All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effec...
One of the high security perimeter protection integrators has struck a partnership agreement to better access growth markets in oil, gas and military in the Middle East. British-headquartered perimeter protection Zaun Group partners with the Rimal Global Group in Oman. Rimal Global group focuses on engineering, procurement, contracting and construction for renewable energy development, oil & gas field development, power generation projects, roads development and promoter of Niche global tec...
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realised in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonom...
ExtraHop announces ExtraHop® Reveal(x) Cloud™, a Software-as-a-Service (SaaS)-based network detection and response (NDR) solution for the cloud-first hybrid enterprise. Reveal(x) Cloud provides deep and continuous visibility, enabling Security Operations (SecOps) teams to analyse every transaction, detect threats, and respond to attacks to gain control over their hybrid attack surface and protect their investment in the cloud. While the cloud has proven to be a force multiplier for De...
Senstar, a provider of video management systems (VMS) and perimeter intrusion detection systems (PIDS), is pleased to announce its products were recently selected to protect five airports in various locations around the world. These sites join the list of hundreds of civilian and military airports currently using Senstar products. “Airport infrastructure and assets represent a vital economic engine for many cities and countries making them prime targets for vandals, thieves and terrorists...
Allied Universal®, a security and facility services company in North America, announces the launch of HELIAUS® – an advanced artificial intelligence platform designed to improve safety and reduce risk by enhancing on-site guarding services. “We developed HELIAUS® to deliver better results for our clients through advanced workflow automation, robust data capture and visualisation, and artificial intelligence that understands not only what’s likely to happen, but wha...
The Security Industry Association (SIA) has named Sen. Amy Klobuchar (D-Minn.), Sen. Deb Fischer (R-Neb.) and Rep. Donald Payne, Jr. (D-N.J.) as the 2019 recipients of the SIA Legislator of the Year Award. The awardees will be honoured at the upcoming SIA GovSummit, taking place June 26-27 in Washington, D.C. The SIA Legislator of the Year Award is presented annually to members of Congress and other elected officials who have demonstrated extraordinary leadership in advancing legislation and policies that encourage the effective use of technology solutions to enhance public safety and security and protect critical infrastructure. Recognition for promoting workforce development Sen. Fischer recently recognised SIA, along with SIA member companies Intel and VMware, as supporters of the DIGIT ActWith this award, Sen. Klobuchar will be recognised for her leadership on workforce development and life safety issues important to the security industry and its mission. In 2019, Klobuchar authored S.379, a bill that would allow workers to use “529” education savings accounts for training and credentialing programs, and S. 481 – the Nicholas and Zachary Burt Memorial Carbon Monoxide Poisoning Prevention Act – which would provide grant assistance for the purchase and installation of carbon monoxide detectors in dwelling units of low-income families and elderly persons, child care facilities, public schools and student housing owned by public universities. Sen. Fischer authored bipartisan legislation that would convene a working group of federal entities and private-sector stakeholders tasked with providing recommendations to Congress on how to facilitate the growth of connected Internet of Things (IoT) technologies. S. 1611, also known as the Developing and Growing the Internet of Things (DIGIT) Act, calls for the United States to craft a national strategy to position the United States as the global leader in IoT technologies. Sen. Fischer recently recognised SIA, along with SIA member companies Intel and VMware, as supporters of the DIGIT Act. Installing vehicular barriers to mitigate attacks Rep. Payne, who serves as chairman of the House Homeland Security Subcommittee on Emergency Preparedness, Response and Recovery, recently introduced H.R. 2160 – the Shielding Public Spaces From Vehicular Terrorism Act – which would help communities leverage homeland security grants to install vehicular barriers and implement other protective measures and direct research and development efforts on the emerging threats from vehicular attacks. Rep. Payne recently introduced H.R. 2160 – the Shielding Public Spaces From Vehicular Terrorism Act Payne also crafted H.R. 6920, the School Security Is Homeland Security Grant Act, which clarified allowable uses, requires a percentage of homeland security grants to be used for enhanced school security measures and increases overall authorisation for the grants. Enhancing perimeter and school security “SIA’s policy priorities include notable measures that help increase safety and security across many sectors, including the critical areas of perimeter security and school security, while helping the industry to stay ahead of megatrends such as the proliferation of IoT and the recruitment and retention of qualified workers,” said SIA CEO Don Erickson. “SIA applauds Sen. Klobuchar’s work to promote the 21st-century technology workforce essential to our industry, Sen. Fischer’s leadership in recognising the security industry’s role in fostering IoT growth, and Rep. Payne’s contributions to