ISC West, the largest converged security and public safety trade show in the Americas, concluded its 2019 event in Las Vegas this past Friday. ISC West, in collaboration with premier sponsor Security Industry Association (SIA), experienced overwhelming success with over 950 exhibitors and brands, including 200 new for 2019, plus over 30,000 industry professionals, 85+ SIA Education@ISC sessions, 20+ special events and networking opportunities and more. Reflecting the market trend and urgency fo...
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help org...
Senstar, global company that offers perimeter protection and VMS solutions, is slated to showcase latest access control and intrusion detection solutions, including next-gen Senstar Symphony Access Control (AC) and the FiberPatrol FP400 zone-based intrusion detection systems for fence applications at ISC West 2019. Symphony AC access control Symphony AC is an open software solution designed to support the industry’s most trusted brands of access control and intrusion hardware. Available...
Johnson Controls introduces the Tyco 360° Radar Detection, a low-cost, early threat detection family of radar sensors that can be easily integrated into existing video management systems for a more complete surveillance solution. Tyco Radar 360° Detection solution An ideal answer for advanced perimeter security needs, Tyco Radar 360° Detection offers long-range protection, which means quicker detection of breaches for areas seeking upgraded perimeter safety, such as power plants, t...
Dahua Technology, a video-centric smart IoT solution and service provider, showcases a wide range of competitive product portfolios and smart solutions to top security professionals during the International Security Conference and Expo (ISC West) at booth #14039 from April 10th to 12th. Dahua will also celebrate the fifth anniversary of its USA subsidiary on Wednesday evening, showing strong commitment to the local markets. Running with the theme ‘Empowering through Technology’, the...
Allegion, a provider of security products and solutions, announced its ENGAGE IP Gateway integrated with the latest version of RS2 Technologies’ Access It! Universal.Net software. RS2 Technologies released Version 7 of its software on March 11, which enables it to support Schlage Control, Schlage LE and Schlage NDE wireless locks as well as the Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options via the ENGAGE IP Gateway. “Allegion is excited to grow our offering wit...
Senstar, global provider of video management and perimeter intrusion detection solutions, is pleased to introduce two new products at ISC West - Senstar Symphony Access Control (AC) and the FiberPatrol FP400 zone-based intrusion detection system for fence applications. Symphony AC is an open software solution designed to support the industry’s most trusted brands of access control and intrusion hardware. Available as an extension to the Symphony Video Management Software (VMS), the module provides a full set of access control functions, including enrollment, scheduling, monitoring, and reporting. FiberPatrol FP400 intrusion detection system The FiberPatrol FP400 is one of the most affordable fiber optic perimeter intrusion sensors on the market. Each processor provides up to 4 zones of detection and supports insensitive lead-in enabling electronics to be installed up to 12 miles from the perimeter fence. It is ideal for small sites with concerns over EMI, lightning, or conductive elements on the perimeter. Symphony AC and FiberPatrol FP400 are examples of Senstar’s continued commitment to developing products" “Symphony AC and FiberPatrol FP400 are examples of Senstar’s continued commitment to developing products to meet the evolving security needs of our customers," said Kristen Cory, Vice President Sales, North America. "Both these products address very specific site requirements, allowing Senstar to offer more options to our customers and continue to build on our success as one of the industry’s most trusted and reliable security providers." Senstar Symphony VMS To learn more about Senstar Symphony AC and the FiberPatrol FP400, visit Senstar at ISC West Booth 17109. Also check out other award-winning products, including Senstar Symphony VMS, the Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system, FlexZone ranging fence-mounted intrusion detection system, and the Senstar Thin Client PC-alternative for video management. Senstar is also proud to be working with valued partners at ISC West. Senstar will be exhibiting on the Axis booth 14051 and is a sponsor at the Anixter booth 16039 at the event.
