Meesons, one of the UK’s leading specialists in entrance control, has strengthened its commercial team as part of its ongoing business expansion. Ciprian (Cip) Cioclei, joins as Business Development Manager for London and the South East and has a wealth of experience in the access solutions industry gained over the past 10 years. At Meesons, he will be responsible for developing new business opportunities for the company’s renowned products, including Speed Gates and Security Portal...
By joining forces with Nelysis, MOBOTIX has, for the first time, entered into a partnership with a company that is one of the world’s leading providers of cybersecurity solutions. Nelysis solutions protect customers’ network infrastructures and systems to ensure physical security and protect control systems. For instance, the ‘Vanguard’ complete solution from Nelysis minimises customers’ risks of external and internal hacker attacks as well as operational downtimes....
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features whilst exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providi...
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. Fo...
IFSEC Global, like any large trade show, can be daunting for attendees. At big shows, there can be hundreds of physical security manufacturers and dealers vying for your attention. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cybersecurity and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. With IFSEC Global approaching next week, we present e...
PSA, the security and systems integrator consortium, announces the call for presentations for PSA TEC 2020 is open. Sessions will be selected that serve a variety of disciplines and focus on emerging technologies, critical issues in the industry and tool development to augment attendees’ knowledge base needed to drive the industry forward. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets....
ONVIF, a global standardisation initiative for IP-based physical security products, announced that its Export File Format, the ONVIF specification for the export of video from security surveillance recording platforms, is the new standard recommended by the National Institute of Standards and Technology (NIST) for the exporting and playback of video surveillance recordings. In a research project commissioned by the FBI to aid law enforcement in forensic investigations, NIST worked in conjunction with ONVIF to adopt the Export File Format to serve as the FBI’s new minimum interoperability requirements for exporting and sharing video clips, streamlining the playback process of video from different video recording platforms from different vendors. Aid forensic investigation The ONVIF Export File Format will enable law enforcement as well as private users These files are often exported in different proprietary formats, making it difficult for law enforcement to collect, correlate, and analyse the video data, as demonstrated by the 2013 Boston Marathon bombing, where more than 120 FBI analysts reviewed in excess of 13,000 videos before discovering key evidence in the footage. The NIST recommendation is published as NISTIR 8161 revision 1, which replaces revision 0. The ONVIF Export File Format will enable law enforcement as well as private users to more quickly and efficiently conduct forensic investigations using video of an incident from multiple sources – both private and public – regardless of what recording system originally captured the video. Export File Format will also be part of new worldwide standards to be published this year by the International Electrotechnical Commission (IEC) on the use of video surveillance systems in security applications, increasing the applicability of this standardised format on a global scale. Technology interoperability “This is a major step toward harnessing the massive amounts of video evidence, produced by IP-based video surveillance systems, that can be available to law enforcement in the event of a major incident, as well as to any user of a video recording system in need of faster and easier access to multiple video files,” said Per Björkdahl, chairman of the ONVIF steering committee. The NIST report addresses technical details as the use of MP4 as the standardised file format “We were very pleased to offer our expertise, specifically from our technical experts Dr. Hans Busch and Stefan Anderson, and have our work toward interoperability be validated in this way by the global standards and law enforcement communities.” The NIST report addresses technical details as the use of MP4 as the standardised file format and includes support for video codecs H.264 as well as and future variants to ensure video quality. Exported video must contain standardised, UTC clock timestamps that correspond to each video frame, with a recorded export system UTC clock time, with a reliable external reference time that is determined at the time the video is exported. Exported metadata information ONVIF is an industry forum driving interoperability for IP-based physical security products Using the ONVIF Export File Format will also provide useful exported metadata information (e.g. recording equipment used, export file creation time and name of export operator), as well as allow the video file to be digitally signed to ensure the chain of custody for evidentiary purposes. Founded in 2008, ONVIF is a leading and well-recognised industry forum driving interoperability for IP-based physical security products. The organisation has a global member base of established camera, video management system and access control companies and more than 12,000 profile conformant products. ONVIF offers Profile S for basic streaming video; Profile G for edge storage and retrieval; Profile C for door control and event management; Profile Q for quick installation, Profile A for access control configuration and Profile T for advanced video streaming. ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.
Qognify – the technology solution provider for physical security and enterprise incident management solutions – has launched Umbrella. The new web-based management platform leverages significant cost savings by managing large distributed video surveillance systems centrally in the cloud. In recent years, video surveillance projects have become larger and more complex, demanding more resources and increasing operational costs. Altering the configuration of multiple sites is time-consuming and monitoring the health status of all servers and cameras across every location is a challenge. As a consequence, organisations frequently over-spend on technical expertise and unnecessary licenses, as well as potentially exposing themselves to regulatory risk. Organisations frequently over-spend on technical expertise and unnecessary licenses Qognify new product is aimed at solving these challenges and is fully integrated with Qognify’s video management software (VMS) Cayuga. The web-based Umbrella can be hosted in the cloud (including Microsoft Azure and AWS) as well as on premise. Remote configuration Once installed, Umbrella provides a consolidated view of all servers and cameras across every connected installation, highlighting those, which require attention. Furthermore, if any company-wide changes are required to be made to how the video system operates (e.g. caused by changes in regulations such as GDPR), they can be configured and rolled-out remotely and immediately. Umbrella is well-suited for organisations in the banking, retail, logistics and transportation industry, which operate large-scale branch networks with hundreds of sites and thousands of cameras to be managed and place a premium on their physical security strategy. Umbrella was unveiled at Qognify’s EMEA launch event in Germany on May 9 in Karlsruhe, giving key partners and end customers of Qognify the opportunity to learn more about the new combined company after the acquisition of OnSSI and SeeTec at the end of 2018. Enterprise-class video solutions Umbrella is born out of our commitment to delivery truly enterprise-class video solutions" Vice President of Research & Development at Qognify, Chen Porat, comments on value the new technology delivers: “Centralising system monitoring, administration and license management through Umbrella, enables organisations to be more proactive and effective in the way they operate and maintain their surveillance camera networks, regardless of scale or complexity.” Steve Shine, CEO of Qognify, adds: “Qognify is one of the leading solution providers for video surveillance and Umbrella is born out of our commitment to delivery truly enterprise-class video solutions. Launching Umbrella, we want to fundamentally change the way organisations deploy, use and manage technology to protect people, customers, assets and infrastructure.” Umbrella is now available to organisations using Qognify’s Cayuga video management system.