mitigating the threat of vehicular attacks and protecting students, staff, faculty and visitors in our nation’s schools.” Session on physical access control systems SIA GovSummit – the annual government security conference hosted by SIA – brings together government security leaders and private industry technologists for top-quality information sharing and education on security topics affecting federal, state and even local agencies. Attendees will find specialised sessions on topics such as modernising federal physical access control systems Attendees will find specialised sessions on topics such as modernising federal physical access control systems, the U.S. Department of Defense’s unified facilities criteria for security systems, facial recognition technology use for public safety and homeland security missions and helping communities protect religious institutions, crowded spaces and other soft targets. SIA GovSummit is free for all government employees, including federal, state, county and municipal-level staff (both domestic and international), plus all military, law enforcement and public safety representatives. Sponsors of the event This event is made possible thanks to the following sponsors and partners: Premier Sponsors LenelS2, HID Global, Tyco Security Products and Allegion; Event Sponsors AMAG Technology, American Fuel & Petrochemical Manufacturers, Axis Communications, B&B Roadway Security Solutions, Calpipe Security Bollards, the U.S. Department of Homeland Security Science and Technology Directorate, dormakaba, Gallagher, Genetec, Gibraltar, GSA Schedules, Inc., Hanwha Techwin America, HySecurity, IDEMIA, Identiv, ISC Security Events, Louroe Electronics, Marshalls, Milestone Systems, the National Initiative for Cybersecurity Careers and Studies, NetApp, Panasonic, the Secure Worker Access Consortium and TCP Security Solutions.
Avigilon Corporation, a Motorola Solutions company, announced that it will preview its upcoming high-resolution H4 Thermal camera at the International Fire and Security Exhibition and Conference (IFSEC 2019). The new Avigilon H4 Thermal camera models will combine patented Avigilon technology with heat-sensing capabilities to improve perimeter security in areas with poor visibility, difficult lighting conditions and absolute darkness. The high-resolution H4 Thermal camera will enable users to see more accurately from longer distances, empowering customers with the information they need and helping ensure important details do not go unnoticed. Longer-range detection in challenging conditions “We are introducing the high-resolution H4 Thermal camera to bring our customers longer-range detection in locations where environmental factors and lighting conditions are challenging,” said Sergio Parise, senior vice president, Product Development at Avigilon. “With the ability to recognise threats with greater accuracy at longer distances under these conditions, this camera will provide an excellent video security solution for sites requiring perimeter protection.” The H4 Thermal camera is expected to launch globally in the third quarter of 2019.
TAKEX Europe Ltd., renowned Japanese manufacturer of active and passive infrared perimeter intruder detection sensors, is slated to showcase their latest addition to their beam sensor family at this year’s IFSEC international at ExCel London, 18-20 June 2019. TAKEX detection sensors TAKEX detection sensors have been protecting people and property for more than 55 years, safeguarding domestic, commercial, and industrial premises and high-level Royal, Government, and military organisations worldwide. The detection sensor is the cornerstone of any perimeter intruder system, with active infrared beams widely regarded as the pinnacle; balancing precise, dependable, long-range protection with unrivalled reliability and catch performance in all outdoor environments. Using IFSEC as the launchpad for a new beam sensor technology, TAKEX will be introducing the all-new PR-30BE Using IFSEC as the launchpad for a new beam sensor technology, TAKEX will be introducing the all-new PR-30BE; a 30-metre reflective beam sensor with Time of Flight monitoring. The PR-30BE uses Time of Flight technology to determine detecting distance with unprecedented accuracy by measuring both light reception level and timing, meaning no lost alarms from highly reflective objects such as white vehicles. PR-30BE reflective beam sensor The PR-30BE can be used where conventional beams that require power at both ends are impractical due to either installation cost or environmental concerns, such as across waterways, roads, and runways; providing the performance of a traditional point-to-point beam sensor with the single-ended convenience of a PIR detector. Sized like a twin beam but with several features carried over from the PB-IN and PXB flagship quad series, the PR-30BE includes environmental monitoring which dynamically optimises performance to match changing conditions with a dedicated output giving a pre-alarm warning if required. Also included is the popular audible alignment tone function which together with the dual-ring viewfinder and monitor output voltage options, ensure easy beam alignment. Response time adjustment The PR-30BE also includes response time adjustment, +/-90 degrees horizontal and +/-5 degrees vertical adjustment, and a newly redesigned reflector assembly for a minimum operational distance of just 0.5m. Attendees of IFSEC International 2019 will have the opportunity to see the PR-30BE first-hand. Visit TAKEX on stand IF2602, 18-20 June at ExCel London. Additional details including pricing will be announced in local markets at the time of availability.