Rosehill Security, a global manufacturer of perimeter security solutions, announces a distribution agreement with ARX Perimeters (ARX) that will make its innovative range of hostile vehicle mitigation (HVM) barriers and perimeter security products available in the US market for the first time. Specialising in the provision of layered perimeter protection for events and critical infrastructure, Illinois-based ARX will expand its range of mobile perimeter solutions to include Rosehill Security’s Impakt Defender and Rapid Defender vehicle security barriers (VSB), Ballistic Blocks and Anti-Trespass Panels. Under the terms of the agreement, ARX will have exclusive rights within both the direct sales and hire markets. Perimeter security products “We’re excited to get started and grow the profile of Rosehill Security in the US together. Everyone at ARX is passionate about offering the best solutions to meet our clients’ needs, so Rosehill Security’s perimeter security products are an excellent addition to our current product range. Above all else, if it means that we can protect more people from vehicle as a weapon attacks on a larger scale across America, then this agreement will prove invaluable,” said Ben Shipper, President at ARX. Rosehill Security’s surface mounted Rapid and Impakt Defenders can be installed almost anywhere Manufactured from 100% recycled rubber, bonded with polyurethane for strength, Rosehill Security’s surface mounted Rapid and Impakt Defenders can be installed almost anywhere, from cambered road surfaces surrounding stadiums to uneven festival sites. Their unique modular design enables them to be integrated with other mobile perimeter and high-security fence systems, creating additional layers of protection that can be vital in today's ever-changing security climate. Physical security planning Additionally, both VSBs can be deployed with Rosehill Security’s pedestrian and vehicle portals to create single or multiple access points without compromising the perimeter’s integrity. These portable modular portals are designed with speed of installation in mind, making them ideal for short-term deployment at temporary events. “While vehicle borne attacks continue to pose a significant threat across the world, it’s more important than ever to consider HVM measures within physical security planning, particularly at events that attract large fluid crowds. The speed and ease with which our products can be deployed makes them an ideal addition to ARX’s existing product range. We’re delighted to be partnering with a dynamic company like ARX as we look to establish Rosehill Security and its products across the Atlantic,” said Dalton Marshall, Sales Manager at Rosehill Security.
ReconaSense announces ReconMaps, a new module of its A.I.-powered security platform, designed to provide real-time decision support for advanced emergency and security management. This powerful geospatial visualisation tool empowers organisations and security departments to quickly and easily view any type of incident, and the affected surrounding resources. The solution features geospatial mapping that connects the dots between the location of people and physical assets, and the evolving conditions around them. Beyond just identifying and mapping hot spots, ReconMaps allows users to apply flexible geofencing to define areas of interest, and all affected assets in an area. Further, the solution can automatically identify the fastest path to respond to any threat as conditions evolve in real-time. Controlling access permissions Includes visualising and identifying people, buildings or assets based on the severity, type and location of the threat This includes visualising and identifying people, buildings or assets based on the severity, type and location of the threat. When combined with live video feeds, response times and quality are drastically improved. As threat levels increase in a particular area, ReconaSense can send actionable guidance to targeted groups and individuals to relocate to safe locations, while controlling access permissions. Leveraging integration with GPS, RFID, devices, and other data sources, the solution can map any asset defined by an organisation and ‘flag’ it the moment something atypical occurs – such as a gas leak in a pipeline, an unauthorised vehicle in a no-entry zone, or other events and activities that can be identified by a sensor or application and reported to ReconaSense. GPS-directed guidance ReconMaps geospatial A.I. features and benefits include: Geofencing: Define any perimeter on a map to monitor, track, communicate with and control people and assets in a specific range including any micro, macro or global location. Geospatial Analysis: Identify a potential threat or risk on a map, understand where and how widespread it is, and who and what may be affected. Proactive, Risk-Aware Guidance: Target specific individuals and groups based on their unique role, status and location and provide GPS-directed guidance to quickly reach safety zones and avoid a threat altogether. Optimal Routing: Accelerate response times and provide optimal paths for responders to reach an impacted area, people or assets based on real-time traffic, weather and travel conditions. Risk-Adaptive Access Control: Leverage integration with ReconAccess to provide or deny access to specific areas or safe shelters based on evolving risk conditions. Remote Control: Integrate with building automation systems to shut down or turn on safety systems according to established safety and security protocols. Analysing travel schedules The solution works in combination with other components of the ReconaSense security intelligence platform and risk-adaptive access control solution to analyse, detect threats and send actionable guidance – without having to pull manual reports or look at spreadsheets that might slow down responses, and put lives and systems at risk. With such a broad, bird’s-eye view, ReconMaps makes it easier and faster for campuses, smart cities and smart buildings, geographically-dispersed organisations and critical infrastructure to assess location-based risks and to make real-time security decisions. The system can project and predict the impact of a weather event or other impending situation by analysing travel schedules For example, the system can project and predict the impact of a weather event or other impending situation by analysing travel schedules, scheduled calendar events for key executives, transportation plans and routes, and more. Any upcoming events that may put people and assets at risk can be rescheduled or re-routed and alerts can be sent to impacted individuals to avoid a potentially dangerous situation. Risk-adaptive access control solution “Too often in an emergency, limited interoperability between disparate security systems can impact the flow of information and allow things to slip through the cracks – increasing, rather than decreasing, the number of lives and assets at risk,” said John Carter, co-founder, president and CTO of ReconaSense. “ReconaSense geospatial A.I. offers a visual presentation layer that’s easy to navigate across highly-diverse, dynamic environments. It provides the ability to quickly and easily drill down into specific points of interest, and recommend intelligent, proactive responses.” Attendees at ISC West in Las Vegas are invited to learn more at a panel presentation on The Rise of Intelligence in Physical Security, featuring speaker Clayton Brown, co-founder and vice president of business development and strategy at ReconaSense, on April 11 at 9:45 a.m. PDT in Sands 304. The ReconaSense team will be onsite demoing its A.I.-powered security and risk intelligence platform and the industry’s first risk-adaptive access control solution, ReconAccess, in the Connected Security Expo, Booth #33091.
