CyberLink Corp., a pioneer of AI and facial recognition technologies, announced a strategic partnership with VIVOTEK, the global IP surveillance solution provider, adding CyberLink’s FaceMe AI facial recognition engine to VIVOTEK’s IP surveillance solutions. The new collaboration will be showcased in VIVOTEK’s booth (#SAD37) at Intersec 2020 in Dubai, January 19-21, 2020. CyberLink’s FaceMe AI Facial Recognition Engine will be integrated into VIVOTEK’s network came...
Iris ID, a provider of iris recognition technology, announced the integration of its handheld iCAM M300 multimode platform for biometric enrolment and verification with the FBI-certified Sherlock fingerprint scanner from Spartanburg, S.C.-based Integrated Biometrics (“IB”). The fingerprint reader snaps on to the iCAM M300 to create one lightweight portable unit for field use. Sherlock is certified by the FBI as a FAP 45 fingerprint scanner having met the bureau’s stringent ima...
Ambarella, Inc., an AI vision silicon company, Lumentum, a designer and manufacturer of innovative optical and photonic products, and ON Semiconductor, a provider of CMOS image sensor solutions, announces a joint 3D sensing platform for the development of intelligent access control systems and smart video security products such as smart video doorbells and door locks. The platform is based on Ambarella’s CV25 CVflow® AI vision system on chip (SoC), structured-light powered by Lumentum...
The site in the London Borough of Hammersmith and Fulham, vacant for almost 20 years, was previously home for the Savoy Circus and has been redeveloped in a conservation area. It now stands at seven storeys and presents 306 studio apartments, complete with communal spaces including a cafe, student lounge, arcade and gym. Under construction company, Tide Construction, system integrators selected Comelit to create a bespoke door entry finish, using its innovative VIP technology. With ease of inst...
The Security Industry Association (SIA), the trade association representing more than 1,000 companies and organisations developing and delivering security solutions, thanks the National Institute of Standards and Technology (NIST) for its thoughtful and diligent work producing a report evaluating the performance of current facial recognition technology across demographic groups. Facial recognition is a fast-advancing technology in a constant cycle of improvements and is widely adopted across th...
Videonetics, the visual computing platform development company, announces a technology partnership with Solus, a developer and manufacturer of security/ access control solutions. The seamless integration between Videonetics Intelligent VMS with iSolus access control enables operator to gain end-to-end control over the physical access points through one centralised interface with real-time monitoring and video verification. The comprehensive integration allows customers to respond to incidents b...
A joint whitepaper released by The Industrial Internet Consortium (IIC) and oneM2M, reveals how developers seeking to reduce complexity when designing Internet of Things (IoT) and Industrial Internet of Things (IIoT) systems, can leverage different architectural approaches side-by-side to enable faster-time-to-market of new Industrial services and use cases. The joint whitepaper, “Advancing the Industrial Internet of Things,” written by the IIC, the world’s leading organisation transforming business and society by accelerating the IIoT, and oneM2M, the global IoT standards body, demonstrates how these two leading IoT organisations are working together to advance the IIoT and digital transformation, through the creation of a robust, interoperable, flexible and efficient IIoT ecosystem. Deploying IoT and IIoT systems The IIC is building out the Industrial IoT ecosystem to accelerate adoption and enable the digital transformation" Through their work, the IIC and oneM2M aim to help vertical markets achieve interoperability and reusability, by minimising complexity and the cost of designing, developing and deploying IoT and IIoT systems to shorten time-to-market and value-creation cycles. With a focus on practical deployment tools, the white paper describes how the IIC’s and oneM2M’s architectural approaches can be aligned to provide a toolkit of best practices and technical standards for organisations involved in the design and deployment of IIoT systems. “Through its liaison program, the IIC is building out the Industrial IoT ecosystem to accelerate adoption and enable the digital transformation,” said Wael William Diab, Chair of the IIC Liaison Working Group and Secretary of the IIC Steering Committee. “The joint whitepaper with oneM2M exemplifies this collaboration.” Interoperable IIoT systems The Industrial Internet Reference Architecture (IIRA) provides a high-level architectural framework and methodology that enables rapid realisation of interoperable IIoT systems. It provides guidance for development by identifying and highlighting important architectural concerns, concepts and patterns that can be applied within