Frontier Pitts will be exhibiting at the IFSEC Exhibition at Excel, London between the 18th and 20th of June 2019. Frontier Pitts will be showcasing a fully operational Secured by Design accredited LPS1175 Automatic Bi-folding Gate SR2 on the stand. This is the first automatic Bi-folding Speed Gate on the market to achieve Secured by Design accreditation and LPS1175 Security Rating! Many clients had been installing unrated Security Gates that had not been tested alongside LPS1175 security rated fence lines. By testing and upgrading certain elements on all models of their Automatic Security Gates, Frontier Pitts is now pleased to bring to the market the first complete LPS1175 Anti-Intruder Gate Range to the market, introducing another perimeter security layer to the security onion. Platinum Automatic Security Gate range Frontier Pitts can offer the complete solution for all Mob Attack scenarios and Crowded Place, Public Realm venuesThe Platinum Automatic Security Gate range with Security Ratings of 2 and 3 includes: Platinum Sliding Gate up to 10m wide Platinum Bi-folding Gate; double leaf up to 10m wide, single leaf up to 5m wide Platinum Hinged Gate; double leaf up to 10m wide, single leaf up to 5m wide Platinum Pedestrian Gate: Fully Automatic, Semi-Automatic, Manual operation. The Platinum range joins the large portfolio of high security products, further bridging the gap between Frontier Pitts Security Range and their high security Anti-Terra IWA14/PAS68 impact tested products, enhancing their accreditations further. They can offer the complete solution for all Mob Attack scenarios and Crowded Place, Public Realm venues. Frontier Pitts’ technical consultants will be available to discuss the perimeter security requirements, and advise on the best IWA 14, PAS 68 & LPS 1175 solutions.
Matrix aims at increasing the networking opportunities by explaining decision makers the application of latest telecom and security solutions at the International Police Expo. The event organised on 19th and 20th July’19 gathers high level professionals of defence forces and gives them an overview of technologically advanced solutions. From telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 15 video and 150 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP Solution - PRASAR UCS that enables armed forces’ personnel to connect wirelessly from remote locations. Multiple connectivity options Matrix will showcase its aadhaar enabled biometric device Matrix Unified Communication Server – SARVAM UCS will also be highlighted at the event. Equipped to support radio ports and in-skin GSM connectivity, the solution enhances connectivity between field personnel helping them manage emergency situations effectively in less period of time. Matrix will also showcase its GSM and VoIP gateways that allows police and defence forces to make an easy switch to the modern network while retaining their existing infrastructure. Matrix will showcase its aadhaar enabled biometric device. It’s the only Linux based device available in Indian market with card and finger authentication. The device comes with multiple connectivity options like Wi-Fi, PoE, Ethernet and i.e. our Aadhaar based authentication device is purposely designed for marking attendance of government employees and is the only embedded device available in Indian market currently. Time-attendance solutions Matrix will be showcasing enterprise grade access control and time-attendance solutions engineered with features such as auto push events to server, automatic fingerprint distribution, instant notification, 300+ customised reports generation, scheduler services including backup and more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RFID card and PIN options at International Police Expo. Matrix will also be showcasing an enterprise-grade video management system designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. Real-time security Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation, video analytics such as intrusion detection, perimeter security, loitering detection and many other features. Furthermore, Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention, TCP notifications for remote locations and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. Products’ features and applications “We are enthusiastic about explaining our latest products’ features and applications to the key people of the defence industry. We will give brief insight on how our solutions can help the armed forces serve the society in a better way”, said Jatin Desai, Marketing Manager. Matrix cordially invites everyone to visit them at Stall Number: 21, International Police Expo 2019, Pragati Maidan Delhi on 19th and 20th July to have a sneak peek at the future of Telecom and Security solutions.
