Connected Technologies LLC has released GeoView, a new feature that adds the power of Google Maps to the award-winning Connect ONE cloud-hosted security management platform. GeoView allows users to see status for all locations instantly in a wide-area satellite map and drill down into each location for real-time alarm, health and system monitoring and control. With GeoView, dealers can offer different levels of managed services while the end-user easily interacts with the solution, making for a...
RISCO Group, globally renowned intruder alarm and security solutions provider has launched a new wireless product designed to deliver an enhanced performance for UK installations. The Agility 4 is a wireless, modular and multi-layered security systemAgility 4 multi-layered security system The Agility 4 is a wireless, modular and multi-layered security system which includes a new range of accessories available immediately with more add-ons expected to follow. With an enhanced choice of communi...
Allied Universal, the security services provider in North America with headquarters in Santa Ana, CA and Conshohocken, PA, announces that Caisse de dépôt et placement du Québec (‘CDPQ’) announces a strategic investment in Allied Universal alongside company management and Warburg Pincus and Wendel, its current financial partners. The transaction values Allied Universal at more than US$7 billion. The investment from CDPQ will support the long-term growth and strate...
Luxul, global innovator of IP networking solutions for AV integrators, has announced its technology line-up for the NAHB International Builders' Show (IBS), taking place February 19-21, 2019 in Las Vegas. In the Legrand booth SU614, the company will exhibit a wide range of solutions for home builders that deliver reliable, high-performance networks in smart homes, including Gigabit switches; the next generation of wireless controller technology; indoor and outdoor wireless access points (APs); w...
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces its newest centrally controlled, Internet Protocol (IP) safe lock: NexusIP. As an IP security system and part of S&G’s Digital Platform, NexusIP is a fully scalable solution that allows for real-time, remote monitoring and control of one lock or multi-lock location network for a more reliable IP safe lock. Utilizing Wi-Fi networks that are already in place, NexusIP requires...
Altronix, globally renowned power and data transmission solutions for the professional security industry, continues to lead with products that deliver maximum performance, and lower Total Cost of Ownership (TCO) with the introduction of the industry’s first Lithium Iron Phosphate battery backup solution. Now available in Altronix’s new series of NetWay Spectrum PoE+ Switches, these optimised chargers accommodate LiFePO4 batteries with significantly longer shelf life and much more eff...
Securitas UK has been officially recognised as a Top Employer by the Top Employers Institute for its commitment to delivering exceptional people management and HR strategies. Top Employers are organisations of the highest calibre that have worked hard to create, implement and progress people strategies, through innovative and engaging programmes, which empower and develop their employees. In order to be certified as Top Employer, Securitas had to achieve the minimum standard as set out by the Top Employers Institute across ten key topics: Talent Strategy, Workforce Planning, Talent Acquisition, On-boarding, Learning & Development, Performance Management, Leadership Development, Career & Succession Management, Compensation & Benefits and Culture. Security and protective services expert Securitas UK is the only security and protective services company to be accredited by the Top Employer Institute Securitas UK is the only security and protective services company to be accredited by the Top Employer Institute. Brian Riis Nielsen, Country President, Securitas UK spoke about what it means to be a Top Employer: “Securitas is leading the transformation of the security industry from traditional guarding to a much broader spectrum of protective services delivered by better trained and engaged teams. Although technology is an increasingly important part of our operation, our on-site, mobile and remote security officers remain the backbone of our business." He added, "Our people, and how we look after them, lay at the heart of this transformation. Our talented, professional officers excel at keeping our clients’ people, property and assets safe. In return we have made a commitment to provide the very best employee experience, offering a rewarding career pathway which will help shape the next generation of security professionals.” Securitas employee excellence model We will continue to invest in our Securitas employee excellence model and offer our people the very best, industry leading, employee experience"Grainne Kelly, HR and Security Operations Centre Director explained, “We are delighted to be officially recognised as a Top Employer. From our online, end-end recruitment and selection processes, to our in-house City & Guilds accredited Learning and Development Academy, and our focus on talent and career succession planning, we are proud of the collaborative and innovative working practices we are delivering for the benefit of all our employees. "We will continue to invest in, and refine, our Securitas employee excellence model and offer our people the very best, industry leading, employee experience. Our Top Employer certification proves that we are well on our way to achieving this.” David Plink, CEO, Top Employer commented, “We believe that the 2019 Certified organisations demonstrate exceptional employee conditions and encourage the development of these practices by putting their people first. These companies help enrich the world of work with their outstanding dedication to HR excellence and because of this, they are recognised as an employer of choice.”