and across industrial sectors. oneM2M’s common service layer is designed to enable Machine-to-Machine (M2M) and IoT applications across different vertical domains, via a horizontal platform architecture. Its three-layer architecture standardises the interfaces between these layers, providing a secure means for connecting data ‘producers’ and data ‘consumers’. The liason provides a foundation for future collaboration on security and semantic interoperability topics" “The IIC Industrial Internet Reference Architecture and the oneM2M technical specification both seek to address key architectural and technical issues common across industries, each with a different approach and emphasis,” said Shi-Wan Lin, Co-chair, IIC Technology Working Group and Architecture Task Group and a co-editor of the whitepaper. Public infrastructure sectors “This joint whitepaper by technical experts from these two communities provides an initial mapping and alignment of these two complementary reference architectures and offers guidance on how to benefit from them when implementing IIoT systems.” “This liaison initiative highlights the strategic importance of architecture models and the need for a standardisation roadmap for industrial IoT solutions. It provides a foundation for future collaboration on security and semantic interoperability topics,” said Ken Figueredo of InterDigital Inc, a member of the oneM2M Partnership Project, and co-editor of the report. “oneM2M and the IIC are also expecting more standardisation requirements to arise from new industrial use-cases across the manufacturing, transportation, energy, agriculture, healthcare and public infrastructure sectors.”
The Horwitz-Wasserman Holocaust Memorial Plaza, located in the heart of Philadelphia, is a living testament and tribute to the victims of the atrocities of the Holocaust. The goal of the Memorial Plaza is to educate visitors on this shameful time in history and compel them to work towards a world of tolerance and enlightenment wherein nothing like this could ever occur again. The Delaware Valley Intelligence Center (DVIC), weighed in on the needed security measures. Under the institutional umbrella of the Philadelphia Police Department, DVIC serves as the regional fusion center and utilises a collaborative and proactive approach to forecasting, preventing and/or responding to all-threats, all-hazards and major events. They assessed the video surveillance requirements of the Memorial Plaza. Video surveillance cameras The Foundation’s construction company then compiled the specifications, based on the DVIC’s recommendations, and Convergint Technologies, a global, service-based systems integration company, delivered the best proposal to suit their needs. Convergint specified video surveillance cameras from Hanwha Techwin. Because of the large size of the Memorial Plaza and park area, a standard definition camera wouldn’t suffice, so Convergint opted for Hanwha’s high resolution PNO-9080R 4K Network IR Bullet Camera. This model allows the viewer to zoom in and see, in close detail, the face of someone passing by the camera who may be a suspect. The PNO-9080R from Hanwha's Wisenet P series performance IP camera line is a 4K camera key in capturing people and events in full detail. IR bullet camera This 5 megapixel resolution camera works well in both day and night conditions For the actual Memorial site at large, such high resolution wasn’t required, but Convergint, in the interest of overall protection, recommended and installed the XNO-8080R 5 megapixel network IR bullet camera to ensure safety all around the perimeter of the park and Memorial Plaza area. This 5 megapixel resolution camera works well in both day and night conditions, and features analytics for loitering, directional detection, fog detection, audio and tampering detection, as well as digital auto tracking and sound classification. The Hanwha cameras are tied into a Genetec Security Center VMS, which allows authorised administrators from as well as the local Police Department to log in and view the video footage at any time. The Horwitz-Wasserman Holocaust Memorial Plaza was not spared from anti-Semitism. Positive identification of suspect It was vandalised by a man who etched the initials “REM” and two SS bolts – a known Nazi symbol – into the memorial’s pillars. With the help of the Hanwha surveillance cameras, the perpetrator was quickly apprehended. “The cameras proved to be fantastic in resolving the June incident,” said Jennifer Wright, Project Manager at the Philadelphia Holocaust Remembrance Foundation. “I looked at the footage and was able to get a few different angles of the person responsible for the crime. The footage was of good quality and I could clearly see him. We sent it to Philadelphia Police Department and they put out a media advisory; we also shared images of the person responsible for the defacement of the Six Pillars on Facebook. Footage of the incident was shared thousands of times on social media. Public sharing of these images eventually led to a positive identification of a suspect.”
