquired by the award-winning Rutland Group, who continue to manage the site, now in partnership with owners, Trinity College Cambridge. Today, in addition to its private airfield and motor test track, the estate has a thriving business park where over 100 companies employ 700 people. As a popular film location, it is home to the BBC’s Top Gear team and the backdrop to TV and Hollywood blockbusters from Casino Royale to Come Fly With Me. The continued rejuvenation of Dunsfold Park includes investment in sustainable new infrastructure, with plans to further develop the estate amenities and community. And every year, thousands of people celebrate the site’s illustrious history at its air and motoring show, Wings & Wheels. IDIS HD IP video solution To support the continued development of the high-profile, multi-use estate, the management team wanted to replace the legacy security system with an HD IP infrastructure to increase capacity, image quality and flexibility to scale. Although the estate is secured by a physical perimeter fence, 24/7 surveillance is a pre-requisite to ensure robust protection for the growing number of people working on site, the businesses and many high-value assets. With so many diverse uses – from landing jumbo jets and testing high-performance cars to housing high-tech businesses and hosting public events – upholding health, safety and security in all eventualities is vitally important. The customised design was built with state-of-the-art IDIS equipment to deliver seamless plug-and-play ease of useThe solution had to be easy to use and operate, extremely resilient and offer good value. A key objective was to improve 24/7 visibility of hard-to-reach locations in all weather conditions, like remote entrance gates, with the flexibility for operators to easily zone in on specific areas as required. Integrated fibre optic-wireless IP HD surveillance Following a successful pilot trial, the contract was awarded to expert security integrators ISD-Tech to deliver a comprehensive HD surveillance solution running on an integrated fibre optic and wireless IP network. The customised design was built with state-of-the-art IDIS equipment to deliver seamless plug-and-play ease of use, high-quality real-time images with no visible latency and industry-leading resilience, all from a single provider. Comprising hardware, software and peripherals from the IDIS DirectIP suite, the solution includes a mix of seamlessly integrated ruggedised infra-red PTZ from Redvision as well as static cameras, HD network video recorders (NVRs) and cost-free IDIS Centre video management software. The versatile IDIS equipment ensured that challenges in the site environment could be easily overcome to provide complete 24/7 coverage, including long-range night-time visibility of previously hard-to-reach areas. The innovative solution is optimised to meet Dunsfold Park’s current surveillance requirements while providing the foundations to scale across the wider Dunsfold Park portfolio and add new technologies, such as ANPR, as its needs evolve.
Officially inaugurated in October 2017, Ion Oblemenco Stadium in the Romanian city of Craiova is the country’s most modern football arena at a capacity of over 30,000 seats. The futuristic stadium, inspired by the art of Romanian sculptor Constantin Brâncuși, was built from the ground up over the course of two-and-a-half years at a total cost of EUR 51 million. It is home to football club CS Universitatea Craiova and was ranked fourth on the Stadium DB website list for Stadium of the Year 2017. The high-profile project was built with a clear goal: Hosting international and premium league matches not only in the Romanian capital of Bucharest, but also in the city on the river Jiu. For this reason, the municipality of Craiova required a stadium security solution on par with stringent guidelines – according to the year 2020 European football championship standards – to guarantee safety during mass events. Working closely with the on-site team, Bosch experts installed a fire and safety solution composed of four fire panels and 1,500 detectors Fire and safety solution Looking for a trusted vendor with sports stadium experience, plus the ability to deliver the majority of necessary equipment as a single point of contact, Craiova officials opted for Bosch. Working closely with the on-site team, Bosch experts installed a fire and safety solution composed of four fire panels and 1,500 detectors. The stadium also received a quality sound system with Electro Voice Pro Sound speakers for music and commentary, Dynacord Promatrix for evacuation, Bosch loudspeakers for interior sound, as well as a conference and interpretation system for the pressroom. However, the real “kicker” of the football stadium installation is the comprehensive video security solution: Ion Oblemenco Stadium boasts a fully integrated Bosch video security system including 211 cameras, centrally managed on a single platform through an enterprise edition of the Bosch Video Management System (BVMS). Smart video surveillance system The networked cameras serve a wide range of functions at entry and exit points and areas surrounding the stadium: On the perimeter, 115 robust DINION IP bullet 5000 cameras watch central avenues leading to the stadium, while 86 discrete FLEXIDOME IP 5000 cameras monitor visitors. For added security, eight AUTODOME IP 7000 cameras – two on the stadium outside, six inside – safeguard the surroundings with on-board Intelligent Video Analytics. Intelligent Video Analytics (IVA) allows for “smart” video surveillance functions. For instance, Intelligent Tracking automatically tracks moving objects based on predefined alarm rules. Besides automatic tracking of objects of interest once certain predefine rules, like loitering, security operators in Craiova can also manually track groups of football fans or follow specific individuals. The recording units support forensic search enabling security operators to quickly retrieve the relevant video data from hours of stored video Video streams of all 211 cameras are monitored in a central security room, manned by operator personnel and members of Romania’s police during matches. Video data is safely stored on two Bosch DIVAR IP 7000 network video recording units with a total of 256 Terabyte storage capacity. The recorders feature Video Recording Manager (VRM) software to increase reliability and reduce storage volumes and costs, by automatically balancing the video stream load to the free available storage devices. Also, the recording units support forensic search enabling security operators to quickly retrieve the relevant video data from hours of stored video to deliver irrefutable evidence. Easy-to-use security solutions Craiova officials are satisfied with the easy-to-use and cost-efficient solution. Because Bosch products fulfilled international guidelines, the stadium is now fully certified to host matches of the First Romanian Football League, European league matches, Champions League and national team matches. As the first stadium in Romania constructed in line with guidelines for the 2020 European football championship series, Ion Oblemenco Stadium serves as a model for future stadium projects planned to be built for the 2020 tournament and beyond.