Hikvision, the provider of security products and solutions, releases the first version of its product security white paper, introducing the security challenges of IoT products and sharing Hikvision’s practices to continuously improve the security throughout the whole product lifecycle. The product security white paper outlines Hikvision’s comprehensive approach to product security covering device security, data security, application security, network security, privacy protection, and security compliance, which can greatly enhance the product security and the risk resistance in various application scenarios. Current security threats Interconnection of IoT devices is becoming much more common today" “Interconnection of IoT devices is becoming much more common today, while the consequent risks are fast growing. Product security remains among our top priorities on multiple dimensions such as R&D, production, and delivery. We also hope to raise the awareness of security issues and establish trust and cooperation with all the stakeholders by sharing our insights”, said Dr. Wang Bin, Vice President, Director of Network and Information Security Laboratory of Hikvision. In addition to the newly released product security white paper, Hikvision also released an updated cybersecurity white paper, which comprehensively illustrates the current security threats for IoT and relevant challenges for the whole security industry, and it shares Hikvision’s ongoing efforts to improve its cybersecurity system. Supply chain management According to the updated cybersecurity white paper, the existing security research and development process of Hikvision has been enhanced with more advanced technical means and tools, which meets higher standards in terms of design, development, verification, risk mitigation, and configuration management. Meanwhile, the company has optimised the operation mechanism and the professional qualifications of its security teams. The white paper also highlights the security issues related to supply chain management. The company has adopted effective technical and management systems to ensure supply chain security with reference to the international standards, extending the protection scope of cybersecurity systems and building a security ecosystem together with supply chain partners.
Johnson Controls’ new EN Grade 3-compliant Tyco DSC PowerSeries Pro intrusion security alarm system provides a feature-rich intrusion detection solution for commercial properties of any size, from small shops to large office buildings, factories, healthcare facilities and educational campuses. The PowerSeries Pro completes the JCI intrusion product portfolio with integrators now able to single-source a complete electronic security solution for commercial installations from Johnson Controls, according to Jennifer Doctor, the company’s Intrusion Product Management Senior Director. Commercial property applications “The launch of this high-specification system provides exciting opportunities for our Tyco installation partners across EMEA to generate new business, as well as consolidate their relationships with their existing end-user clients,” says Jennifer. PowerSeries Pro is ideal for the most demanding applications where a Grade 3 system is an essential requirement “They can now recommend the EN Grade 3-compliant PowerSeries Pro to their clients, along with access control and video surveillance solutions which come under the Johnson Controls umbrella, safe in the knowledge that all our products and systems meet the most demanding of standards for commercial property applications.” Useful for demanding applications PowerSeries Pro is ideal for the most demanding applications where a Grade 3 system is an essential requirement or just a reference to follow. PowerSeries Pro also has a high-current capability, making it well-suited for large-scale buildings where large numbers of contacts and sensors need to be installed. All the communication, whether internal between the system components or external with the monitoring center is cyber secure, meeting the highest standards with AES-128 bit encryption. Variety of features for installers Neil Evans, Senior Product Manager, believes that PowerSeries Pro will very quickly earn a reputation for being the ‘installers’ friend’. “A lot of thought has been put into how we can make life easier for installation engineers and reduce the time they have to be on site. For example, PowerSeries Pro is supplied with removable terminal strips and programming templates, as well as ethernet and Wi-Fi capabilities to reduce installation and system commissioning time. There is also a supporting installers’ app which can be run on a smartphone or tablet to program the system locally.” Single control unit PowerSeries Pro offers a highly effective hybrid intrusion security alarm solution PowerSeries Pro also offers a highly effective hybrid intrusion security alarm solution by providing the option to install a combination of hardwired and wireless detectors and sensors. With built-in 128-bit AES encryption and cyber protection capabilities, the hybrid option provides an EN Grade 2-equivalent solution which capitalises on unique PowerG technology – an “invisible wire”. PowerG features multi-channel frequency hopping and provides true two-way wireless communication. It also has the ability to transmit detector activation alerts over long distances. This offers potential major cost and operational benefits by being able to have one control unit handle alarm activity from detectors located in multiple buildings on a site.
UK security fencing manufacturer Jacksons Fencing has expanded its hostile vehicle mitigation (HVM) range by adding the Impakt Defender temporary HVM barrier by Rosehill Security, renowned global provider of engineered rubber perimeter security products and ballistic solutions. Jacksons Fencing now has exclusive rights within the UK for both direct sales of the innovative barrier, as well as hire markets. Impakt Defender HVM barrier Impakt Defender is IWA-14 rated, capable of stopping a 7.2 tonne N2A lorry travelling at 30 mph Combining a large footprint and unique shape, Impakt Defender is IWA-14 rated, capable of stopping a 7.2 tonne N2A lorry travelling at 30 mph. The barrier is also accredited by Secured by Design. It’s the first HVM product in the Jacksons range that requires no foundations, enabling it to be quickly installed across all types of sites. Individual units weigh in at 430 kg and are manufactured from 100% recycled rubber bonded with polyurethane for strength. Steel security fence panels Additionally, Jacksons Fencing’s steel security fence panels can be mounted above the barriers to provide increased perimeter security. An ideal physical and visual deterrent, the combination can be rapidly deployed for temporary or permanent security installations, helping to protect people, buildings and infrastructure from hostile vehicle attacks. Cris Francis, Jacksons Fencing Security Consultant, says: “The UK and other parts of Europe are experiencing a worrying increase in vehicle-as-weapon attacks. Consequently, we’re seeing a growing demand for HVM measures as they become an integral part of physical security strategies. A high-quality and tested product, Impakt Defender is an excellent addition to our existing HVM range, offering our clients increased flexibility and versatility.” Securing public spaces Securing public spaces is a high priority for businesses and government organisations" Dalton Marshall, Sales Manager at Rosehill Security, comments: “Securing public spaces is a high priority for businesses and government organisations, with effective HVM solutions now more in-demand than ever. We are delighted to partner with Jacksons Fencing who are well known for their expertise in perimeter security. We’re confident that Impakt Defender will be a valuable addition to Jacksons’ extensive range of products, providing increased scope to protect people and places.” Impakt Defender joins a wide range of HVM products available through Jacksons Fencing, including bi-folding speed gates, static bollards and cable crash fences.
