Physical Security Information Management (PSIM)
London Ambulance Service announced that 529 violent incidents have been reported between April 2020 and January this year. To protect their frontline workers, the Ambulance Service has started to roll out Motorola Solutions VB400 body-worn video solutions to help their frontline workers to deal with assaults and threats. “The health, safety, and wellbeing of our crews are of utmost importance. We want to take every precaution possible to ensure that our frontline people are safe whilst at...
At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact o...
Understanding access control technology has surpassed its core application as a security tool and is helping protect individuals from infection, Anviz has announced the release of a strategic addition to its product line, Go Touchless - FaceDeep 5 and FaceDeep 5 IRT face recognition terminals. Safely Returning to work and school during the post COVID-19 pandemic period leaves people with a key question - With what health and safety precautions? AI-based facial recognition terminal Anviz has i...
Gradiant leads a project to develop a technology capable of verifying the identity of citizens in the online processes of public services in a secure, easy-to-use and private way. To do so, the alliance will work on the concept of Electronic Identity (eID), the way users can identify themselves through the network and will use Artificial Intelligence and Blockchain technologies to ensure the process. This is IMPULSE (Identity Management in PUbLic SErvices), an initiative with a budget of around...
The COVID-19 global pandemic had a life-changing impact on all of us in 2020, including a multi-faceted jolt on the physical security industry. With the benefit of hindsight, we can now see more clearly the exact nature and extent of that impact. And it’s not over yet: The pandemic will continue to be top-of-mind in 2021. We asked this week’s Expert Panel Roundtable: What have been the positive and negative effects of Covid-19 on the physical security industry in 2020? What impact wi...
Genetec Inc., a renowned technology provider of unified security, public safety, operations and business intelligence solutions, announced the launch of its brand new Virtual Experience Centre. The platform enables channel partners and end-users to easily and efficiently collaborate with Genetec employees to discuss projects, view demos and access materials, in one virtual environment from anywhere in the world. The online platform recreates the same personalised interaction of visiting the exi...
Electronic Security Association’s (ESA) National Training School has launched a valuable new tool to help employers with one of the biggest challenges faced when hiring new security technicians, gauging practical areas of proficiencies. Gauging proficiency areas “Many other professions use skills assessments to verify computer or accounting expertise, for example, so the Electronic Security Association felt with the thousands of test questions we have available from our courses that we would have the perfect resource to create a tool to help hiring managers,” said Michelle Yungblut, Electronic Security Association’s Chief Knowledge Officer. The tool consists of affordable, online aptitude tests, developed with input from industry subject matter experts over the past year and will measure a technician’s skill level on several core proficiencies that employers want when seeking to hire the best possible candidate. Security technician assessment tool Assessment exams are available in general, overall skillset, and in video surveillance, access control, fire and intrusion Assessment exams are available in general, overall skillset, and in specialised areas, including video surveillance, access control, fire and intrusion. Upon completion of each assessment, employees will receive an outcome report that will weigh the test takers’ skills as beginner, intermediate or advanced. These reports will also show areas of strengths and weaknesses so that managers are prepared to assign the employee tasks that match their skill level and design training programmes to enhance employee weaknesses as well as build upon their proficiencies. ESA National Training School courses “We have eight different assessments, each of which is just 25 questions and takes about 30 minutes to complete, so the time needed is very minimal,” said Michelle Yungblut. As with all ESA National Training School courses and training programmes, ESA members receive exclusive discounts. The assessment exams are now available for US$ 35 each for ESA members and US$ 49 each for non-members.