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, and Dwelo LLC, a provider of smart-home solutions purpose-built for apartment owners, managers and residents, has announced a partnership that is seamlessly integrating PDK’s cloud access control technology into the Dwelo smart apartment platform. Dwelo’s web and mobile software, which currently offers apartment dwellers the ability to control smart devices such as light switches, thermostats and door deadbolts for their individual units, has added features to manage access to common areas of their building or community, such as entry gates, clubhouse, gym and laundry facilities. These spaces can now be secured by PDK’s cloud access control solution, pdk.io, providing apartment property managers and owners with valuable operational efficiencies. The administrative software interface, not visible to residents, enables management to easily establish and enforce authorised hours of use for common facilities. An audit trail reports all traffic into the property, including any one-time credentials issued by residents, which can be used to assist in investigations in cases of theft or vandalism. When residents move out, their access to unit, common, and perimeter access is immediately deactivated, eliminating the risks that accompany traditional keys that would otherwise remain in circulation. The system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue Scalable and affordable security solutions Beyond operational efficiencies, residents can unlock perimeter and common doors or gates using the same mobile app they use to control their apartments. In addition, they have the ability to use their phones or computers to generate temporary, one-time credentials that allow visitors, delivery and service people to gain access as needed. These features add to the conveniences afforded to residents living in Dwelo-enabled smart apartments. Both Dwelo and PDK have built successful businesses by leveraging the power of cloud technology to create scalable, affordable solutions that offer unprecedented ease of installation for contractors and simple usability for customers. With their combined areas of expertise in home automation and security, together they see an opportunity to serve a large and generally neglected market sector – apartment renters who desire the same smart home technological conveniences as today’s home owners and seek out communities that offer those smart home solutions. The Dwelo/PDK solution is available for both new construction and retrofits. After an initial per-unit installation charge, the system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue. Enhanced apartment living “Dwelo is thrilled to be partnering with such an innovative company as PDK. PDK is a technology leader in the electronic access control space, and Dwelo and its customers are already benefitting from their forward-thinking approach to access." Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector" "The consolidation of smart home control and perimeter and common area access control, in one platform, is a powerful marriage for multifamily property owners. We look forward, with PDK, to crafting more solutions that address the specific needs of these customers,” says Mike Rovito, CEO of Dwelo, LLC. “PDKs solution has been embraced by customers in the commercial sector for its simple ease of use and platform flexibility. Our wireless and PoE options allow for cost-effective takeover of legacy equipment, while supporting new construction projects with all the benefits derived from leveraging the network." "Our mantra, simplicity without compromise, dovetails perfectly with Dwelo’s corporate mission to enhance apartment living through easily accessible IoT technology. Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector,” says Evan Tree, CEO of ProdataKey.
Sports fans and festival goers will enjoy greater peace of mind from vehicle as a weapon (VAAW) attacks with the arrival of a new lightweight rapid-deploy vehicle security barrier (VSB). The Rapid Defender temporary VSB was deployed in minutes to protect spectators and competitors from VAAW threat at the London Marathon and at football stadia and events the length and breadth of the country. Rosehill Security, a manufacturer of perimeter security solutions, has created the innovative hostile vehicle mitigation (HVM) barrier, made up of robust units of recycled rubber weighing just 49kg each. More than 150 people have died in 18 months of VAAW in cities from London to Manhattan and Melbourne – and just last week, Toronto Fast deployment StadiumTM – a specialist event services supplier of traffic management, stewarding, security and training services to the events industry that protects crowds at Premier League and EFL clubs, festivals and city-wide events – is extolling its benefits. Founder, owner and MD David McAtamney says: “We want to change the face of crowd safety through HVM barriers. The Rapid Defender makes this a reality because of its speed of deployment – our teams installed 13m of the barrier in just five minutes at the London Marathon!” More than 150 people have died in 18 months of VAAW in cities from London to Manhattan and Melbourne – and just last week, Toronto. Rosehill Security has designed the Rapid Defender specifically to provide protection for crowds of people from such attacks. Integration for enhanced security Sales manager Dalton Marshall says: “It is surface-mounted with no foundations and weighs less than a third of comparable concrete barriers, so can be deployed in minutes almost anywhere, from the streets surrounding stadia to uneven festival sites.” The Perimeter Security Suppliers Association has launched a new online source of help and information on HVM – the HVMHubThe 333mm-wide units are connected by 20mm diameter steel cables or rods, creating an HVM barrier of any length. Four men can manually install a barrier across the width of a road in less than five minutes with no special tools or lifting equipment. It can then be removed and reused. The Rapid Defender can be anchored or integrated with other temporary or permanent HVM systems to create a stronger physical barrier as part of a holistic HVM solution. The Perimeter Security Suppliers Association (PSSA), to which Rosehill Security belongs, has just launched a new online source of help and information on HVM – the HVMHub – in conjunction with the Home Office’s Joint Security and Resilience Centre.