Johnson Controls announces that its flagship access control and event management system Tyco Software House C•CURE 9000 is supported on Infrastructure as a Service (IaaS), enabling customers to take advantage of the many benefits of cloud computing with the choice of best-suited service providers. With C•CURE 9000 deployable in the cloud, integrators and end users can leverage cloud service providers such as Microsoft Azure, Amazon Web Services, and Google Cloud Platform, to reduce server infrastructure and maintenance costs with greater business continuity options. Physical security operations Beyond IT modernisation and cost management, organisations are approaching cloud adoption strategies through the lens of broader enterprise business efficiency and growth objectives. Companies are aggressively moving to the cloud to maximise their IT spend" As organisations identify and migrate critical application workloads to the cloud, physical security operations are able to increase C•CURE 9000 application availability by leveraging redundancy and disaster recovery infrastructure that geographically extends well beyond their on-premise constraints. “Companies are aggressively moving to the cloud to maximise their IT spend while improving their agility to respond to business needs and market changes,” said Jason Ouellette, general manager of Enterprise Access & Video Solutions, Building Technologies & Solutions, Johnson Controls. Artificial intelligence “When moving infrastructure to the cloud, learning how to provision the right type and size of resources required for customer specific environments is critical to optimise performance and cost. Customers who take this approach in their C•CURE 9000 cloud migration planning can easily avoid overspending while maintaining flexibility to quickly scale resources based on actual need.” To assist customers seeking C•CURE 9000 cloud deployment support, the Software House Professional Services organisation provides a broad range of consulting and implementation services, including technical guidance on best practices and system architecture considerations regarding customer specific cloud strategies. Cloud solutions are an integral part of the strategic focus of the Tyco Access Control and Video Solutions unit of Johnson Controls, along with artificial intelligence, unification and cybersecurity, comprising of four key technology pillars.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as old familiar faces will be vying for your attention. With only three days, it’s nearly impossible to explore every booth and every vendor. Ultimately, you’ll want to focus your limited time on companies whose partnership can lead to your organisation’s long-term success. In that context, I’d like to suggest a few things to think about as you wend your way through this year’s tradeshow. The next wave in IP technology The fact that the whole world is going IP is nothing new. The network-based connectivity trend has been ongoing for more than 25 years. What’s changed is the nomenclature. Today it’s all about the Internet of Things (IoT). What was once exclusively an analogue-based video surveillance market has shifted predominantly over to IP For the security industry, the concept of IoT really began with connecting DVRs through a network. Then in 1996, IP cameras – the first true IoT devices – hit the market. Since then, what was once exclusively an analog-based video surveillance market has shifted predominantly over to IP, providing exceptional growth opportunity for any company wanting to be on the leading edge. Today, however, that market is relatively saturated and growing at a much slower rate. In response, consolidation of the market has started to accelerate. Many vendors are disappearing while a select few are becoming stronger. Though the IP video revolution is now a fait accompli, there are still a few ancillary security technologies that are just beginning to jump on the IP convergence bandwagon. I’m referring to two in particular: IP audio systems and IP intercom solutions. Like their IP video cousins, these relatively new IP systems are built on open platform standards and provide the same benefits for convergence as happened in the camera space: better scalability and ROI, more functionality, and easy integration with third party systems. The technology is a great complement to a customer’s existing IP surveillance system or an ideal replacement for an antiquated analogue audio system. So I’d recommend spending time at booths showcasing this technology. Listen to the crystal clear sound quality. Learn from the various vendors how easy IP audio systems are to custom configure, remotely manage and scale. And discover the different ways the IP technology can be used, from paging, public address and broadcasting background music to augmenting security systems and perimeter protection solutions. The potential markets that can benefit from this latest IP technology are wide and varied, everything from hotels, hospitals and transportation hubs to educational institutions and retail chains. So it’s well worth your time to take a look at this growing opportunity. AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board Artificial intelligence: hype vs. reality Video intelligence or video analytics was the big trend a decade ago. But it quickly fizzled out when hype crashed into reality. In the ensuing years algorithms have greatly improved, leading to more reliable analytic performance. Now it’s commonplace for video surveillance solutions to include a wide range of analytics from motion detection and people counting to dwell time analysis, object left behind and license plate recognition. The latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI) With analytics gradually becoming mainstream, the latest hype to capture the imagination is self-learning systems, often referred to as Deep Learning and Artificial intelligence (AI). These self-learning applications parse event data and use what they’ve learned from the experience to make determinations or predictions that can increase the accuracy of future alerts. Before you get swept up in all the big promises that have yet to prove deliverable, take time at ISC West to educate yourself about the current state of the technology. AI works well in some areas. For instance, AI has proven to dramatically improving the accuracy of Traffic Incident Detection analytics. But it’s too early in the game to assume that AI can be applied across the board. Talk to some of the AI vendors at ISC West to learn when and if AI might be right for your organisation’s analytic applications. See who has actual, field-proven solutions and who is just offering ideas that might take many years to prove useful in real applications. Connecting with the right partner Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners Choosing the right partner is as important in business as it is life. Think of ISC West as the ultimate meet-and-greet. Look around the tradeshow floor and see who might by likely partners. You’re sure to find a number of new companies entering the field this year. Also be sure to notice which companies are absent. Have they left the surveillance industry? Are they struggling financially and can no longer afford to show up? If you partnered with them in the past, where does that leave your business today? As you explore potential vendor relationships, make sure you not only look at the arc of their technology development, but also their long-term financial stability and the kind of support services they offer. Cybersecurity should be front and center on your radar, along with timely updates, product integration with your existing technology and ongoing training to gain the most benefit from your investment. Look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint Think of ISC West as the ultimate meet-and-greet - look around the tradeshow floor and see who might by likely partners Another important thing to find out is whether their business ethics align with yours. Is sustainability important to your company? How about corporate social responsibility, diversity and inclusion? Ultimately you want to do business with healthy, innovative companies that share your core values. If being green is a fundamental principal of your company, look into how eco-friendly the vendor’s products are, what they’re doing to recycle, minimise waste and lower their carbon footprint. If striving for better global citizenship is your corporate mantra, you need to know how the vendor is assuring their operation complies with environmental laws and regulations. In terms of maintaining social and ethical standards, it’s important to know where the vendor stands on issues such as human rights violations, compulsory child labour, fair wages and sourcing minerals from countries in armed conflict. Go in with a plan There’s so much to discover at ISC West this year that four days isn’t nearly enough time to see it all. So you’ll have to strategically pick and choose which booths and vendors to visit. I’d advise that you plan out your days in advance so that you can get the most value from the choices you make.