Growing concern about deep-fake videos will make it increasingly important to be able to demonstrate the integrity of video evidence, warns South Korea’s largest in-country video tech manufacturer IDIS. Rapid advances in digital video manipulation techniques, and a rise in alleged deep-fake celebrity videos being reported in the news, will put pressure on both video tech users and on prosecutors to demonstrate the integrity of any footage they use. Internal disciplinary proceedings “As we look ahead, wherever video is presented for use as legal evidence, or as part of internal disciplinary proceedings, we will see more attempts to assert that footage is not genuine. Courts will dismiss evidence where tampering cannot be ruled out,” says Dr. Peter Kim, Global Technical Consultant, IDIS. It will be vital that users can demonstrate beyond doubt that their footage has not been tampered" “Any challenge to the integrity of video evidence, if not countered, risks undermining the value of the entire video solution. This is particularly true in applications where investigating and prosecuting wrongdoing is a key function of the camera system. So, it will be vital that users can demonstrate beyond doubt that their footage has not been tampered with in any way.” IDIS, which supplies complete, end-to-end video solutions for applications ranging from high-risk critical infrastructure to commercial settings, has created protection of video footage integrity through its patented Chained Fingerprint™ algorithm. Exported video data IDIS recorders use Chained Fingerprint to ensure the integrity of the recorded and exported video data. Each frame is assigned a unique numerical ‘fingerprint’, calculated by relating its own pixel value to the fingerprint of the previous frame. This means that every single image frame of the video is linked by an encryption ‘chain’ with its neighbouring image frames. The encrypted chain is stored as part of the video data when the video is recorded or exported as a video clip using the IDIS ClipPlayer. Before playback, the ClipPlayer scans video and recalculates the fingerprint chains of the video data. If any part of the image frame is tampered with, the fingerprint chain will be broken and will not match the chain value calculated at the time of video export, prompting a flag. “As organisations look to upgrade or invest in new video solutions, protecting themselves against claims of video evidence tampering should be high on their priority list,” Kim adds.
Evolution, the foremost integrated Fire & Security systems business, is celebrating its 25th anniversary with the launch of its new company logo. The logo has been given a stylish and modern refresh to reflect the development of the business since its foundation in 1996 and to symbolise the company’s ethos of always looking towards future success. Delivering excellence Richard Lambert, Managing Director of Evolution, says this is an important milestone for the company: “Since our launch we have continued to grow and achieve, establishing Evolution as a leading fire and security systems integrator across the UK and Europe.” “We're excited about the future of the business and the industry, and this modern refresh aligns with our goal of continuing to deliver excellence to our clients, providing them with the systems, services and support that meet their specific needs.”
Anomali, the globally renowned company in intelligence-driven cyber security solutions, has announced that Anomali Match is now integrated with Microsoft Azure Sentinel. By bridging the gap between these two major security solutions, Anomali and Microsoft have created an automated solution that significantly enhances and speeds joint customers’ threat detection, alerting and response capabilities. Azure Sentinel and Anomali Match integration Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI (Artificial Intelligence) to help analyse large volumes of data across an enterprise fast. Azure Sentinel aggregates data from all sources, including users, applications, servers, and devices running on-premises or in any cloud, giving users access over millions of records in a few seconds. Anomali Match is a high-performance threat detection and response solution. It continuously correlates all collected security event and log data against millions of globally observed indicators of compromise (IOCs) to expose previously unknown adversaries that have already penetrated networks. Match retrospective analysis capabilities stretch back as far as five years. Bi-directional data flow With this integration, Microsoft and Anomali have created a bi-directional data flow With this integration, Microsoft and Anomali have created a bi-directional data flow that allows users to easily export Azure Sentinel logs into match for correlation with Anomali global intelligence. Combining IOC matching at a massive scale together with other innovative techniques provides the precision detection needed to investigate and prioritise matched threats for ingestion back into Azure Sentinel, where Security Operation Centre (SOC) analyst teams can then triage. Enhancing cyber and data security “Most enterprises have dozens of cybersecurity tools deployed and access to mass volumes of related information. Despite this, many continue to fall victim to attackers who have figured out how to slip through holes that disparate systems and siloed data leave open,” said Mark Alba, Anomali Chief Product Officer. Mark adds, “Azure Sentinel and Anomali have bridged a gap that allows our joint customers to consolidate essential security technologies, providing them with the information and capabilities needed to identify and mitigate threats that are impacting their networks.” Cloud adoption and threat intelligence “To remain protected, organisations need visibility over what’s going on across their infrastructures, which are expanding rapidly due to things like cloud adoption, growing remote workforces and increasing levels of mobile connections,” said Jason Wescott, Principal PM Manager, Azure Sentinel. Jason adds, “With match enabled, enterprises will gain access to threat intelligence that will allow them to know more about what they are up against and then take smarter steps to further reduce risk.”