Southwest Microwave has expanded its suite of intelligent microwave sensor technologies with the introduction of the IP-based INTREPID Model 336-POE Long Range Digital Microwave Link. This all-weather, Power over Ethernet (POE) sensor makes reliable perimeter security more accessible than ever, coupling field-proven RF detection performance with secure network connectivity. With a range of 457 meters (1500 feet), operating at K-band frequency, Model 336-POE is ideal for the protection of fence lines, open areas, gates, entryways, walls or rooftops. The sensor employs advanced digital signal processing algorithms to optimise discrimination between intrusion attempts and environmental disturbances, mitigating risk of site compromise while preventing nuisance alarms. Reducing wiring requirements The system recognises unique profiles of intruders walking, running or jumping through the detection field, offers enhanced crawl and vehicle detection, and optimises performance in narrow corridors. Along with instantly triggering an alarm when an intrusion attempt is detected, the sensor alerts on unexpected changes in microwave alignment signal. A configuration security feature also provides notification when changes to device settings are attempted, ensuring that only approved modifications are implemented. The sensor features an on-board network server for set-up and control that supports multiple ports and sessions Employing a single Ethernet cable for power and data transmission, each Model 336-POE sensor operates as a network element, significantly reducing wiring requirements and seamlessly integrating with other IP/POE-based security devices, such as cameras and access control systems. The sensor features an on-board network server for set-up and control that supports multiple ports and sessions. Intrusion detection capabilities Sensor configuration, alignment and testing are handled using an embedded, browser-based Installation Setup Tool (IST), eliminating the need for software installation and simplifying device administration or diagnostics. “This sensor integrates security with convenience by successfully pairing Southwest Microwave's superior microwave intrusion detection capabilities with the ability to access and manage a sensor, at any time, from any location by any authenticated PC or handheld device connected to the network.” Maira Zanrosso, Director of Sales and Marketing Alarm monitoring is handled via Southwest Microwave’s server-based POE control module (CM-POE) or through an available no-cost SDK that simplifies high-level interface to third-party physical security information management (PSIM) or video management systems (VMS). Learn more about INTREPID POE System Controllers. “This sensor’s inherent POE capabilities and IP connectivity for communications allow us to deliver measurable cost and time-savings benefits to our customers,” said Zanrosso. “These network-based technologies successfully address today’s risk mitigation requirements, while achieving the goal of simplified security infrastructure.”