Panasonic is selling off 80% of its video surveillance business to a private equity firm but will retain 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by new competition from large Chinese companies and lower prices of video surveillance equipment. Strategic business alliances Panasonic is establishing a new company made up of its security systems business, and Polaris Capital Group Co. will acquire 80% of the outstanding shares of the new company. The decision was approved by the board of directors on May 31, and the transaction is expected to be completed by Oct. 1. The new company’s security cameras and software will be sold under the Panasonic brand Polaris has experience in strategic capital alliances with manufacturers and large-scale companies. Based on that experience, Polaris expects to smoothly and rapidly build the structure necessary for an independent business while preserving the strengths and unique characteristics of the business. The goal is to 'maximise corporate value as an independent company toward IPO (initial public offering) in the future.' Panasonic brand name to continue The new company – named Panasonic i-PRO Sensing Solutions Co., Ltd. – will encompass the Panasonic Connected Solutions Company’s Security Systems Business Division and the industrial and medical vision compact camera R&D department of its Innovation Center. The Public Safety sales and development functions of Panasonic System Solutions Company of North America (PSSNA), and the security camera manufacturing factory in China – Panasonic System Networks Suzhou Co., Ltd. (PSNS) – will become subsidiaries of the new company. Polaris expects to smoothly and rapidly build the structure necessary for an independent business After establishment, the new company’s security cameras and software will be sold under the Panasonic brand. Sales will be handled directly by the new company in the U.S. market; through Panasonic System Solutions Japan Co., Ltd. (PSSJ) in the Japanese domestic market; and through existing Panasonic sales companies in other regions including Europe, China, Southeast Asia, Oceania and Canada, which will all sign sales agreements with the new company. Future outlook An announcement from Panasonic details plans for the new company: “It will build on the strengths of the Division while benefitting from management and resources of Polaris to seamlessly implement the necessary structure to operate as an independent organisation. Strengthening its solutions capabilities with proactive alliances and M&As, the new company will aim to enhance its revenue and profitability globally centred on the North American market. With new and next-generation products and services, and a strategic growth plan to expand sales of medical camera modules, the new company will build a solid foundation as an independent entity.” The core business of video surveillance equipment is more competitive than ever The Security Systems Business Division of Panasonic has a roughly 60-year history of developing security cameras and advanced edge devices and combining these with unique software such as facial recognition to meet the needs of the market. It has established itself as a top brand. Effect on U.S. market Panasonic in the U.S. broadened its business approach to increase systems sales with the acquisition of Houston, Texas-based Video Insight in 2015. The developer of video management software especially helped to boost business opportunities in the education market in North America. More recently, Panasonic has sought to differentiate itself with an emphasis on R&D and new product developments, including artificial intelligence. Last year, the company highlighted its FacePro deep learning facial recognition system using extreme sensing and enhanced detection technology to identify persons of interest and alert authorities of their presence in real-time. Developments in the offing The Security Systems Business Division of Panasonic has a roughly 60-year history of developing security cameras In the near future, Panasonic is also looking to apply AI-based capabilities to vehicle recognition, with the ability to identify vehicle characteristics such as colour, type of vehicle and direction of travel. On the VMS side, Panasonic announced last year its intent to transition its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved. Still, the core business of video surveillance equipment is more competitive than ever. As Panasonic looks to regain its former dominance, it will face an uphill battle. A sharper focus and new management, resulting from the acquisition, may help to turn the tides.
Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger picture.’ Here are some sessions to consider: Artificial Intelligence The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks A session on artificial intelligence asks: ‘Will AI change the face of the Electronic Security Industry?’ The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks. Connectionism, or neuronlike computing, developed out of our understanding of how the human brain works at the neural level. Each neuron in the brain is akin to a simple digital processor, and the brain as a whole is like a computing machine. Has the time come for artificial intelligence and machine learning for security? That’s the focus of another session that will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection. Is AI a technology looking for a problem to solve? Is it mature enough for mainstream usage in security scenarios? Does AI present a ‘double-edged risk’ (i.e., because enterprises and attackers have access to the same tools)? Convergence A combined security approach – unifying physical security and cybersecurity – is a real and immediate need in today’s high-risk and high-threat environment. By leveraging disparate sources of data, organisations can effectively manage a situation in real-time without having to go to multiple individual subsystems to get the job done. A panel session at IFSEC will discuss the concept, reality, and evolution of both physical and cybersecurity teams collaborating in the same Security Operations Centre. Here are some other sessions related to convergence of physical and cybersecurity: How converged security centres respond in real-time to physical and online threats How converged technologies ease prevention and response to unauthorised physical/logical access to corporate facilities and networks How chief security officers can benefit from data analytics and converged platforms to understand the complex physical and cyber risks posed to transport systems. GDPR Whilst the regulations provide a more comprehensive basis in law for the management of personal data The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements for video surveillance systems. That’s the subject of the session ‘GDPR – Video Surveillance: Balancing Privacy and Security.’ Whilst the regulations provide a more comprehensive basis in law for the management of personal data, they are part of a wider legal consideration for security technologies. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect. The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with their respective Codes of Practice provide a bedrock for effective governance. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weigh alongside the benefits. The session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising insider malicious attacks threat As the threat landscape evolves rapidly, CISOs need to step up their game According to the 2017 U.S. State of Cybercrime Survey, 50 percent of organisations experience at least one malicious insider incident per year. And the Verizon 2018 Data Breach Report found that close to 30 percent of confirmed breaches today involve insiders. In August 2018, a tragic crash involving a Seattle airplane stolen by an employee raised awareness for the need for physical insider threat awareness (as well as more psychological screening before employment). As the threat landscape evolves rapidly, CISOs need to step up their game, says Aamir Ghaffar, Director of Solutions Engineering at AlertEnterprise. They should implement security controls that protect their company’s people, physical assets, data, intellectual property, and reputation both inside and out. And they need to do it while simultaneously satisfying industry compliance requirements. In response to our questions, Aamir Ghaffar offered some additional insights on the timely topic of insider threats. Q: We are hearing discussion about the emergence of cyber-physical security systems. What are they and how do they help organisations address insider threats? Threats now originate not only in the physical space but also in cyber environments Ghaffar: The concept of convergence has evolved in response to risk and the overall threat landscape. Threats now originate not only in the physical space but also in cyber environments – this is what is commonly referred to as blended risk. These blended risks require a converged approach and a converged view of security as a whole; connecting data, building new capabilities and gaining new insights to allow security teams to better defend against attacks. Q: How are organisations responding? Ghaffar: They are shifting towards centralisation – from the security operations center all the way to the executive level, where one C-Suite executive manages all security across physical, IT and OT domains. According to Gartner by 2023, 75% of organisations will restructure risk and security governance to address new cyber-physical systems (CPS) and converged IT, OT, Internet of Things (IoT) and physical security needs, which is an increase from fewer than 15% today. Q: How does the shift impact insider threats? Ghaffar: Unifying cyber and physical unlocks powerful new capabilities. For example, cyber-physical teams faced with a threat such as an intrusive device planted within their network environment, can quickly connect the cyber footprint to a physical location – understanding where the threats originate and identify those responsible for bringing it in. Converging physical and cyber identity through platforms that connect physical access control, IT and OT systems is an example of how organisations can better prepare for blended security threats An AI-enabled automated system is the most practical and human error-proof solution today Q: How is AI being used to protect against insider threats? Ghaffar: With increased security convergence we are now collecting such a large volume of data that relying on manual detection of insider or external threats is no longer a viable solution. An automated system, powered by artificial intelligence used with digital identities, is now the most practical and human error-proof solution today. AI and machine learning (ML) technology helps organisations map complex patterns of user behavior, process tens of millions of events within seconds to detect threats in near-real-time and respond swiftly. This benefits security operations personnel to go from distraction to action, allowing them to focus on what really matters, which are their most critical security events. Q: Sometimes the threat is about human error. Oftentimes we think the most harmful insider threats are intentionalGhaffar: Oftentimes we think the most harmful insider threats are intentional; however, unintentional user behavior and negligence could have serious ramifications for an organisation. Organisations should deploy technology that delivers automation and active policy enforcement to prevent employees from making inadvertent yet critical errors. Organisations should also do regular risk assessments – not one and done. Don’t implement a process and think you’re secure. Automated identity and access management technology can provide scheduled access reviews to help detect high-risk user profiles with accumulated or a toxic combination of access, as well as segregation of duties violations due to department change or job transfers. Q: What are the biggest misconceptions about insider threats? Ghaffar: First, that the biggest threats originate outside my company. Or that insider threats are a problem for government agencies and highly sensitive organisations, not “regular” companies like us. A company may also mistakenly think that they have limited assets that could be exposed, or that the assets are of little value; therefore, a large-scale breach is less likely to happen. And even if it does, it probably won’t have a big impact. Risk management leaders should start by developing a compelling visionQ: So, they think “it can’t happen here.”? Ghaffar: Yes, and they think their employees are inherently trustworthy, and that with basic security measures in place, the risk is small. They think that insider threats are always intentional. Or they think “it’s not my job.” Q: What next steps should security leaders take in addressing insider threats in their organisation? Ghaffar: Security and risk management leaders should start by developing a compelling vision and strategy that will resonate with key company stakeholders. They can expand the visibility they have into user activity beyond things that happen on the network. Go beyond a data-centric approach to a people-centric approach through identity behavior analysis. Improving visibility into user activity and taking a more preventive approach are the best ways to manage risk of an incident. Develop an inside-out approach to security. By converging physical, cyber and OT security you’ll gain a holistic view of your enterprise-wide security landscape.