Heavily used interior and exterior doors need an access solution that’s both robust and intelligent. The new SMARTair i-max Escutcheon from ASSA ABLOY ensures only authorised users pass through these doors, via a range of credentials including virtual keys stored on a smartphone. Fast, wire-free installation makes it easy to implement or extend a SMARTair access control system in any building. This new wireless escutcheon with an inbuilt RFID reader and Bluetooth compatibility handles the punishment of high-traffic, frequent-use doors. It meets standard EN 1906 Category of use: Grade 4 for robustness — the highest level, recommended for doors ‘which are subject to frequent violent use.’ Wire-free installation This hard-wearing, resistant build quality makes the SMARTair escutcheon ideal for busy doors at education establishments like universities and schools; healthcare sites including hospitals and nursing homes; offices and co-working spaces; apartment complexes and multifamily residences; and public institutions like government buildings, sports centres, and libraries. Its robust design, redefined aesthetics and wire-free installation are perfect for these high-traffic environments — facilities with busy students and teachers, or doctors, nurses, visitors, and subcontractors always on the move. The SMARTair i-max escutcheon is also available with an antibacterial coating, for healthcare and other sterile settings. Proximity credential technologies The new escutcheon is battery powered and works with all standard proximity credential technologies The new escutcheon is battery-powered and works with all standard proximity credential technologies, including MIFARE®, DESFire, and iCLASS®. An optional integrated PINpad provides the opportunity to add another layer of security with multi-factor authentication. One can specify individual doors to open with PIN verification or credential verification — or to require both. The new i-max sacrifices none of its style in pursuit of functionality. The new escutcheon comes in a variety of contemporary finishes and handles options — with up to 16 different combinations. A multi-coloured LED gives visual warning signals at a glance. This new SMARTair escutcheon fits glass, wooden, or aluminium doors — including fire and emergency exit doors — and is available for Scandinavian, Euro, Finnish, and Australasian door profiles. System management options The new escutcheon is compatible with all SMARTair system management options: Standalone, for basic access control functionality; Update on Card; Openow and Pro Wireless Online, for real-time management of every door and system user. The i-max escutcheon also offers another way to open doors: the SMARTair Mobile App to open doors remotely and the SMARTair Openow mobile app. With Openow, users no longer carry a separate card or fob credentials. Instead, their smartphone stores secure virtual keys which can be issued, amended, or cancelled at any time. So, users no longer need to waste time collecting or validating an access card to open doors locked with a new SMARTair i-max escutcheon. With Openow, if one has their phone, they are already carrying the keys.
Johnson Controls, a global provider of smart, healthy and sustainable buildings, announced it has joined The Climate Pledge, a commitment co-founded by Amazon and Global Optimism. Signatories of the Pledge commit to reaching net-zero carbon emissions by 2040, ten years ahead of the goal set out in the United Nations’ Paris Climate Agreement. Johnson Controls is one of 53 organisations that have now signed the Pledge, and the move comes hot on the heels of the company’s announcement of new environmental, social and governance (ESG) commitments, science-based targets, and its own net-zero carbon pledge. The pact will see Johnson Controls partner with other industry leaders to uncover new pathways to meet common environmental and sustainability goals. Paris Agreement’s goal Sustainability is at the heart of our business and fundamental to everything we do as a company" “Sustainability is at the heart of our business and fundamental to everything we do as a company,” said George Oliver, Johnson Controls chairman and CEO. “Climate change is one of the greatest challenges facing the planet today. Our recent announcement to achieve net-zero carbon emissions by 2040 through innovations and technologies such as our OpenBlue platform, further demonstrates our commitment to protect and preserve the environment." "We are looking forward to further enhancing the role we can play by working with Amazon, Global Optimism, and other signatories to reach net-zero carbon a decade before the important Paris Agreement’s goal.” Critical climate challenges The Climate Pledge allows signatories to share access to technologies, best practices, and innovations in supply chain enhancements, and create joint action to address the most critical climate challenges. Specifically, signatories pledge to accelerate the path to net zero by agreeing to regular reporting on greenhouse gas emissions, carbon elimination, and credible offsets. Johnson Controls has a long-standing business relationship with Amazon and has been working with the company since 2008. “As the U.S. takes an important step forward in the fight against climate change by officially rejoining the Paris Agreement this week, I am excited to welcome 20 new companies to The Climate Pledge who want to go even faster,” said Jeff Bezos, Amazon Founder and CEO. Streamline building operations The company is focused on empowering customers streamline building operations “Amazon co-founded The Climate Pledge in 2019 to encourage companies to reach the goals of the Paris Agreement 10 years early, and we’re seeing incredible momentum behind the pledge with 53 companies from 18 industries across 12 countries already joining. Together, we can use our collective scale to help decarbonise the economy and preserve Earth for future generations.” Johnson Controls’ participation in Th e Climate Pledge reinforces its mission to reimagine the performance of buildings to serve people, places, and the planet. As a leader in the buildings space for 135 years, and a pioneer in sustainability, the company is focused on empowering customers and communities to streamline building operations and deliver energy efficiencies that will help them meet their environmental goals. Clean energy solutions Johnson Controls is driving sustainability across its entire value chain by focusing on clean energy solutions, people, partnerships, performance, and governance. It is ranked in the top 12 percent of climate leadership companies globally by CDP and was named one of Corporate Knights’ Global 100 Most Sustainable Companies.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organisations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centres or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognise individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analysing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognise. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the centre of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