Delivering secure remote access to the smart home with KNX, the Gira S1, available from Ivory Egg, enables users to remotely connect to their KNX smart home with total security. How? The Gira S1 ensures that all communication is encrypted and secure as the server for the Gira device portal is located in Germany and is subject to German data protection laws. This ensures that stringent data protection standards are applied so all Gira customers are fully protected with safe and secure technology. Preventing unauthorised access Both the Homeserver and the X1 allow you to manage and control lighting, blinds and heating from anywhere in a building or remotelySwitching off the light, checking camera images, switching on the heating and/or closing the blinds while on the move has never been safer, removing the risk and opportunity for unauthorised persons to gain access to your smart home system. Working in conjunction with the Gira X1 or Gira HomeServer App, the Gira S1 communicates with the Gira device portal: removing the need to laboriously activate a VPN or special settings in the router! Both the Homeserver and the X1 allow you to manage and control lighting, blinds and heating from anywhere in a building or remotely and make visualising a family home with a KNX system more convenient and functional than ever before. Smart home solutions And thanks to Gira S1, homeowners can now define who has access to their smart home safely and securely. Mark Warburton, Technical Director at Ivory Egg, says “The introduction of the Gira S1 answers the clear demand for intelligent smart home solutions which offer secure remote access. With the market for smart homes readily gaining traction, I believe that user-security will become a primary concern for homeowners. To be able to overcome this potential problem with a simple remote access module is what our industry needs to progress this type of technology and have it viewed as a prerequisite for the modern home.” User benefits Secure remote access to a smart home with KNX using the Gira HomeServer or Gira X1 App Secure remote access to web-based visualisations Secure remote maintenance and remote programming of the Gira HomeServer, Gira G1, Gira X1, Gira L1, and Gira KNX IP router Secure remote maintenance and remote programming of KNX projects using ETS4 or ETS5. Programming is supported along with diagnosis via group and bus monitor Secure remote access to HTML pages in the smart home network (e.g. camera, NAS, router, switch) Secure data transfer courtesy of SSL/TLS encryption Independence from internet provider and network routers. Secure remote access even with IPv6 Dual Stack Lite - (e.g. with Unitymedia), LTE, or UMTS connections Remote access can be managed via KNX communication objects Feedback of the secure connection statuses via KNX communication objects Send KNX status messages via email. An attachment can be added to the email, as an option Send KNX status messages by SMS or voice call Optimised KNX IP communication, for mobile or very slow connections Supports the accelerated transfer of the ETS to KNXnet/IP devices via a direct KNX IP connection Two RJ45 sockets with switch functionality support simple loop-through of the patch cable Quick and convenient Gira S1 start-up via the Gira device portal 2 GB of data each month Unlimited operating life and 5 years' guaranteed server operation Functional extensions and updates via firmware and software updates Firmware update is performed via the Gira Project Assistant (GPA) Hardware prepared for KNX Secure. Future firmware update required
Adder Technology, a global specialist in connectivity and IP KVM, announces an exciting evolution to its highly successful ipeps range of remote access products. The new ADDERLinkipeps+ boasts significant technological developments and brings enhanced remote access functionality to all industries where security and video quality are business-critical. In many markets, where computers are situated in restricted or difficult-to-access areas, such as industrial sites, silicon fabrication plants and off-shore locations, the need for secure and responsive remote control is paramount. Any delay, even if only a second, could impact the entire operation. Securely access servers In response to this need, Adder has developed the ipeps+ to provide smooth-motion video at up to 30 fps together with 24-bit colour depth over IP. This versatile addition to the Adder portfolio enables organisations to securely view and edit HD video from anywhere in the world as if they were locally connected to the target computer. The adoption rate of KVM-over-IP is forecasted to skyrocket over the next five years" “The adoption rate of KVM-over-IP is forecasted to skyrocket over the next five years,” said Johnny Chuang, vice president at Adder channel partner, Accordance, “and we have seen a significant increase in customers demanding the