Surveillance solutions business Synectics develops and delivers a solution to help enhance safety and security monitoring at Nottingham Trent University. With more than 28,000 students and 3,100 staff to protect, surveillance footage at Nottingham Trent University (NTU) is captured by over 1,300 cameras covering the estate of 75 buildings. Each of the university’s three main campuses has a 24/7 control room and its own security team, ensuring that safety measures enable free movement while protecting the community from both external and internal threats. Integrated surveillance solution Synectics deployed a tailored solution based around its Synergy 3 command A progressive development plan, coupled with the need to optimise legacy technology, meant the university required an integrated surveillance solution that would enable teams based at each control room to monitor and manage footage from both IP and analogue cameras, supporting a gradual transition to digital solutions and full-IP ambitions. In one of the UK’s first cloud-based surveillance contracts, and in collaboration with integrator PFS, Synectics deployed a tailored solution based around its Synergy 3 command and control platform to support NTU’s long-term objectives. Interactive camera map Mark Stacey, Security Systems Operational Manager, NTU, said: “Moving the university onto a sophisticated surveillance monitoring platform has significantly improved the provision of student security, saving our team vital minutes in the event of emergencies.” “As well as supporting both analogue and IP inputs, where many solutions on the market do not, Synectics’ Synergy 3 offers impressive functionality and is easy to use. The ability to import an interactive camera map means we can now bring up footage in just seconds, where operators previously had to spend time manually correlating sensor triggers to the relevant cameras – an enhancement that keeps our students safe in real time.” Cloud-based system “Synectics even created a new feature at our request, which enables us to circle an area of the on-screen map and immediately view up to nine local cameras in that zone. Furthermore, opting for a cloud-based system means we don’t have to look after a physical server, freeing up space and our resources.” The system will help us in our mission to provide an ever-safer environment for our students" “Throughout the process, Synectics has gone the distance to deliver, as highlighted by the tailored training sessions provided for the team and its commitment to support us throughout the life of the system. We’re delighted with the results and sure the system will help us in our mission to provide an ever-safer environment for our students.” Future-proof solutions Martin Bonfield, Sales Manager at Synectics, commented: “We passionately believe that command and control systems should be flexible enough to allow for the evolution of customer needs. Only then can you provide seamless, future-proof solutions that improve safety both now and in the long term.” “Working closely with the team at NTU to understand their needs, the Synergy 3 platform has been designed to ensure they have an intuitive system that saves staff-hours and significantly improves incident response times. Nottingham Trent University is nationally recognised, having received the University of the Year award three years in a row. I’m delighted that we’ve provided them with this leading-edge solution, along with support, and ongoing training, to help safeguard their students, staff, and premises.”
After a period of decline, the number of pupils being expelled from mainstream schools is increasing, placing more pressure on the need for Pupil Referral Units and the security at these premises, which is vital for managing student and staff safety. ASSA ABLOY High Security & Safety Group offers a range of locks and doors suited to the sensitive needs of Pupil Referral Units and pupils in care. Fire resistance integrity All doorsets in the Secure Education range are independently tested and certified The breadth of doorset solutions means the High Security & Safety Group can specify products for every area and need of a secure education environment. From classroom doors and personnel doors to circulation doors and high-performance doors. All doorsets in the Secure Education range are independently tested and certified to achieve 60minute fire resistance integrity and insulation to BS EN 1634 from both sides of the door. In addition, all doors within the offering are tested in line with the Department of Health’s environmental design guide attack test for secure services, as well as meeting with DD171 & BS EN 1192 severe duty performance and strength, and are tested to PAS 24 enhanced security performance requirements. Secure educational facilities This guaranteed and certified level of performance gives building owners and users the peace of mind that all doorsets are fit for purpose, as well as providing the added level of security and safety often needed in secure educational facilities. Mike Dunn, Commercial Director for ASSA ABLOY High Security & Safety Group, said: “A recent report by the think tank IPPR, found the total number of children being taught in ‘alternative provision’ for excluded children is far higher than the total number of reported exclusions. This will inevitably mean increasing pressure on facilities, such as Pupil Referral Units, and the safety of staff and pupils within those buildings.” Added level of security Pupil Referral Units are first and foremost a place of education" “Pupil Referral Units are first and foremost a place of education and therefore doors and locks must allow for this, grant access, as well as restricting permissions. However, an added level of security and safety must be considered and handled sensitively within these premises.” “Our experience and wide product range means we can advise on and supply doors and locks for every aspect of a secure education environment, mitigating any risk and ensuring a smooth specification process.” Doors within the Secure Education range come in a variety of materials and finishes, giving specifiers improved design flexibility.
Two of the most important priorities in a manufacturing environment are safety and productivity. Failure to follow safe work practices around machinery on a factory floor can result in serious injury, while poor productivity can erode profits and ultimately threaten the viability of the business. At WCCO Belting, a Wahpeton, North Dakota-based manufacturer of custom rubber products for agriculture and light-industrial conveyor equipment, a March Networks® video surveillance solution plays a key role in enhancing both safety and productivity. Monitor work processes “Recently, for example, we had a minor safety incident on one of our machines that was captured by the system,” said Michael Marsh, Senior Technology Administrator. “The video not only allowed us to determine the cause of the incident, it also helped us create a proprietary piece of equipment to ensure that the accident would never happen again.” Safety was the main reason WCCO Belting acquired a March Networks system in 2015 Safety was the main reason WCCO Belting acquired a March Networks system in 2015, but the company soon discovered it could use the technology for other equally important priorities. “We found that we could use the video solution for time studies, to be more effective and efficient,” said