Like most industries, the fields of security, access and safety have been transformed by technology, with AI-driven automation presenting a clear opportunity for players seeking growth and leadership when it comes to innovation. In this respect, these markets know exactly what they want. They require solutions that accurately (without false or negative positives) classify and track people and/or vehicles as well as the precise location and interactions between those objects. They want to have access to accurate data generated by best-of-class solutions irrespective of the sensor modality. And, they need to be able to easily deploy such solutions, at the lowest capex and opex, with the knowledge that they can be integrated with preferred VMSs and PSIMs, be highly reliable, have low install and maintenance overheads and be well supported. With these needs in mind, camera and computer vision technology providers, solutions providers and systems integrators are forging ahead and have created exemplary ecosystems with established partnerships helping to accelerate adoption. At the heart of this are AI and applications of Convolutional neural networks (CNN), an architecture often used in computer vision deep learning algorithms, which are accomplishing tasks that were extremely difficult with traditional software. But what about 3D sensing technologies and perception? The security, safety and access market have an additional crucial need: they must mitigate risk and make investments that deliver for the long-term. This means that if a systems integrator invests in a 3D sensing data perception platform today, it will support their choice of sensors, perception strategies, applications and use cases over time without having to constantly reinvest in alternative computer hardware and perception software each time they adopt new technology or systems. This begs the question - if the security industry knows what it needs, why is it yet to fully embrace 3D sensing modalities? Perception strategy Intelligent perception strategies are yet to evolve which sees designers lock everything down at the design phase Well, one problem facing security, safety and access solutions providers, systems integrators and end-users when deploying first-generation 3D sensing-based solutions is the current approach. Today, intelligent perception strategies have yet to evolve beyond the status quo which sees designers lock everything down at the design phase, including the choice of the sensor(s), off-the-shelf computer hardware and any vendor-specific or 3rd party perception software algorithms and deep learning or artificial intelligence. This approach not only builds in constraints for future use-cases and developments, it hampers the level of perception developed by the machine. Indeed, the data used to develop or train the perception algorithms for security, access and safety use cases at design time is typically captured for a narrow and specific set of scenarios or contexts and are subsequently developed or trained in the lab. Technology gaps As those in this industry know too well, siloed solutions and technology gaps typically block the creation of productive ecosystems and partnerships while lack of commercial whole products can delay market adoption of new innovation. Perception systems architectures today do not support the real-time adaptation of software and computing engines in the field. They remain the same as those selected during the design phase and are fixed for the entire development and the deployment stage. Crucially, this means that the system cannot deal with the unknowns of contextually varying real-time situations where contexts are changing (e.g being able to reflex to security situations they haven’t been trained for) and where the autonomous system’s perception strategies need to dynamically adjust accordingly. Ultimately, traditional strategies have non-scalable and non-adaptable competing computing architectures that were not designed to process the next generation of algorithms, deep learning and artificial intelligence required for 3D sensor mixed workloads. What this means for industries seeking to develop or deploy perception systems, like security, access and safety, is that the available computing architectures are generic and designed for either graphic rendering or data processing. Solutions providers, therefore, have little choice but to promote these architectures heavily into the market. Consequently, the resulting computing techniques are defined by the computing providers and not by the software developers working on behalf of the customer deploying the security solution. Context…. we don’t know what we don’t know Perception platform must have the ability to adjust to changes in context, thereby improving the performance post-deployment To be useful and useable in the security context and others, a perception platform must have the ability to adjust to changes in context, can self-optimise and crucially, can self-learn, thereby improving the performance post-deployment. The combinations of potential contextual changes in a real-life environment, such as an airport or military base, are innumerable, non-deterministic, real-time, often analogue and unpredictable. The moment sensors, edge computing hardware and perception software are deployed in the field, myriad variables such as weather, terrain as well as sensor mounting location and orientation all represent a context shift where the perception systems’ solution is no longer optimal. For example, it might be that a