Outdated camera firmware and failing to change default passwords present some of the biggest weaknesses in cyber security defense. As the number of interconnected security devices keeps on growing, keeping pace with the latest updates can be tricky and very time-consuming. According to new research conducted by Genetec Inc. (“Genetec”), a technology provider of unified security, public safety, operations, and business intelligence, as many as 68.4%¬—or almost 7 out of 10—cameras are currently running out of date firmware. Installing the latest firmware is not just about accessing exciting new features, warns Genetec. It ensures the latest cyber security protection measures are implemented as soon as they become available, a crucial step in ensuring an organisation’s resilience against cyber-attacks. Cyber security vulnerabilities IP cameras came with default security settings, including admin login information that is often publicly available “Our primary research data points to the fact that more than half of the cameras with out of date firmware (53.9%) contain known cyber security vulnerabilities. By extrapolating this to an average security network, nearly 4 out of every 10 cameras are vulnerable to a cyber-attack,” said Mathieu Chevalier, Lead Security Architect at Genetec. The research conducted by Genetec also showed that nearly 1 in 4 organisations (23%) fail to use unique passwords, relying instead on the same password across all cameras from the same manufacturer, leaving an easy point of entry for hackers once only one camera has been compromised. Until recently, IP cameras came with default security settings, including admin login information that is often publicly available on the manufacturers’ websites. Physical security systems While most camera manufacturers now request users to set up a new password and admin credentials at installation, businesses, cities and government organisations with older equipment never updated their passwords, potentially compromising the other critical data and systems that reside on their network. “Unfortunately, our research shows that the “set it and forget it” mentality remains prevalent - putting an entire organisation’s security and people’s privacy at risk. All it takes is one camera with obsolete firmware or a default password to create a foothold for an attacker to compromise the whole network,” added Chevalier. “It is critical that organisations should be as proactive in the update of their physical security systems as they are in updating their IT networks.”
Airspace security technology pioneer Dedrone has been awarded certification from the UK’s Centre for the Protection of National Infrastructure (CPNI) for its counter-drone technology platform DroneTracker. DroneTracker detects, tracks, and identifies drones by using multi-sensor capability combining RF, radar, and optical sensors. The new CPNI drone detection standard is the first official validation of counter-drone technology. It enables organisations deemed to be of critical national importance to adopt drone detection technology with the assurance that it has been tested rigorously. Robust available airspace security “Any organisation needing drone detection technology should consider platforms evaluated and tested by CPNI,” says Amit Samani, Dedrone’s regional sales manager for the UK. “Dedrone’s DroneTracker platform has successfully met CPNI’s rigourous testing standards, and this certification provides further assurances to our customers and partners that our system meets the security needs of the UK’s most sensitive infrastructures.” We will continue working closely with government sector users, risk-critical sites, and major corporate customers" “We will continue working closely with government sector users, risk-critical sites, and major corporate customers to provide the most robust available airspace security and defence against drones and multiple drones.” Dedrone’s multi-sensor system enables security providers to match the best-in-class sUAS (small Unmanned Aerial Systems) detection hardware with DroneTracker, Dedrone’s software. Customised airspace security solutions Radio frequency sensors, including the RF-100 and RF-300, provide flightpath, localisation, and classification of sUAS. A PTZ camera system adds localisation information via optical and thermal detection, whilst a 3D radar system adds altitude data and detection of autonomous drones. Hardware data was analysed by DroneTracker 4.1, which provides a near-instantaneous decision regarding whether a drone is a threat, and allows security personnel to respond accordingly. Dedrone creates customised airspace security solutions allowing organisations to identify, track, and eliminate sUAS threats. Dedrone’s solution is deployed to customers around the world, including three of the G7 countries, correctional facilities, utilities, airports, and corporations, among other public and private organisations.