Taking place 16 - 17 of April 2019, this will be the ninth edition of Securex West Africa. Having firmly established itself as the region’s leading exhibition and conference for the commercial, perimeter, cyber and homeland security, fire and safety industry, this year’s show is expected to attract more than 2,500 visitors, 85 exhibiting brands along with key industry stakeholders from governmental organisations and prominent industry associations. Among the show floor features due to take place at this year’s exhibition is the Conference. Running daily sessions lead by senior industry experts, organisers have confirmed that Bulwark Intelligence are now signed up as Strategic Partners to the event. Delivering defence and intelligence solutions This year’s conference theme will be ‘National Security in a Boundaryless World: 21st Century Solutions to Nigeria’s Insecurity'A privately-owned company, Bulwark Intelligence Solutions Limited, is focussed on delivering extensive, accurate and dependable security, defence and intelligence solutions to around the globe. It was founded and is run by US Military veterans with combined experience of over fifty-two years in the defence, security and intelligence industry. The company has clientele cut across Defence and Security, Oil & Gas, Academia, Foreign investors, Banking & Finance, Non-Profits, Political and global leaders. Organisers have revealed a sneak preview of prominent topics as well as key speakers for this year’s Securex West Africa Conference. This year’s conference theme will be ‘National Security in a Boundaryless World: 21st Century Solutions to Nigeria’s Insecurity’. As Nigeria’s population continues to grow with an estimated population of 450 million by 2050, it is important that all stakeholders including security, military, political, civil society and more, come together to discuss solutions that will curb current and future threats while ensuring stability in the country. Providing companies with valuable insights The exhibitions Regional Director, George Pearson said; “Every year we consult with leading members of the industry to put together a cohesive programme of conference sessions that will not only inform Securex visitors, but also educate. In the current industry climate, with this transition into a new digital era, companies across the board are facing brand new threats and it is our goal to provide valuable insights into how to protect themselves.” Companies across the board are facing brand new threats and it is our goal to provide valuable insights into how to protect themselves" Just some of the key sessions announced include; ‘Implementing 21st Century Security Strategies and Solutions; the place of technology and social media’, ‘Security Sector Reforms and Policies in Nigeria, addressing a boundaryless operating environment’ and ‘Community Cohesion: security as an enabler of/for development; towards Solutions for Stability’. Key industry experts at the event Among the key industry experts set to take the stage this year will be the Honorable Aliyu Gebi, Senior Special Advisor to the Minister of Interior, Mr Wale Olaoye, CEO Halogen Security, Dr Solomon Arase, Former Inspector General of Police and Capt. Aliyu Umar (Rtd), CEO Goldwater and Riversands Consults to name just a few. The full Conference programme for Securex West Africa 2019 will be released very shortly and to ensure you receive it directly to your inbox, simply pre-register to attend for free. Pre-registration is now open for those looking to attend Securex West Africa. By pre-registering online in advance, you will have free access to both full days and you’ll also receive show updates direct to your inbox, exclusive competition announcements and much more.
Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces the immediate availability of the EchoGuard Rapid Deployment Kit for surveilling borders, securing critical infrastructure perimeters and temporary events, and enhancing situational awareness. Echodyne’s innovative MESA™ technology and powerful software deliver the leading performance of electronically scanning array (ESA) radar in a compact, lightweight, solid-state format for the very first time. Portable surveillance kit The Rapid Deployment Kit is built for field agents, law-enforcement, and security personnel charged with temporarily or intermittently securing ground and airspace perimeters. With essential components weighing under 20 lbs., the kit is extremely portable and enables surveillance in the most remote or hard to access locations. Securing events and borders “Echodyne is excited to announce the Rapid Deployment Kit, specifically designed for securing temporary and special events and critical infrastructure, remote surveillance, and border security” said Eben Frankenberg, CEO of Echodyne. “Being able to rapidly deploy a high-performance radar sensor is a field force multiplier, significantly enhancing agent safety, and dramatically improving situational awareness. This is another example of how our MESA technology can provide exceptional performance in a low cost, size, weight, and power package.” Features of the EchoGuard kit: Industry leading 3D radar performance in a super lightweight kit Intuitive radar UI software Ruggedised high-performance computer Wired and optional wireless connectivity Choice of tripod size Essential components weigh less than 20 lbs
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-based products We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile credentials applications We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customised action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future of biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video management platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access control world An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable entry management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorised individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorised access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable hardware components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorised employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing security needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorisations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorisations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion alarm systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customised intrusion systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customise the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video management system A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full alarm and event management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analysing video content over large distances Intelligent Video Analytics have the unique capability of analysing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs and autonomous systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact surveillance radar (CSR) system SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace security and drone tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialised in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilising novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralised management software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorised to access) as part of their job. A lost key is easily disabled within the centralised management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic access management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorise subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending electronic key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimise the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