particular sensor system is deployed in an outdoor scenario with heavy foliage. Because the algorithm development or training was completed in the lab, the moving foliage, bushes or low trees and branches are classified as humans or some other false-positive result. Typically, heavy software customisation and onsite support then ensue, requiring on-site support by solutions vendors where each and every sensor configuration needs to be hand-cranked to deliver something that is acceptable to the end customer. A new approach for effective perception strategies Cron AI is building senseEDGE, which represents a significant evolution in the development of sensing to information strategy. It is a 3D sensing perception and computer vision platform built from the ground up to address and remove the traditional deployment and performance bottlenecks we’ve just described. senseEDGE is aware of the user application reaction plan indication to trigger an alarm or turning on a CCTV camera The entire edge platform is built around a real-time scalable and adaptable computing architecture that’s flexible enough for algorithms and software to scale and adapt to different workloads and contexts. What’s more, it has real-time contextual awareness, which means that the entire edge platform is, at any time, aware of the external context, the sensor and sensor architecture and the requirements of the user application. Furthermore, when it produces the object output data, it also aware of the user application reaction plan indication, which could be triggering an alarm or turning on a CCTV camera when a specific action is detected. This approach turns traditional perception strategies on their head: it is software-defined programmable perception and computing architecture, not hardware-defined. It is free from the constraints imposed by traditional CPU or GPU compute dictated by hardware architecture providers and not limited to the perception built defined during design time. And, being fully configurable, it can be moved from one solution to another, providing computation for different modalities of sensors designed for different use cases or environments, and lower risk of adoption and migration for those developing the security solution. Future perception requirements senseEDGE is also able to scale to future perception requirements, such as algorithms and workloads produced by future sensors as well as computational techniques and neural networks that have yet to be invented. Meanwhile, latency versus throughput is totally software-defined and not limited by providers of computing architecture. Finally, contextually aware, it is fully connected to the real world where the reflexes adapt to even the subtlest changes in context, which makes all the difference in time and accuracy in critical security situations. This is how CronAI sees the future of perception. It means that security and safety innovators can now access and invest with low risk in a useable and scalable perception solution that can truly take advantage of current and future 3D sensor modalities.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyse more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analysed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analysing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as licence plate reading, behavioural analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fibre-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global market. During 2020, demand increased in most markets, and the company highly recommends that Hikvision’s thermographic cameras be used in accordance with local laws and regulations. Limitations of the technology include throughput and the impact of ambient conditions. Detect viruses and fever Hikvision releases a video that illustrates how skin temperature measurements are normalised within minutes Thermal cameras cannot detect viruses and fever and should only be used as a first line of screening before using secondary measures to confirm, says Stefan Li, Thermal Product Director at Hikvision. “We also believe it is important for businesses and authorities to use [thermal cameras] alongside a full programme of additional health and safety procedures, which includes handwashing, regular disinfection of surfaces, wearing protective clothing such as masks, and social distancing.” Hikvision has released a video that illustrates how skin temperature measurements are normalised within minutes after someone emerges from the cold. Mr. Li says the video demonstrates the accuracy of forehead measurement under difficult circumstances when people come inside from a cold outdoor environment. Temperature screening facilities “There have been some claims that measuring the forehead temperature is not as accurate as measuring the inner canthus, and we believe this video demonstrates the accuracy of forehead measurement very well,” he says. “We also illustrate how the skin temperature will experience a process of recovery (warming up), no matter if it is measured by a thermal camera or a thermometer.” Mr. Li adds that people should wait five minutes in such circumstances before starting a temperature measurement. “We hope that stakeholders who are involved in the design of temperature screening facilities and associated health and safety procedures will recognise how important it is to consider the skin temperature recovery time, and that forehead measurement can provide accurate test results,” says Mr. Li. Thermal imaging manufacturers The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced The temperature measurement principle of thermal imaging is to detect the heat radiation emitted by the human body. The detected heat value often does not reflect the true internal body temperature of an individual. Furthermore, the temperature varies among different parts of the human, such as the forehead, ears, underarms, etc. A temperature compensation algorithm can be used to adjust the measured skin temperature to align with the internal body temperature. The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced. At present, thermal imaging manufacturers in the market, and even forehead thermometer manufacturers, have developed their own algorithms to map the skin temperature measured by the camera to the internal body temperature, so as to compensate the skin temperature