Cortech Developments is pleased to announce the integration of its Datalog Integrated Security Management Software with the Advanced Analytics Video platform from DAVANTIS, a specialist in video analytics for perimeter security. The seamless integration between Datalog and DAVANTIS provides end users with a means to reduce operator reaction times and increase overall situational awareness. Allowing consistent and timely response to different alarm triggers such as intruders, vehicle entry/exits, tampering and loitering to be managed seamlessly. The integration provides comprehensive information about security alerts in minimal clicks. Operators are provided with both alarm descriptions and visual data; it presents users with access to video from the camera with trace data (and any other associated cameras) that activated the alarm resulting in real-time analysis of the alarm trigger. Datalog provides quick and effective real time monitoring and control of events Local and remote site monitoring Datalog is a modular software suite that operates as a single or multi-user graphical user interface, providing local and remote site monitoring and control of building, fire, security and energy systems. The software provides smarter interoperability for multiple technologies across multiple sites; assisting organisations to reduce risk and costs, while maximising situation awareness and operational efficiency. Datalog provides quick and effective real time monitoring and control of events. System warnings, events and alarms are all clearly identified, prioritised, graphically located and visually verified with automatic CCTV video to enable a more efficient and accountable response. Innovation within perimeter detection The partnership will infuse both products with exciting new capabilities for Perimeter Intrusion Detection"Jason Blundell, Head of Sales & Marketing for Cortech Developments commenting on the integration said “We are delighted to welcome DAVANTIS into our portfolio of integration partners; we are looking forward to working together and providing innovation within perimeter detection. The partnership between DAVANTIS and Cortech demonstrates our on-going commitment to offer users flexibility and the widest choice, when selecting an integrated software platform.” Aaron Plant - Regional Sales Manager for DAVANTIS - UK and Nordics comments, “DAVANTIS are delighted to be in partnership with Cortech Developments, with integration into the DATALOG PSIM product. The partnership will infuse both products with exciting new capabilities for Perimeter Intrusion Detection, backed by CPNI Level 3 approval. “The combined solution delivers high performance, high reliability perimeter alarms via DATALOG to enable fast, efficient verification of real-time intrusions in a very simple and informative dialogue within DATALOG.”
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-based products We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile credentials applications We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customised action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future of biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video management platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access control world An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel plans of 140,000 people and affected 1,000 flights. Unauthorised drone activity And there have been other recent incidents of drone disruptions at airports: At Heathrow Airport in January 2019, flights were temporarily stopped for about an hour ‘as a precautionary measure’ after a drone was reported. The UK Airprox Board recorded 39 dangerously close drone encounters at Heathrow in 2018. In the U.S., flights into Newark Liberty International Airport were disrupted for about 90 minutes in January after a drone sighting. Dubai International Airport, the world’s busiest for international travel, closed its airspace for about 30 minutes in February due to suspected unauthorised drone activity. In March and again in May, air traffic at Frankfurt Airport in Germany was grounded due to drone sightings – for about 30 minutes in the first instance and about an hour in the second. Drone detection systems Security has a role in preventing drone incidents, although pilots often report them Security has a role in preventing drone incidents, although pilots often report them. At Gatwick, the initial reports of a drone over the airfield came from airport security officers. After the incident, the UK government rushed through legislation to enlarge the drone exclusion zones around airports to a maximum of 5 km (up from the previous 1 km). In the U.S., the exclusion zone around airports is a radius of about 5 miles, and even more in sensitive areas such as the National Capital Region around Ronald Reagan Washington National Airport, where restrictions are 15 to 30 miles. Airports in the U.S. are allowed to deploy drone detection systems but may not use counterdrone technology (such as shooting down the drones), which is reserved for the Justice Department and Homeland Security. Dedicated new technology “News that drone threats to aircraft are increasing should come as no surprise,” says Simon Barnes, Business Development Manager – Airports Europe for Genetec. “Recent reported incidents are just the tip of the iceberg. As drones become increasingly ubiquitous – both from hobbyists and their growing use in professional arenas – we can expect to see many more incidents.” From speaking to airports across the world, Barnes has learned that two of the most pressing challenges they face are how they secure their perimeters (as intruders become increasingly sophisticated) and identifying ‘Friend from Foe’ as operational needs must be maintained. “When it specifically comes to drone detection, the short-term temptation can be to introduce a dedicated new technology to address this specific threat,” he commented. More comprehensive response We need to work with technology, not against it, in order to ensure public safety and security" “However, the last thing a functioning airport needs is an independent system that isn’t unified with all of the other security measures in place. Only when the data from all of these inputs is visualised in one place can an airport begin to make sense of its environment and enable a fast and efficient response to evolving challenges such as the insider threat and malicious drone