As the trade fair for the security industry, Security Essen is the showcase for innovations every two years. In order to also enable young companies to be present in front of trade visitors from all over the world, there has long been a promotional program in cooperation with the Federal Ministry for Economic Affairs and Energy. However, this only applies to German companies. Security Essen has therefore now set up its own program for start-ups from abroad. For the first time, young international companies will benefit from this program at the next edition of the trade fair, which will take place at Messe Essen from 22 to 25 September 2020. Creating a highly visible platform Prominently located in the new Hall 7, the international start-up area will be a highly visible platform for young companies. Here they will be able to present their new products and services to the trade public. Julia Jacob, Head of Project for Security Essen: "The security industry is changing. New challenges require new technologies. Many of these innovations come from young companies. We are delighted to now be able to offer a stage to these thought leaders from abroad, as well." The program for international start-ups will include an equipped presentation area with furniture, electricity and lettering, as well as the access to the trade fair website at a net price of 990 euros. Companies younger than ten years, with fewer than 50 employees and an annual turnover of no more than ten million euros may apply for a place on this special area.
The tickets for INTERSCHUTZ 2020, which runs from 15 to 20 June 2020 in Hannover, are available as an electronic, mobile or wallet ticket. A one-day ticket costs 20 euros if purchased in advance – significantly cheaper than buying a ticket at the box office on the day, when it will cost 25 euros. There is a concessionary rate of 15 euros for schoolchildren and students. A full-event ticket, valid for all six days of the show, is also cheaper if purchased in advance – 45 euros, compared with 55 euros when bought on-site at the box office. INTERSCHUTZ tickets are available to buy via the INTERSCHUTZ, from the mail order house of the German Fire Services Association and from the online retail outlet of the fire services journal, Feuerwehr-Magazin.
Video surveillance is commonly associated with security. But in most cases, it's used to record incidents and assist in investigations after the fact rather than prevent undesirable events. Artificial intelligence–powered video analytics is a highly promising trend that fundamentally changes the way things work. Extracting manageable data from a video stream can help recognise risky situations early on, minimising damage and, ideally, completely avoid emergencies. At the same time, AI significantly expands the areas of application of video surveillance beyond security systems. AI significantly expands the areas of application of video surveillance beyond security systems However, the hype around this new, trendy technology prevents the potential user from choosing quality solutions in a wide variety of products. This often leads to over-expectation, followed by a complete let-down. Can AI-powered video analytics really be the key to a technological breakthrough in video surveillance? We'll take a look at what the technology can do, what it can't, and where it can go from here. Technological breakthrough or just another bubble? It's often said that the video management software (VMS) market is becoming increasingly commoditised and widely available. A lot of products with similar features (or, at least, similar promises from the manufacturer) make it hard to choose. As a result, vendor names and reputations are turning into one of their primary selling points. Manufacturers have two choices available: get wrapped up in a price war and rely on cutting expenses, or offer a product that's truly innovative and revolutionary. Manufacturers have two choices available: get wrapped up in a price war, or offer a product that's truly innovative and revolutionary VMS developers who choose the second route are gravitating towards creating products that use artificial intelligence based on neural networks and deep learning. Emerging two or three years ago, the AI video analytics market is experiencing a boom in growth. This new tech wave has stirred the still, stagnant backwaters of the VMS world and gave small, ambitious developers something to be optimistic about. It seems they now have a chance to emerge as market leaders in the next few years. However, the hype around this popular trend is raising reasonable concerns among experienced security industry professionals. These concerns come from clients looking for a solution to their problems, and from suppliers building a long-term development strategy. This largely resembles another tech bubble, like the one built up around pre-AI video analytics and burst when it became clear that the sensational promises around it were pure marketing hype (and rather unscrupulously so). However, there are a lot of factors that indicate that AI-powered video surveillance systems aren't another bubble. The three factors The first — and the main one — comes from systems already in place on customers' sites. They fulfill the same promises made during the previous bubble by hotheads in a rush to teach the computer to analyse events in real time using a classical algorithmic approach. The second is the fact that this new technology has seen investment from not only software and cloud startups, but also established VMS developers. Even giants like Intel, which has presented a full line of neural network accelerator hardware and a set of software tools that streamlines working with them, specifically in the field of computer vision. This new technology has seen investment from not only software and cloud startups, but also established VMS developers The third factor lies in artificial intelligence's abilities. AI plays chess, drives cars, and works wonders in many