Marsh. WCCO engineers use the video to monitor work processes and then tweak them to speed production, while ensuring optimum quality. Security system integrator The company selected Marco Technologies as its security system integrator in 2015, and acquired March Networks 8000 Series Hybrid NVRs shortly thereafter. Two years later, when WCCO Belting decided to also equip a second production facility in Arlington, Texas, it upgraded to a March Networks Command™ Recording Software (CRS) solution in North Dakota and moved the 8000 Series Hybrid NVRs to its Texas facility. At the same time, the company deployed March Networks Command Enterprise Software to tie all the video from its geographically-dispersed facilities together, said Marsh. The software enables WCCO Belting “to oversee everything and manage the entire system from a single point of entry.” In addition, approximately 50 March Networks IP cameras — including indoor domes with wide dynamic range and outdoor IR bullet cameras — provide crystal-clear video of activity on the company’s factory floors, loading docks and parking lots. Remote configuration Marsh cites ease of use and outstanding support as the main reasons for selecting the video solution. “The technology is easy to implement, easy to use and easy to navigate. Support has also been great. When we ran into some early issues, they responded quickly to help resolve the problem.” We didn’t have to uproot a lot of the architecture already in place" “More recently, when we decided to expand the system to include our second location, it was Marco that recommended the CRS solution and the redeployment of our NVRs to Texas. It was really plug and play. That was the winning piece for us. We didn’t have to uproot a lot of the architecture already in place.” A system that was easy to rollout was important because WCCO Belting’s IT department does the physical camera install themselves, while partnering with Marco Technologies for remote configuration. Command mobile app “It’s one of the reasons we like March Networks, because we’re a hands-on IT department,” explained Marsh. “We like to make sure we’re always on top of things and that we understand the equipment we’re working with. If we can’t install it ourselves and need someone to come in and do it for us, it just creates future costs.” Aside from the IT department, which has administrative access to the system, authorised supervisors and managers at WCCO Belting are able to audit video for safety and security purposes. Temporary access is also provided to engineering staff for time studies. Marsh and several supervisors also have access to video through the Command Mobile app on their smartphones. Available as a free download from the Apple Store and Google Play, Command Mobile runs on iPhones, iPads and Android devices. Track offending vehicle Remote, after-hours access to video proved valuable during the previously mentioned safety incident, for example, “by allowing managers to pull up video from home and use it to make decisions quickly,” said Marsh. The video solution has also proven useful to local law enforcement, as some of the bullet cameras covering the employee parking lot at the North Dakota facility also have a clear view of North 9th St., a busy artery in the town of 8,000. The video resolution was so good that we were able to quickly track the offending vehicle" “One day, I was called to the front desk and met by two police officers and three sheriffs,” recalled Marsh. “They wanted to come to my office but didn’t say why. I was never so nervous in my life. Once in my office, they explained that they wanted to see if we had any recorded video to help them solve a hit and run a block and a half down the road. We did, and the video resolution was so good that we were able to quickly track the offending vehicle.” Rubber belting solutions “We’ve had two law enforcement visits since then, so now when they show up, I know I’m not in trouble,” joked Marsh. A family-owned business, WCCO Belting was founded in 1954 by Ed Shorma, a Korean War veteran who mortgaged the family car and borrowed $1,500 to buy a shoe repair shop. Propelled by Shorma’s strong work ethic and talent for ingenuity, the business grew and evolved as a manufacturer of rubber belting solutions, leading to Shorma’s recognition as Small Business Person of the Year by U.S. President Ronald Reagan in 1982. WCCO Belting is currently led by president and CEO, Tom Shorma, Ed’s son, and has 270 employees — 200 in North Dakota and 70 in Texas. The company’s rubber product solutions are sought after worldwide, and exported to customers in more than 20 countries. The company won North Dakota’s Exporter of the Year award in 2003, and in 2010 and 2016 it was the recipient of the Presidential ‘E’ Award and ‘E-Star’ award for its export promotion efforts.
e-shelter security has installed over 2,000 smart Sony network cameras to monitor high-security buildings and critical infrastructure at data center locations in Europe. Integrated security solutions expert The Frankfurt-based system integrator builds and operates integrated security solutions for mission-critical environments The Frankfurt-based system integrator builds and operates integrated security solutions for mission-critical environments, where customer applications must be available around the clock. As well as offering necessary hardware and infrastructure redundancy, the centers must also be protected against virtual and physical attackers. To prevent unauthorised access to servers and other infrastructure without creating unnecessary barriers, e-shelter security is making increasing use of intelligent, self-learning security systems. Physical security is supported by Sony SNC-EB632R infrared and SNC-WR632C dome cameras that are used for perimeter surveillance at the data center locations, together with SNC-EM600 minidome cameras that are used for indoor surveillance. Sony Video Security dome cameras Key criteria for the choice of cameras were very high image quality - even in challenging environmental conditions - and extreme reliability. “Another decisive factor for us was our long-standing cooperation with the Sony Video Security team” says Kai Friedrich, Head of Application Engineering and IT at e-shelter security. “Their expertise helps us to think in terms of not just products but about entire solutions. Equally, they have provided us with very sound technical advice and support throughout the entire project.” Cayuga video management system The Sony cameras are controlled and managed using SeeTec’s Cayuga video management system The Sony cameras are controlled and managed using SeeTec’s Cayuga video management system. All cameras are connected to e-shelter security’s certified emergency call and service centers, allowing appropriate intervention to be initiated in the event of an incident. As well as ensuring the physical security of the data centers, the cameras also provide protection against cyber-attacks on customers’ assets. High levels of integral security prevent hackers from using the Sony cameras as an entry point into the customer’s own network. Due to the positive experience gained during more than three years of cooperation on data center projects, e-shelter security is also using Sony cameras in logistics centers, consulting/finance industry office buildings and smart building projects where the company combines innovative security technology with new digital technologies.