activities. We fully expect airports to respond to this changing landscape, to help ensure a more comprehensive response.” Philip Avery, Managing Director of Navtech Radar, adds: “In today's current climate of increased national threats, we need to work fast to keep up with modern risks. However, creating new, complicated laws open to misinterpretation or enforcing a complete ban on privately owned drones seem like Luddite solutions that undermine the potential of innovative technology. We need to work with technology, not against it, in order to ensure public safety and security.” Help mitigate risk Navtech Radar sells the AdvanceGuard system for drone detection. Tavcom Training, part of the Linx International Group, has responded to requests from the security industry for expert training in order to be better prepared for and mitigate against the threat of Unmanned Aerial Systems (better known as drones). The company offers a two-day Drone Detection classroom-based course for £375+VAT. Our drone detection course gives security professionals advice from experts" “The responses to the [recent] airport drone attacks were played out in the spotlight, with much public debate regarding the seeming lack of a pre-defined plan of action to prevent or contain such an incident,” explains Sarah Hayward-Turton, Sales and Marketing Director at the Linx International Group. “Our drone detection course gives security professionals advice from experts in drone technology, to help mitigate risk and implement countermeasures to thwart unauthorised drone activity.” The course will be offered again in November 2019 and in February 2020.
Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger picture.’ Here are some sessions to consider: Artificial Intelligence The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks A session on artificial intelligence asks: ‘Will AI change the face of the Electronic Security Industry?’ The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks. Connectionism, or neuronlike computing, developed out of our understanding of how the human brain works at the neural level. Each neuron in the brain is akin to a simple digital processor, and the brain as a whole is like a computing machine. Has the time come for artificial intelligence and machine learning for security? That’s the focus of another session that will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection. Is AI a technology looking for a problem to solve? Is it mature enough for mainstream usage in security scenarios? Does AI present a ‘double-edged risk’ (i.e., because enterprises and attackers have access to the same tools)? Convergence A combined security approach – unifying physical security and cybersecurity – is a real and immediate need in today’s high-risk and high-threat environment. By leveraging disparate sources of data, organisations can effectively manage a situation in real-time without having to go to multiple individual subsystems to get the job done. A panel session at IFSEC will discuss the concept, reality, and evolution of both physical and cybersecurity teams collaborating in the same Security Operations Centre. Here are some other sessions related to convergence of physical and cybersecurity: How converged security centres respond in real-time to physical and online threats How converged technologies ease prevention and response to unauthorised physical/logical access to corporate facilities and networks How chief security officers can benefit from data analytics and converged platforms to understand the complex physical and cyber risks posed to transport systems. GDPR Whilst the regulations provide a more comprehensive basis in law for the management of personal data The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements for video surveillance systems. That’s the subject of the session ‘GDPR – Video Surveillance: Balancing Privacy and Security.’ Whilst the regulations provide a more comprehensive basis in law for the management of personal data, they are part of a wider legal consideration for security technologies. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect. The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with their respective Codes of Practice provide a bedrock for effective governance. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weigh alongside the benefits. The session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
Vanderbilt’s SPC wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported by an automatic power saving mode for a battery life on average of five years. In fact, the SPC Wireless smoke detector comes with a battery life of over ten years. This means retail owners won’t have to go to worry about continually changing out batteries, giving them peace of mind that their shop is under consistent protection against intruders. More so, Vanderbilt also uses conventional batteries meaning they are accessible to source, again focused on making life easier for the system user. Vanderbilt’s SPC wireless devices are a cost-effective and reliable intruder alarm range Extended range for every detector In commercial environments, the SPC wireless range can extend to 500 meters meaning one single detector can cover a whole building. This is more cost effective than having to wire an entire building with cable, thus cutting down on install time, and ultimately cutting down on expenses. Easy and seamless installation Lastly, SPC wireless detector installs can be hassle-free. The installer just puts up the control panel, wires the mains to it, positions the wireless detector in the shop, and the retail owner is good to go. In contrast, a wired solution can take, at a minimum, a day’s work fitting cable. By reducing the installers time on site, retail owners don’t have to worry about losing out on potential customers due to the disruption to their business of a lengthy install. Efficient intruder alarm range Overall, Vanderbilt’s SPC wireless devices are a cost-effective and reliable intruder alarm range. The range is a two-way wireless technology that delivers ease of installation without compromising on the reliability of a wired system. The demand for integrated solutions and the growing influence of the Internet of Things (IoT) is an area that Vanderbilt has been paying close attention toward. We believe that wireless technology is coming of age, with two-way communication capabilities now cementing the technology’s potential and reliability.