other fields. Why shouldn't it be applied to video monitoring and analysis? What AI can do Just what can artificial intelligence do in video surveillance systems at this stage of development? It can't quite analyse a sequence of events and understand the "logic" of what's happening in the cameras' field of view. At least not yet. But it's probable that AI will learn to do this in the next few years. But neural network analytics can already detect, classify, and track objects very well, providing high accuracy even in busy scenes. Artificial intelligence can be used in the real world to: Detect smoke and flames for early fire warning at open areas (forest, open warehouse, parking lot, etc.) Distinguish people/vehicles from animals and other moving objects, e.g. to protect the perimeter of a nature park from poachers Distinguish a person in a helmet and protective clothing from a person without them to prevent accidents at a dangerous production facility or construction site Count objects of a specific type, e.g. cars in a parking lot, people in the sales floor, wares moving on a conveyor belt, etc. in non-security-related solutions Those are just a few examples. After training a neural network, it can tackle other, similar tasks, too. Generally, a neural network trained in specific conditions isn't replicable. In other words, it won't work as well under different conditions. On the other hand, developers have learned how to quickly train AI for the needs of a specific project. The most important requirement is having enough video footage. Somewhat apart from that is the use of neural networks in facial and automatic number-plate recognition. This is an example of reproducible neural networks (train once, deploy everywhere), which makes them more appealing commercially. If non-reproducible neural networks have only recently become economically feasible due to the rapid evolution of specialised hardware (aforementioned Intel's product, for example), then the use of AI in facial recognition and ANPR has been well established for a long time. The use of AI in facial recognition and ANPR has been well established for a long time Another kind of AI analytics that we'll explore is behaviour analytics. This function, probably more than any other, is bringing video surveillance systems closer to understanding what's happening on camera. Its potential is vast. How behaviour analytics works From a technical point of view, behaviour analytics combines artificial intelligence with a classic algorithmic approach. A neural network trained on a multitude of scenarios can determine the position of the bodies, heads, and limbs of humans in the camera's field of view. The algorithm outputs an array of data containing descriptions of their poses. Conditions can be set for data to detect a specific pose, such as raised hands, prostrated or crouching persons. Developers can use this to quickly create new detection tools to identify potentially dangerous behavior specified by a government or business client. There's no need for additional training of the neural network. How behaviour analytics can be deployed Someone crouched down next to an ATM could be a technician, CIT guard, or burglar. Bank security should be notified in any of the cases. A person in shooter position, together with a bank employee or cashier with their hands raised could indicate a robbery. The system can be configured to automatically send alerts with a surveillance snapshot to the police so they can assess the threat and take action if needed. It's vital that the police receive the alert, even if the employee is unable to activate the alarm. In many cases, attention should be directed to a prostrate individual. This could be somebody who needs immediate help, or it could be someone sleeping in an inappropriate public place, for example, a 24/7 ATM space. Behavioural analytics can also be used to ensure workplace safety. For example, tracking whether employees are holding the handrails when using the stairs at a manufacturing facility or a construction site. What now? Behaviour analytics can be deployed wherever your clients' imagination takes them. With this feature, practically any pose that indicates potentially dangerous behaviour can be detected. Timely response to an alarm helps avoid material damages or, in other situations, casualties. Practically any pose that indicates potentially dangerous behaviour can be detected An area of potential development for behaviour analytics is the ability to analyse a sequence of poses by the same person or a combination of poses and relative positions of several individuals. That will be the next level of evolution in AI's use in video surveillance: moving from "detecting" to "understanding" behaviour in real time. In its most basic form, this type of analytics can be deployed to detect deviations from the search procedure in correctional facilities when a person being inspected must assume a pre-defined sequence of poses. A more advanced form allows it to detect any kind of abnormal behaviour, such as a brawl breaking out in a public space. Ideally, behaviour analytics can predict dangerous situations based on nearly imperceptible cues gleaned from collected statistics and a Big Data analysis. At the moment, this sounds like pure fantasy, but what seemed like whimsy not too long ago is now a reality with AI. It's already beaten humans in chess and the game of Go (Weiqi). Will artificial intelligence be able to outplay humans at charades one day? It's entirely possible that we'll soon see for ourselves.