Comelit Door Entry has been specified as the stylish system of choice at the much anticipated, Renaissance Retirement’s new luxury independent living, Fleur-de-Lis site in Marlborough. The development of 28 superior one and two bedroom apartments, built on the former Old Yard is the first new build site of its kind in the town for over 10 years. Designed in part by ex-England Heritage consultants, it adopts an ‘arts and crafts style’ consisting of sweeping, sprocketed roofs, Voysey dormers and large chimneys. Door entry panels With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited With Orestone Controls Limited being the preferred and specialist installer for Renaissance Retirement Limited, the complete specification for the Fleur de Lis development right through to Comelit’s bespoke door entry panels, had to work with the ambition to present an independent lifestyle in a contemporary setting, and a modern and stylish environment. Says Paul Williams, Construction Director for Renaissance Retirement: “Fleur de Lis stands as one of our major new home launches. Not only does it look aspirational from the outside, but each apartment presents a real opportunity for those seeking to maintain a quality standard of independent living and uphold a luxury style of life.” Fully integrated solution “Throughout the project, from initial design through to specification and works completion, we have relied upon our trusted suppliers to advise on how to deliver on our vision. From a security perspective, it was integral that each of the properties connected to emergency call systems and 24-hour response, as well as an on-site concierge who is on hand to assist owners and oversee the development’s daily operation.” Orestone Controls worked with Renaissance Retirement right from the initial design and specification of security and fire systems on site, to installation, ensuring a fully integrated solution. For smart door entry, Comelit’s 2-wire SimpleBus system with mini handsfree monitors were selected to operate with KMS Access Control and FAAC gate control kit, installed to control the front gates and main entrance to the site. Seamless security experience And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living"Richard Chadd, Orestone Controls’ Engineering Manager added: “We have worked with Renaissance Retirement Limited long enough to understand their requirements and high expectations to deliver luxury as standard. And Fleur-de-Lis even takes this to the next level; to provide an exceptional standard of independent living.” “Here, we had to consider each aspect of its specification in considerable detail, to ensure an impeccable finish. Comelit Group is globally renowned as a stylish door entry manufacturer and high specification solution. Its ability to integrate with selected gate and access control systems ensured we can create a seamless security experience.” At the Fleur-de-Lis development, warden and nurse call systems, operated through a specialist PA system presents residents with complete peace of mind that necessary services can be called in case of emergency. Independent retirement lifestyle Gareth Goodall, Comelit Business Development Manager concluded: “Renaissance Retirements’ exceptional Fleur-de-Lis development, in its provision of age-exclusive apartment living close to all the local amenities, is the ultimate choice for those desiring a peaceful and independent retirement lifestyle.” “To ensure success, security right from the perimeter through to apartment door entry, incorporating all community facilities, must be carefully balanced between ease of use for downsizers, integrated technology and with no compromise to quality or style. It’s something Comelit worked closely with Orestone to create a bespoke door entry solution.”
Six CNI utilities sites across South West England and Wales have been secured from terrorist attacks and ongoing criminal threats in a £3.25 million security project. Gas distributor Wales & West Utilities appointed principal contractor Chubb Systems and Littlewood Fencing to work collaboratively on a fully-integrated perimeter protection upgrade. Littlewood secured the perimeter with a Lochrin Bain ‘Combi’ CPNI Approved palisade fence system enhanced with Gallagher monitored pulse fencing (MPF) to 4m high. They also installed Crime & Fire Defence Systems MAP vault panels, CCTV towers, security and field marshalling kiosks along with associated concrete and civil works. Collaborative project management Littlewood Security Division manager David Jackson said: “We’ve worked with Wales & West for many years as the incumbent supply and installation partner for perimeter security systems, but this latest project with Chubb also included the integration of access control, CCTV cameras, reporting systems and networks that enable remote monitoring from a central control station.” A large element of the package involved civil works that had to be completed mainly by hand In total, more than 2500m of fencing were installed along with twelve CPNI BASE vehicle gates and six Crime & Fire MAP vaults. With a number of sites located on the Brecon Beacons, access issues and inclement weather conditions made collaborative project management essential. A large element of the package involved civil works that had to be completed mainly by hand. This was achieved with a strong emphasis on health & safety ahead of programme and to a high standard. Strategically important sites Gallagher business development manager Jason Hunter said: “A Gallagher MPF delivers safe and controlled, energised pulses. If seeing the fence and warning signs isn’t enough of a deterrent then receiving a short sharp shock should definitely deter. “The system is also connected to our Command Centre, which will alert the security team that there has been a breach so they can react quickly and effectively.” Wales & West Utilities security manager Ian Raclette said: “Gallagher’s MPF meets the CPNI criteria we demanded and helps us to detect criminal or terrorist activity in real time, reducing further any threat on these strategically important sites.” Wales & West Utilities covers a sixth of the UK, serving a population of 7.5 million. It launched on 1 June 2005, having formerly been part of National Grid Transco, and is now valued at £1.2billion.