With the ability to power over 590,000 UK homes from a total capacity of 660 MW, Walney Extension is set to be the biggest offshore wind farm in the world when it is commissioned at the end of 2018. The new onshore substation covers an area of reclaimed marsh land and required an innovative perimeter and internal fencing package to be designed to offer the highest levels in security and electrical safety. Design work started in 2017 and looked at how existing fencing systems could be used to create a bespoke solution. Challenges faced by utilities industry Protecting critical national infrastructure in the utilities industry presents a number of challenges: External perimeter to offer guaranteed delay against attack All fencing to be earthed or offer non-conductive features Internal fencing to include multiple systems including rigid mesh and GRP in same fence line External perimeter and access control to be compatible with monitored pulse fencing (electric fencing) to meet security requirements Internal fencing to be base plated Prevention of unauthorised access The substation installed five systems in total from the CLD Fencing Systems range of rigid mesh fencing and security gate solutions and combined this with a Gallagher Monitored Pulse Fence to add an extra layer of security to the site. The Gallagher solution provides reliable detection and prevention of unauthorised access to the site, protecting the public from accidental or intentional entry to the site. The solution ensures operational continuity, avoiding significant costs associated with loss of supply, while protecting the site's assets from theft and damage. The system has been so successful that they want to use the same solution for all its electrical substations.
Christchurch International Airport is situated on the east coast of New Zealand and receives around six million passengers and 70,000 commercial flights per year. The airport is the main gateway for New Zealand’s South Island and is a busy hub for passenger and freight movement. In a legislation-driven airport environment, the airport is regulated by a number of Civil Aviation mandates and rules, which include the requirement to control and monitor all access to restricted landside and airside areas. In selecting Gallagher for the airport’s security solution, the airport company, Christchurch International Airport Limited (CIAL), found a vastly flexible system capable of withstanding extreme conditions when put to the test in a real-life emergency. Requirement of a flexible security system CIAL took the opportunity to review its security systems and look for solutions that afforded greater system flexibilityOriginally opened in 1959, the airport terminal has undergone a number of expansions and upgrades over time. With passenger numbers continuing to grow, a new $237 million terminal was designed and construction began in 2009. As a part of the new terminal design, CIAL took the opportunity to review its security systems and look for new and innovative solutions that afforded greater system flexibility. The airport’s previous security system was both analogue and digital and presented limitations on what a non-technical staff member could do within the system. “To make changes, for example, add a door to the access control system, we had to get specialists in,” said Ford Robertston, the airport’s Manager of Quality and Security. “Ultimately, our wish list included a system our own staff could configure, hardware that overcame the reliability issues we faced with cards not reading, as well as an open platform with a high degree of flexibility and reporting capabilities.” Monitored electric fencing The site’s perimeter security incorporates five vehicle auto-gates which allow authorised vehicles access to the airfieldOn the exterior, Gallagher’s perimeter security system provides monitored electric fencing for a small section of Christchurch Airport’s 16km fence line – which protects more than 300 hectares of land. The site’s perimeter security incorporates five vehicle auto-gates which allow authorised vehicles access to the airfield. When drivers badge their access card at an auto gate, a photo of the cardholder appears on the operator’s screen, along with competency information. If the driver’s Civil Aviation ID, airside driving permit or another competency is due to expire, the operator is notified on screen and can advise the driver. The main auto-gate is manned 24 hours a day, seven days a week. If someone requests access at an unmanned auto-gate, their photo and competencies are channelled to the operator at the main auto-gate, reducing after hours staff and running costs. Gallagher security management platform Christchurch Airport is a multi-tenant site where several core organisations operate. A number of these organisations – including the national carrier, Air New Zealand – operate independent Gallagher security management platforms. This customisation provided the ability to move seamlessly between domestic and international airport operationsCardholder information can be enrolled between these platforms, enabling employees from each organisation to access multiple areas of the airport using a single access card. The multi-tenant functionality creates a flexible system that reduces the costs associated with issuing and managing multiple cards. As a domestic and international airport, CIAL, Gallagher and security partner ECL Group, together developed a customisation that would enable CIAL staff to manage airbridge configuration via the security management platform. This customisation provided the ability to move seamlessly between domestic and international airport operations. Airbridges and access controlled doors Using 14 fully-automated and motorised airbridges and access controlled doors, airport staff use workstations to configure the system and easily transition the airport from domestic to international operations – ensuring passengers are directed to secure zones including customs and immigration when appropriate. All doors are operated with an access card and once an area of the airport has been ‘sealed’ for security (for example, an international departure lounge), access to these areas is automatically denied and they become accessible only via a security clearance entryway.