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorised parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilisers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Using computed tomography (CT) security technology for cabin baggage screening at airports can eliminate the need for passengers to remove liquids and laptops from their bags, thus helping to make the security process easier and more efficient. As the latest in checkpoint scanning technology, CT provides 3D images with much more information to improve threat detection capabilities so decisions by the operator can be resolved quickly and more accurately, without the need for manual search. The whole experience is better and safer for everyone. The use of computed tomography The Netherlands were the first to introduce CT at the checkpoint and the Transportation Security Administration (TSA) in the United States plans to install 145 units in its airports by the end of the year. Australia is already installing and using CT at some of its airports. The United Kingdom is the first country to mandate use of CT for screening cabin baggage, and it is expected that the EU will also mandate this type of technology in the near future. It is expected that the EU will also mandate this type of technology in the near future The process of deploying CT is another level in the evolution of passenger screening and aviation security. Since 9/11, the traveling public has become increasingly educated about aviation security, says Steve Revell, Senior Director of Aviation CT at Rapiscan Systems. “What passengers expect is courtesy, professionalism and, most of all, to be able to travel safely without fear of harm,” he says. “Each level of security we have seen introduced over the years, I believe, shows commitment from all stakeholders to meet these key deliverables.” Rapiscan Systems' 920CT Rapiscan Systems' 3D cabin baggage screening system, 920CT, utilises patented Dual-Energy technology and a sophisticated algorithm to provide the highest level of automatic detection of highly dense items, as well as automatic detection of explosives based on the most stringent global regulatory requirement. It also has a truck wheel design and contactless power and data transfer, both of which reduce maintenance costs and downtime and make the 920CT more efficient and robust. Rapiscan's 920CT provides the highest level of automatic detection Rapiscan’s 920CT is equipped with advanced software and detection algorithms that are designed to be upgradeable. With 3D volumetric imaging, the 920CT is superior to 2D systems as it provides improved visualisation of potential threats. It has also been engineered to integrate seamlessly with Rapiscan’s TRS tray return solution to create a more efficient checkpoint experience, for both passengers and staff. “As a manufacturer, we strive to provide the very best quality service and equipment we can – working closely with regulators and airports alike to ensure the evolution and expansion of air travel is both collectively understood and fit for purpose,” says Revell. Portfolios and partnerships Rapiscan has a wide portfolio of products and capabilities. However, one company cannot do it all. “For this reason, we will always look to best-of-breed technologies that complement our offerings and provide a cohesive solution and, more importantly, long-term partnership,” says Revell. “The partnership deliverable is what drives the future. Our mission is one of an open platform that invites other technologies to work in conjunction with ours and integrate in such a way that can provide meaningful reports and controls systems to our clients, driving core efficiencies and security enhancements.” Our mission is one of an open platform that invites other technologies to work in conjunction with ours “The efforts borne by each of the key stakeholders is done for one very important and aligned reason, to ensure to the very best of our abilities that passenger safety is put first, is always put first and is done in the most courteous, professional way possible, without any undue inconvenience,” he adds. Increasingly, airports are asking for suppliers’ systems to talk to each other. Many airports have security screening equipment from multiple manufacturers and want to put images from these into a single, searchable database, to track missing items, improve productivity and efficiency, or comply with regulations. The Digital Imaging and Communication for Security (DICOS) is an industry standard that defines an interoperable data format for integration of security screening technologies across multiple vendor platforms. It facilitates the development and use of improved security screening technologies and third-party software. Rapiscan’s 920CT supports DICOS, and the company is working with multiple vendors to help create a single platform for airports.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-metre multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analogue video intercom system of BI-City Tokyo. Analogue intercom system The original analogue intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analogue intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualised and integrated in the Dahua DSS platform for centralised management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronise the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or travelling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognise moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognised. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing colour details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labour costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analogue system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honoured to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Located in the Southern Vietnamese metropolis of Ho Chi Minh City, the Deutsches Haus office tower is a symbol of cooperation between Germany and Vietnam. Opened in September 2017, it is the country’s first building to earn LEED (leadership in energy and environmental design) Platinum environmental certification and serves as a cultural, commercial and diplomatic hub in the region. Next to the Consulate General of the Federal Republic of Germany the 25-story building with a 40,000-square-meters floor area is home to regional offices of international firms such as VISA, Adidas, Schneider Electric, and