As part of a new centrally controlled vehicle security system, The North West Ambulance Service has recently updated the security of its premises at its Lancashire regional headquarters using Nortech’s stainless steel bollards that house Nedap ANPR cameras. The North West Ambulance Service (NWAS) NHS Trust operates around 1,000 vehicles to provide 1.1 million emergency and non-emergency patient journeys. It was established in 2006 by the merger of ambulance trusts from Greater Manchester, Cheshire and Merseyside, Cumbria and Lancashire. The Lancashire regional HQ is based near Broughton in Preston. Securing the perimeter Nortech supplied the ANPR camera housed in a robust stainless steel bollard to protect the camera from any potential vehicle knocksThe trust needed to secure the perimeters of their premises at the Lancashire regional HQ and appointed Expert Security UK, Frank Whittle Partnerships and W. Monks Ltd to design and install the new centrally controlled vehicle security system. Expert Security UK approached Nortech in order to integrate the Nedap Automatic Number Plate Recognition (ANPR) into the system and new automatic barriers were installed to secure the perimeter and prevent unauthorised vehicles. Nortech supplied the ANPR camera housed in a robust stainless steel bollard to protect the camera from any potential vehicle knocks. As vehicles approach the new barriers, the ANPR reads the number plates and converts each valid number plate into a Wiegand ID string, which it sends to the access control panel in the same way as a standard card reader. The Wiegand number can then be checked centrally for access rights so that vehicle access can be granted or denied accordingly. Preventing unauthorised parking The barrier system is a great security measure for us and has prevented unauthorised parking"Danny Scholfield, Sales Director at Expert Security UK, commented, "We are all delighted with the final result. The system is very fast and ticks all the boxes for us. As we are already using the Net2 system here at the HQ, it is great to see the ANPR integrating into the system without complication. The barrier system is a great security measure for us and has prevented unauthorised parking." The benefits of the Nortech ANPR system is that it integrates with most access control software, avoids the need for manned gates or vehicle tags, allows automatic vehicle identification at between three and six metres and prevents unauthorised vehicle access. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialisation in some of the towns in Maharashtra while preserving their rich heritage. Wide area monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralised solution at a centralised location from where all other sites can be monitored at a time. Matrix IP bullet and dome cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that RagingWire Data Centers has installed Boon Edam’s Tourlock 180+90 security revolving doors as part of its integrated access systems that protect their data centers in Ashburn, Va. and Sacramento, Calif. Founded in 2000, RagingWire was one of the first companies that helped to build the multi-billion dollar global data center colocation industry. Now, RagingWire is the North American data center platform within the portfolio of NTT Communications, which operates 140 data centers in 20 countries worldwide, making RagingWire one of the largest and most financially solid data center companies in the world. Demanding hyperscale cloud RagingWire is recognised as an industry leader in data center security and overall customer experience" RagingWire uses Tourlock security revolving doors at its Ashburn VA3 Data Center, which features 245,000 square feet of space and 16 megawatts of critical power, and its Sacramento CA3 Data Center, which is a 180,000 square foot facility with 14 megawatts of critical power. VA3 and CA3 are part of RagingWire’s portfolio of data centers in Ashburn, Northern California and Dallas, Texas. “As the colocation data center of choice for some of the most demanding hyperscale cloud and enterprise companies, RagingWire is recognised as an industry leader in data center security and overall customer experience,” said Mark Borto, CEO of Boon Edam Inc. “We are proud to provide an important part of RagingWire’s sophisticated, multi-layer, integrated security system.” Provide efficient passage Boon Edam’s security revolving doors provide efficient passage for hundreds of people daily at RagingWire’s data centers. The doors prevent piggybacking and tailgating during both entry and exit by using a combination of sensors to recognise shapes, size and volume in three dimensions, and then stopping the door when a violation occurs. Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate"The state-of-the-art system also generates an accurate picture of exactly who is in the building at all times. “Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate,” said Eddie Ankers, Director of Corporate Security at RagingWire. Analyse suspicious behavior “By adding these doors to our defense-in-depth security strategy, we are providing the best possible protection system for our customers’ mission critical equipment.” In addition to Boon Edam’s Tourlock security revolving doors, RagingWire’s layered security approach features highly trained, 24x7 security staff, biometric scanners, badge readers, intelligent high-definition video cameras that analyse suspicious behavior, anti-tailgate mantraps, a building-within-a-building design, anti-climb perimeter fencing, concrete bollards in front of building entryways, and an anti-ram security gate.
Round table discussion
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security challenges for schools and colleges?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?