Insurance Auto Auctions (IAA), is one of North America’s leading salvage auto auctions companies with the largest facility footprint, strong buyer base, and high auction returns. The exclusive focus is on the automotive total-loss industry with over 160 corporate owned facilities across the United States and Canada. IAA provides sellers and buyers with the best solutions to process and acquire total-loss, recovered-theft, fleet lease, dealer trade-in and collision damaged rental vehicles. Holding a variety of automobiles from cars, trucks, SUV’s, and motorcycles on site - the highest property protection measures must be taken. When IAA felt it needed a more robust security system along with unsurpassed service to protect its business, they chose Gallagher’s perimeter security solution. Over 12 strong years, Gallagher is now much more than a security solutions vendor to IAA. Gallagher is a long-term partner. Reduction in theft and vandalism The quality of the fence is rigid, and wires are closer together and tighter, not loose and easily movable"Covering auction site sizes up to and over 70 facility acres, Gallagher’s networked perimeter fencing is in use and continually being rolled out into new IAA sites across various geographical regions. IAA staff believe that the threat of theft, vandalism and damage has been significantly reduced thanks to the deterrence and detection features of Gallagher’s networked perimeter security. Compared to other electric fences on the market, IAA chose Gallagher after they tested it and found it to be the best product available. Eric Zurawski, Director of Security, said “The quality of the fence is rigid, and wires are closer together and tighter, not loose and easily movable, as we’ve found with other products. All these attractive features are what sets Gallagher’s electric fencing apart.” Monitoring perimeter security With Gallagher’s latest software system Command Centre v7.10 and Trophy FT Fence Controllers, IAA monitors and controls perimeter security by sending a regulated electrical pulse around the high voltage fence zones and sections of the perimeter fence. IAA has the ability to configure, control and monitor between 3-12 fence zones at one time giving a thorough overlay of the entire yard, zone by zone, region by region. The integration features of Gallagher Command Centre have enabled IAA to streamline and improve all operations from the head office in Chicago. By remotely monitoring all sites they can see when fences go offline and where from a central control room. Protecting assets of customers Gallagher’s electric fences are our number one perimeter security choice to protect our assets and the assets of our customers"“The interface is far better than anything on the market. It is a very powerful tool, particularly great for monitoring. We’re able to monitor sites that turn on their electric fences and the ones that don’t from a remote location. It’s really helped boost our security measures. “Gallagher’s system has grown with us as we continue to expand by opening new sites and overflow lots, and acquiring existing businesses. Gallagher’s electric fences are our number one perimeter security choice to protect our assets and the assets of our customers. It is the number one security solution on the market that deters, detects, and delays.” Gallagher perimeter electric fencing is IAA’s primary line of defence, enabling IAA to enhance the security of its facilities while at the same time reducing its security costs. IAA has integrated Gallagher’s Command Centre with third party alarm systems offering regional alarm companies advanced installation help and support.
Senstar, a provider of perimeter intrusion detection systems and video management solutions, has published a case study detailing how the Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security for a US electrical utility company. For many years, the utility company has integrated its perimeter intrusion detection and lighting systems. Recently, the company has begun installing the Senstar LM100 which provides detection and lighting in one product, and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labour, as well as the removal of certain equipment from project scope that are required for the two-system integration. Combining functions of two systems in one “The LM100 combines all of the functions the two systems provide and it saves us a lot of money,” said the utility company’s security administrator. “It is also simpler to integrate and has better functionality.” The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrentThe Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity. Protecting property and assets “Why use two systems when the same job can be done by one,” said Senstar Product Manager Todd Brisebois. “With the combined sensing and lighting capabilities of the LM100, this is the only system that has its lighting affected by its sensing all while reducing costs related to operation, theft, vandalism and electricity usage with minimal light pollution. Above all, the LM100 provides peace of mind for those who need to protect their property and assets.” Another key benefit the utility company is realising from the LM100 is its high colour rendering (CRI) index which maximises camera performance, providing clear and concise images of the intrusion attempt, so the security personnel at the monitoring station can more effectively assess the situation and initiate an appropriate response. The Senstar LM100 is now installed at three of the utility company’s sites, with an additional 43 other sites planned.