Bosch Vietnam. As premium amenities, Deutsches Haus also features a gourmet cafe, multifunctional conference and events area, health club, and rooftop restaurant. Creating a challenging security environment Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams From a security manager’s perspective, this multi-use blend of diplomacy, business, and leisure facilities – in a building fully accessible to the public – creates a challenging security environment. As the seat of the Consulate General of the Federal Republic of Germany, Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams, have to be approved by the Federal Foreign Office of Germany. Adding to the challenge, Deutsches Haus is located opposite from the Consulate General of the United States of America – and in close vicinity to the Consulate General of France and the British Consulate General – on a busy intersection between two main streets. Therefore, monitoring pedestrians and automobile traffic on the building’s perimeter is just as crucial to end-to-end security as tracking public and high-security areas on the inside. Detecting security events automatically In search of an adequate video security solution, the team at Deutsches Haus knew that high-definition cameras alone would not suffice. The reason: When several hundred cameras are required to secure an area of this size, personnel tend to be overwhelmed by the amount of video feeds. After only 20 minutes, the average operator misses 90 percent of important scenes, as studies have proven. Bosch experts covered the building and its perimeter with network security cameras For this reason, modern IP security cameras feature Intelligent Video Analytics – using algorithms and AI-based image recognition – to support operators by detecting security events automatically. Bosch experts covered the building and its perimeter with network security cameras featuring built-in Intelligent Video Analytics. Indoor areas like the entrance doors, reception area, lobby, café, as well as parking garages and corridors to the fire escape staircases are monitored by over 170 DINION IP starlight 7000 HD and FLEXIDOME IP panoramic 7000 MP cameras. Alerting security personnel of illicit behaviour The building’s elevators are also protected by Bosch cameras. Thanks to built-in-intelligence, IP cameras automatically alert security personnel of illicit behaviour, for instance persons accessing restricted areas. The building’s perimeter and parking lot are safeguarded outdoor-approved AUTODOME IP starlight 7000 HD cameras with pan-tilt-zoom (PTZ) capabilities. Integrated with a third-party solution to open barriers for authorised vehicles, the cameras can automatically track moving objects such as cars and pedestrians – and warn personnel of threats – with their 30x zoom lens while obtaining images under low light conditions via Bosch starlight technology combined with Intelligent Video Analytics. As a key requisite, the networked cameras are able to withstand the city’s four-month rain period and prove resistant to vandalism. Enhancing safety of building occupants The staff can easily announce and notify a building guest about a forgotten purse which was left in the café PAVIRO, the Public Address and Voice Evacuation system of Bosch was installed in the building for the safety of building occupants. The PAVIRO solution makes it possible for occupants to feel safe in the building while enjoying high quality music and excellent Public Address speech intelligibility. The staff can easily announce and notify a building guest about a forgotten purse which was left in the café. To make building evacuations as efficient as possible, the PAVIRO solution provides phased evacuation: automated messages direct occupants to immediate safety. Next to this, building occupants and guests can also enjoy high-quality music in the rooftop restaurant, café, health club and event areas which of course contributes to the nice building atmosphere. Providing government-grade security For the building owner, PAVIRO can establish long-term cost-saving and minimise total cost of ownership. The system is especially eco-friendly because less amplifiers are needed due to power-load sharing of the amplifier architecture, which in turn requires fewer batteries. Since opening day, the Bosch system has provided government-grade security at Deutsches Haus in Ho Chi Minh City. “I am proud to have Bosch both as a tenant and as a brand who secures Deutsches Haus with their high quality and reliable video security cameras and sound systems,” added Ryan Lower, Property Director, Colliers International – Deutsches Haus. While meeting the challenge of securing diplomatic and enterprise assets in a publicly accessible building, the future-proof solution provides an important reference in this dynamic market.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbour for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbour in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbour complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analysing people's behaviour. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Following a competitive tender process Corps Security has been awarded a three-year contract to provide security services to Registers of Scotland at Meadowbank House, in Edinburgh. A team of 10 officers will provide guarding services with a focus on front-of-house, customer service, CCTV monitoring and patrols. Like-minded organisation Registers of Scotland is the public body responsible for compiling and maintaining registers relating to property and other legal documents in Scotland. Mike Bullock, Chief Executive of Corps Security, said: “We are delighted to be working with such a like-minded organisation. Corps Security is a trust which was set up to provide employment for ex-servicemen returning from the Crimea. We share values with Registers of Scotland and look forward to working closely together.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?