to the internal body temperature. Thermal cameras This is also why Hikvision recommends that the "actual body temperature" should be checked with a secondary device for confirmation. The calibration work for a thermal camera is completed in the production process at the factory, including calibration of reference values and detection point and so on. At the same time, the equipment parameters should be adjusted before on-site use to ensure accurate temperature reads. Hikvision does not deny the accuracy of temperature measurement at the inner canthus but prefers forehead temperature measurement and algorithms based on actual use scenarios, says Mr. Li. A large amount of test data and practical results indicates that the forehead is a correct and easy-to-use temperature measurement area, says the company. There are advantages and disadvantages of choosing different facial areas for temperature measurement. Default compensation temperature Two main approaches direct the measurement area and how compensation algorithms are applied: Forehead area + default forehead compensation algorithm value Upper half face (forehead + canthus) + default inner canthus compensation algorithm value. Both methods deploy compensation algorithms, but the default compensation temperature of the inner canthus will be less than the default compensation temperature of the forehead, generally speaking. The reason is that the temperature of the inner canthus of most people is higher than their forehead, so the temperature compensation is relatively low (i.e., closer to the actual temperature inside the body.) Upper face area Hikvision found that selecting the upper face area plus the default compensation value for the inner canthus resulted in situations when the calculated temperature is lower than the actual temperature. For the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face Mr. Li explains: “The reason is that when the camera cannot capture the position of the inner canthus (for example, when a person is walking, or the face is not facing the camera), the camera will automatically capture the temperature of the forehead. Then the result that appears is the sum of the forehead temperature plus the default compensation temperature of the inner canthus, which is lower than the actual temperature of the person being measured. Therefore, errors are prone to occur.” Thermal imaging products But for the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face. Also, the default forehead compensation temperature is based on rigorous testing and can also correctly mimic the actual temperature of the person being measured, says Mr. Li. After many test comparisons, considering that the results of forehead temperature measurement are relatively more stable, and in order to avoid the false results from inner canthus temperature measurement, Hikvision chose the forehead temperature measurement approach. “We look forward to bringing thermal imaging products from a niche market where there is a relatively high-end industry application to a mass market and serving more users,” says Mr. Li. Facial recognition terminals Additional application parameters can maximise effectiveness of thermal cameras for measuring body temperature: Positioning and height - All cameras must be mounted appropriately to avoid loss of accuracy and performance. The installation height of each camera must be adjusted according to camera resolution and focal length, and stable installation is needed to avoid errors caused by shaking. Ensuring a ‘one-direction path’ - The detection area must ensure that cameras capture the full faces of all those passing by or stopping, and obstacles should be avoided in the field of view, such as glass doors that block the camera. Adequate start-up and usage - A waiting time of more than 90 minutes is required for preheating, after the initial start-up. Before conducting a thermal scan, people should be given three to five minutes to allow their body temperature to stabilise. When Hikvision MinMoe facial recognition terminals are used, people must stand at a fixed distance, pass one by one, make a short stop, and face the camera directly. Hikvision cameras support efficient group screening, but one-by-one screening is suggested for more accurate results, says Mr. Li. Unstable environmental condition An unstable environmental condition may affect the accuracy of thermal camera systems Environmental factors can impact the accuracy of thermal cameras, and the idea of using a black body is to provide the camera with a reference point that has a stable temperature. The black body is heated to a specific temperature and helps the thermal camera to know how much error is caused by environmental factors in the room, and how the camera should calibrate itself in real time to improve its accuracy. A black body can help increase the temperature measurement accuracy, and the most common improvement is from ±0.5 degrees to ±0.3 degrees. However, it also increases the cost of the installation. In some markets, customers may require black bodies in order to comply with regulatory accuracy requirements. An unstable environmental condition may affect the accuracy of thermal camera systems for measuring temperature. Medical temperature measurement Therefore, Hikvision suggests that the ambient conditions should be met for installation and use. First of all, users should avoid installing devices in hot or changeable environments. All cameras require indoor environments with calm air, consistent temperature and no direct sunlight. Installation should also be avoided in semi-open locations that may be prone to changes in ambient conditions, such as doorways, and there should be enough stable, visible light. All devices should be installed to avoid backlighting, high temperature targets, and reflections in the field of view as far as possible. “We often see the misconception that thermal cameras can replace medical temperature measurement equipment, which is not the case,” says Mr. Li. Rapid preliminary screening “Temperature screening thermographic cameras are designed for the detection of skin-surface temperatures, and the measurement should be conducted to achieve rapid preliminary screening in public areas. It is really important that actual core body temperatures are measured subsequently with clinical measurement devices.”