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorised personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorised staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the video are helping the bank make more strategic decisions about staffing, customer service and even future branch design. Business intelligence Our March Networks surveillance platform is providing us with some significant business and non-security-related uses" “Our March Networks surveillance platform is providing us with some significant business and non-security-related uses,” Ishikawa explained. Bank of Hawaii, which operates 69 branches and 373 ATMs across Hawaii, American Samoa and the West Pacific, is currently using March Networks Searchlight for Banking software to gather business intelligence at its branches. Searchlight’s mix of surveillance video, teller/ATM transaction data and analytics delivers valuable insights into the bank’s operations, as well as helping to enhance security and uncover fraud. “Our branch division folks look at the data to get ideas on how we should do our branch operations or staffing differently,” he said. People counting data — collected by FLIR Brickstream3D sensors integrated with the Searchlight software — tells them which entrances and exits are most used so they can place marketing materials in high-traffic areas. Video surveillance products The information is also being used to help determine future branch layouts. Queue length and dwell time data, meanwhile, help them understand their busiest time of day, and day of the week, so they can staff branches appropriately. “It’s a huge plus for us,” said Ishikawa. “Our executive management team can see the benefits of the video solution, and the future possibilities for this data.” A forward-thinking bank that’s keen to try new technology, Bank of Hawaii began exploring Searchlight after its success with March Networks’ other video surveillance products. The bank first started using March Networks systems in 2015, when it was time to upgrade its legacy DVRs. At the time, Bank of Hawaii was relying on two different video platforms, and it wasn’t happy with their performance. After enlisting the help of a consultant, and doing his own research at security tradeshows, Ishikawa says the decision to go with March Networks was clear. Network video recorders 'March Networks’ products are really engineered for the banking environment" “I remember asking some of my banking counterparts, ‘Hey what are you guys using?’ And they strongly recommended March Networks,” he recalled. The consultant came to a similar conclusion. He said, "March Networks’ products are really engineered for the banking environment,’ so that helped us make the decision.” Bank of Hawaii is currently using March Networks 8000 Series Hybrid Network Video Recorders (NVRs) in about half of its banking branches. The Linux-based devices provide reliable video surveillance recording and management, and are also easy to service, which is a huge bonus for Ishikawa and his team. In addition, the 8000 Series rack mount units feature an innovative ‘dock and lock’ station that allows technicians to easily remove and service the recorder while leaving all rear connections clean and organised in place. Existing analogue cameras “With other companies, you have to power down the recorder for several minutes to service it, and that means unplugging and re-plugging all the inputs. You miss a number of minutes of recording during that time. With March Networks, we’re able to just pull out the hard drive and pop in another one without taking the NVR offline,” he said. “That’s huge for us.” According to Ishikawa, Bank of Hawaii also appreciates the 8000 Series’ hybrid support, which allowed the bank to continue using its existing analogue cameras, and the motion histograms in March Networks Command video management software, which show Ishikawa and his team where motion occurred and helps them rapidly locate video evidence. “Command’s modern interface is really user-friendly, and it’s very easy to find video,” said Ishikawa. Dynamic range technology Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs “When someone is telling you, ‘Hey we had a problem at this branch this morning, I don’t know what happened, but it must have been around this time’, we’re able to find that video much more quickly on a March Networks platform.” The bank’s high resolution cameras also make it easy to discern important details. In its newer branches, Bank of Hawaii is using March Networks ME4 Series IP cameras, which capture 4MP images and feature high dynamic range technology to optimise image quality in both low and bright light. The bank is also using Oncam 360° cameras for high-resolution panoramic views. For security at its bank machines, Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs. Video is integrated with the bank’s ATM transaction data in the Searchlight software for rapid investigations into customer complaints and potential fraud. More comprehensive oversight “It’s so easy to search,” said Ishikawa. “It takes us exactly to that transaction and the associated video so we can figure out what transpired.” The bank is also integrating its teller transaction data with video in Searchlight for more comprehensive oversight of its branches. The combination of video, transactions and analytics helps it get a more holistic view of its services. “Transaction data is not always indicative of how busy a branch is,” Ishikawa said, noting that lengthier conversations at the teller counter often create value because the customer returns later to access another bank product or service. Having video and analytics is an added layer of information. Being able to remotely access video also helps Ishikawa’s security team conduct virtual patrols. This saves them both time and money. Uniformed security member Capturing video of the incident helped underscore the serious nature of the situation “In the past, whenever there was an issue, we had a uniformed security member head out and physically check the branch. But with virtual patrols, we can do fewer physical visits and, when we do visit, it’s a more meaningful visit.” The security team, for example, can keep an eye on issues with vagrancy and loitering by simply logging into the Command software. March Networks video has helped the bank successfully address some of these issues. In one case, a person was routinely visiting a branch and causing disruptions by yelling and throwing deposit slips on the floor. “We don’t always know the situation, but if a person is yelling or displaying erratic behaviour, they pose a risk,” said Ishikawa. Capturing video of the incident helped underscore the serious nature of the situation. Investigating a fraud “We were able to show police that this was not a minor disruptive party. It was a very concerning issue for us. And it wasn’t just our bank, it was occurring in other banks, too.” Going forward, Bank of Hawaii is planning to migrate its remaining retail branches to March Networks. Given the widespread benefits of intelligent video, Ishikawa predicts that, like him, more bank security managers will receive requests to share their video surveillance securely with other departments. “In the future, it won’t just be security that’s asking for a video upgrade,” he said. “It’s going to be other parts of the business saying, ‘We want a piece of the pie too.’ Because surveillance is more than just investigating a fraud or robbery incident. Now, video surveillance is a lot more than that.”
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces that its SmartCode 888 Deadbolt Lock was chosen to become part of the new Home is Connected smart home system from D.R. Horton, Inc. The inclusion of Kwikset’s SmartCode 888 in the system was based on its value (great functionality at an entry-level price), reliability, and high degree of security. Incorporating the latest Z-Wave 500 chipset, the SmartCode 888 offers keyless entry through a convenient, easy-to-use touchpad. Kwikset’s patented Home Connect technology enables the lock to wirelessly communicate with other devices in the home through a third-party smart home controller, as well as to remotely check the door lock status, lock or unlock the door and receive notifications. Innovative program D.R. Horton’s Home Is Connected system is included in the base price of each new home from the company’s family of brands D.R. Horton’s 'Home Is Connected' system is included in the base price of each new home from the company’s family of brands. The system includes a robust central hub by Qolsys that controls the smart home features, including a home alarm and automation platform by Alarm.com, Honeywell Home thermostat from Resideo, smart switches by Eaton Corporation, video doorbell by SkyBell and hands-free, voice-first experiences with Amazon Alexa. “We are pleased to be part of such an innovative program created by the nation’s largest volume homebuilder,” said Dave Seeman, Director of National Builder Accounts, Kwikset and Baldwin, Spectrum Brands, Inc. – Hardware & Home Improvement Division. Convenience of keyless entry “We are confident that buyers of D.R. Horton homes will not only appreciate the security and convenience of keyless entry that our SmartCode 888 provides, but also the endless benefits of whole home automation. To be a part of a system that includes such well-known, reputable brands indicates to us the high level of trust D.R. Horton puts in our products.” Brad Conlon, Vice President of National Accounts for D.R. Horton, said, “We are pleased to work with Kwikset to provide this essential component to D.R. Horton’s new Home is Connected smart home system. We know our customers will appreciate the peace of mind that comes from Kwikset’s SmartCode 888 lock and the Home is Connected system overall.”
Round table discussion
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?