Indiana Department of Correction (IDOC) is a state-wide organisation, comprised of 21 adult facilities housing over 28,000 inmates. Safety of both inmates and the public is a top priority for IDOC and forms part of the organisation’s mission and vision. The inefficiency and increased cost associated with managing multiple security technologies and systems led to IDOC’s Director of Construction Services Kevin Orme to seek a solution that not only increased efficiency and reliability for the prison facilities staff but ensured that both inmate and public safety remained consistent with their organisation mission and vision – the top priority. Effective pulse fence systems Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbancesGallagher Certified Channel Partner Security Automation Systems (SAS) is a valuable partner to both Gallagher and IDOC. SAS has worked with IDOC and Gallagher to design and manage the installation and maintenance of the current system and to develop further solutions to meet future requirements and increase efficiency and safety. Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbances without triggering false alarms. An essential requirement for upgrading a number of low security level 1 facilities to level 2 is perimeter detection. Some IDOC facilities require up to 1000 feet of interior chain link fence to be covered by effective non-lethal perimeter detection. SAS worked with the IDOC requirements and proposed the Gallagher D21 disturbance sensors to provide the perimeter detection solution. Perimeter security for correctional facility “Gallagher’s system changed the way I think about perimeter security,” says IDOC’s Director of Construction Services Kevin Orme. “Gallagher is the specified standard for any correctional facility above minimum security.” The product is great, works reliably every day, and I don’t have to worry about it" Gallagher’s perimeter security system is included in all new IDOC construction, as well as being retrofitted into existing facilities throughout the state. The efficient installation process of the Gallagher system meant IDOC could significantly reduce time in comparison to other technology in the agency. “The product is great, works reliably every day, and I don’t have to worry about it,” he adds. “We’ve been able to make more effective user of security resources too. Officers have been reallocated from the perimeter to in-prison offender contact areas.” Operator-friendly software “Hardware failure rate and recurrent costs are very low, and the software is operator-friendly reducing human error,” says Mr. Orme. “Maintenance is much easier; the prison’s maintenance staff have the ability to fix any minor issues.” The D21 Disturbance Sensor measures and analyses the impact on the fence when disturbed. The sensor raises an alarm only when specified limits are exceeded, preventing any nuisance or ‘false’ alarms caused by disturbances such as wind or rain. Integration with Command Centre software Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution"Ryan Tomlinson from SAS says the D21 sensor was suggested for two main reasons. “First, the D21 sensors integrate seamlessly with the Gallagher Command Centre software, which was a key factor in the decision process. We were already integrating non-lethal electric fencing, door control and video systems with Command Centre and the state preferred not to add another, separate system. The second reason we chose the D21 sensors was cost. Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution.” Mr Tomlinson had confidence in Gallagher and its products to carry out the job successfully. “Although this was to be our first installation of the D21 product, we were confident that between the technical ability of our staff and the support from Gallagher, we would be able to provide a successful installation,” he says. “The D21 sensors were simple to install. They easily mounted to fence posts and other structures the system was monitoring and installing the communications backbone was low-cost and straightforward.” Monitoring real-time data in Command Centre We were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s"“After the initial process of setting the address of each sensor, we were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s. Next, we were able to individually adjust the parameters of each sensor and monitor real-time data in Command Centre according to the particular characteristics of the structure the sensor was affixed to." “Overall, I was impressed with the ease of installation, the adjustability of the sensors and how well the sensors integrated with the Command Centre software.” Following the installation of the Gallagher system, IDOC was able to reclassify the facility as level 2, thus allowing them to house a wider group of offenders using the cost-effective, yet highly secure perimeter security solutions offered by Gallagher.
Round table discussion
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
As the new school term begins, awareness of security at all levels of educational institutions is higher than ever. Technology plays an important role in protecting educational facilities and their students, faculty, staff and visitors. Specific security challenges drive which technologies and other measures are used, and those challenges are evolving, along with the dynamic institutions security is tasked with protecting. We asked this week’s Expert Panel Roundtable: What are the security challenges for schools and colleges?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?