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognise a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customisable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analysing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyse it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimise security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimise security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioural analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighbourhood watch programme made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioural anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labour-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
HID Global, a globally renowned company in trusted identity solutions, has announced that the American School of Guatemala has selected its Seos credential technology to modernise its physical access system. Enhanced campus security The solution significantly improves campus security and traffic efficiency for students and parents, along with enabling staff to easily issue and manage access credentials. “We’ve significantly improved the management of vehicle traffic by reducing the time it takes for parents to access the parking lot. We’ve been able to improve evacuation and emergency processes for our students and staff,” said a spokesperson for the Security Office, American School of Guatemala. Seos credential technology The spokesperson adds, “And, best of all, we have an automated system to manage the entry and exit times of our employees to know where everyone is located on our large campus.” The American School of Guatemala is a private K-12 college preparatory school in Guatemala City, Guatemala. The school partnered with local security integrator, Grupo RQM and HID Global to replace its legacy system, which consisted of written documentation and fingerprint logs. HID readers installed at access points The new system includes HID readers installed at pedestrian and vehicle access points The new system includes HID readers installed at pedestrian and vehicle access points and 1,500 Seos smart cards issued to students, parents and staff. In addition to automating and streamlining access to the school’s buildings, the solution has led to a reduction in the average student drop-off time from 40 to 18 minutes. The school also launched a pilot with HID Mobile Access to allow secure access to the school’s parking lot via mobile IDs stored on smartphones. To gain entry, users simply drive up and hold their mobile phone to a reader, an important feature since most students travel in bulletproof armored vehicles that lack the ability to lower windows. Upgraded security and authentication solutions “The American School of Guatemala’s access control system has all the hallmarks of HID’s industry-renowned security and authentication solutions,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. Harm Radstaak adds, “From flexibility and security to ease-of-use, HID’s unique combination of forward-looking technology and intuitive design helps create a robust solution that fortifies the school’s campuses and elevates the user experience.” Due to the successful deployment, school officials plan to replace its traditional key system with Seos smart cards for additional use cases, such as library and student payment services.
AZ Alma was a brand new hospital, created by merging two other hospitals. It needed an access control system that could cope with the demands of high levels of employees and visitors, varying access rights and the flexibility to respond in emergencies. The new hospital also had a vision of being completely keyless. Opportunities offered by AEOS AZ Alma installed Nedap Security Management’s AEOS access control system and implemented several useful features. LEDs on readers, for example, instantly show nurses which rooms they can’t access. AZ Alma installed Nedap Security Management’s AEOS access control system By integrating Mace readers, AZ Alma can give patients a QR code that gives access to parking, doors and elevators, so they can go straight to the right department. And, in line with its keyless vision, even the electrical cabinets have card readers. Key benefits High security & convenience Significant time and money saved by going keyless Option to trigger emergency settings that change access rights immediately Use of QR codes increases convenience for patients Easy to allocate and manage access rights, even for high volumes of people Freedom to integrate a specific choice of readers and other hardware Future-proofed access control that can be easily extended and adapted AEOS access control system AEOS access control system, developed by Nedap Security Management, is a software-based access control system, operated via a web-based dashboard, offering remote log-in from anywhere to control and monitor access. To add more functionality to the system, users can simply select extra options from their access control software. As AEOS is built on open standards, it integrates with a wide range of technologies, including video monitoring and biometric readers. And it has the flexibility to scale easily, so users can build and grow their access control system.
Aeroturn LLC, a globally renowned turnstile manufacturer that offers 100% Made in the USA turnstiles, has announced that it has been selected to deploy its turnstiles by one of the nation’s largest family housing finance leader. Contactless biometric technology Currently, the multiple building campus consists of five buildings and is in the middle of a major security upgrade that includes the latest contactless biometric technology. The finance lender was looking for a turnstile manufacturer who was up to the challenge of developing a customised solution that could integrate easily with brand new biometric facial recognition readers with high throughput capabilities. Aeroturn was the clear winner and joined forces with Siemens to ensure a successful deployment. Aeroturn also designed, fabricated, and delivered a single lane test rig prior to the project commencement to help with a seamless integration to the new biometric technology. Aeroturn X-wing turnstiles Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile" “We are thrilled to have been selected by this financial giant for this important upgrade as the best turnstile solution in the industry to meet their security needs,” states Michael Stoll, Vice President of Technical Sales & Marketing at Aeroturn. Michael adds, “Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile, which offers durability, reliability our 5-year warranty & zero maintenance mechanisms, and a 10 million passages guarantee.” Customised biometric reader interface The project currently consists of 15 lanes of Aeroturn X-wing turnstiles with a customised biometric reader interface being installed within a one-year timeframe. Additional HQ buildings are in the initial specifying stages. Aeroturn continues to raise the bar on quality turnstile solutions and help high-profile facilities in multiple vertical markets improve safety and security.
Trinity College Dublin is enhancing safety and support for staff and students by implementing SafeZone technology from CriticalArc. SafeZone technology Through this implementation, the university aims to deliver more rapid response to calls for assistance across all campus facilities, and to better assist students and staff working remotely, including those on placement overseas. When individuals call for assistance, in a wide range of situations, including those working alone out of hours, those with particular vulnerabilities and those with medical emergencies, the technology will enable responders to pin-point their precise location. Access with SafeZone mobile app Students and staff can check-in and use the service with the SafeZone mobile app Students and staff can check-in and use the service with the SafeZone mobile app, which puts them in immediate contact with the university’s support infrastructure. The technology will also make it easy for the responders to optimise response and to provide appropriate intervention in the event of an emergency. “During this challenging time for our students and staff, Trinity College Dublin is doing everything it can to ensure both the physical and mental well-being of everyone in our community. We are delighted to be introducing this advanced technology, as part of our support actions,” stated Trinity’s Head of Safety, Dr. Katharine Murray. Students and staff safety “It’s more important than ever for universities to keep in touch with their students and staff, to fulfill their duty of care and ensure that those who need help of any kind get the quickest possible response,” said Darren Chalmers-Stevens, Managing Director of CriticalArc. Darren adds, “We’re pleased to help Trinity College Dublin with a rapid implementation of SafeZone to help ensure the safety and well-being of students and staff.”
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Centre, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Centre is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
The Chilean Minister of Justice and Human Rights, Hernán Larraín, recently inaugurated the new Soter RS 250A Body Scanner at the Rancagua Penitentiary Complex in Chile, which will raise the security standards of the prison facility. The Soter RS 250 is a Full-Body Scanner, that uses X-ray technology to allow the rapid detection of prohibited items that could be smuggled into the prison. To facilitate inspection the scanned image can be managed through various effects and filters, such as sharpening, embossment, multi-touch zoom functions, brightness and contrast. Accumulative radiation dosage The image that the Soter scan delivers is similar to that of a medical X-ray, although the Soter technology uses 1000 times less radiation than a medical X-ray. The ANSI N43.17 international certifications which the Soter adheres to, are even stricter than the current Chilean radiation safety standards. In addition, the system calculates the accumulative radiation dosage a scanned individual is exposed to, (administered by the Gendarmerie Health Department) which is tracked by an implemented biometric reader. The system generates quarterly report for the Instituto de Salud Publica – (ISP – The Chilean public health institute). Also present at the opening ceremony were the national director of the Gendarmerie, Christian Alveal, together with the Minister of Justice of the O'Higgins Region Bárbara Perry, among other authorities. Detecting prohibited elements The Rancagua Penitentiary Complex is the first prison under concession to have this technology The Rancagua Penitentiary Complex is the first prison under concession to have this technology, joining the state criminal units of; CPF Arica - Female Penitentiary Centre, CP Arica, and CP Valparaiso - Penitentiary Complexes, CDP Santiago Sur – Preventative Detention Centres, High Security Prisons, Colina I, Colina II and CCP Temuco Penitentiary Compliance Centres. After the inauguration, the Minister of Justice and Human Rights, Hernán Larraín, pointed out that “This tool is extremely effective in detecting prohibited elements, increasing security inside prisons, since it allows a thorough body search to be carried out on all persons who enter the premises, whether they are officials, lawyers or family visits, but without giving an invasive treatment in the inspection procedure, eliminating manual inspection and thus guaranteeing the integrity of the people.” Optimising internal processes The national director of the Gendarmerie, Christian Alveal, added that “It is very relevant to have this type of technology inside the penal units, as it improves and optimises internal processes, where detection capacity contributes to guarantee comprehensive security of the enclosure. In addition, it allows a non-invasive treatment in the inspection process, guaranteeing the integrity and dignity of the people who visit those deprived of liberty.” Speaking from their Head Quarters in Leeuwarden, The Netherlands, Mr. van der Veen said of the installation; “We are delighted to have been awarded this contract and to be part of increasing of security across the Chilean Prison estate.”
Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download