ability to securely access servers or computers from anywhere in the world, across a WAN, with an ‘at desk experience’. As such, the launch of the ipeps+ has come at a perfect time for us. It makes that high-quality user experience achievable without having to undergo a costly system redesign.” Remote access solution The ipeps+ is the ideal remote access solution in environments where security is critical. A public-to-private network separation plus AES encryption minimises the risk of an external security breach, whilst user access profiles and integration with Microsoft Active Directory ensure internal security is not compromised. “When it comes to remote access, we’re seeing more and more customers choosing hardware over software. It is non-intrusive, more secure and enables BIOS-level access, enabling the user to see and control everything as if connected locally,” said Martin Norman, senior product manager at Adder Technology. The ADDERLink IPEPS+ will be available through Adder’s global network of subsidiaries and channel partners from January 31st, 2019. Experience the ADDERLinkipeps+ for the first time on the Adder Technology stand at ISE 2019 (Hall 10, Stand R130), February 5th-February 9th at the RAI Amsterdam.
Matrix Comsec, global manufacturer and provider of Security and Telecom solutions, is participating in IT EXPO 2019 at Fort Lauderdale, Florida to be held from 30th Jan to 1st Feb 2019. Matrix will be showcasing its comprehensive range of people mobility management, IP video surveillance and unified communication solutions at the event. Matrix is known for its customer centric, innovative range of solutions for unified communications, IP video surveillance, access control and time-attendance applications catering to diverse and complex deployments especially for the SMB, SME and large enterprises. SPARSH VP710 video and COSEC ARGO door controller Enterprise video collaboration solution, SPARSH VP710 that sets a new benchmark by offering enhanced video and voice capabilities. SMB IP-PBX, SPARK100, an all-in-one communication solution with enterprise-grade unified communication and collaboration. Next generation door controller, COSEC ARGO for the access control market. The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistant (IK08). Matrix IP video - access control integration Matrix will also be demonstrating seamless integration between Matrix IP video surveillance, access control and unified communications solutions, along with Matrix video management and device management software suite. Additionally, at this event, Matrix will exhibit its range of Gateways. These gateways allow easy integration with most of IP-PBX, TDM PBX, Softswitch and hosted solutions. Award-winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions for multi-site connectivity and remote survivability while offering superior voice quality and state of the art routing features.
The announcement that Wavestore’s open platform Video Management Software (VMS) has been successfully integrated with Raytec’s lighting solutions means that operators are now able to match the security requirements for individual locations throughout a site, with a wide range of lighting options which are managed directly from Wavestore’s front-end ‘one screen, total control’ display. Automated lighting solution Raytec and Wavestore’s technical teams have worked closely together to develop an intelligent lighting solution which can be controlled via Wavestore’s VM Raytec and Wavestore’s technical teams have worked closely together to develop an intelligent lighting solution which can be controlled via Wavestore’s VMS by simply clicking on fully customisable buttons. The solution also enables the ideal lighting for each situation to be automatically selected when a moving object is detected or by metadata triggered events from other systems and software, such as access control, ANPR, alarm sensors, cameras, face recognition and other forms of video analytics. “There are so many different reasons why our end-user clients may need supplementary lighting and this smart solution provides them with the flexibility to choose from a long list of options which exactly meets their requirements,” said Enrico Bizzaro, Head of Integrations for Wavestore. Licence plate reader and video surveillance system “Our clients tell us that minimising energy costs and light pollution is important to them and so this integrated solution has been designed to ensure lights are only turned on when needed. This could be, for example, at an access control reader location in order to visually verify the identity of a card holder or to enhance the ability to read the number plate of a vehicle entering a site. Lighting is also quite often used to add to the deterrent factor of a video surveillance system and in this respect, operators can choose different options such as SOS, Hi-Lo and Wave light effects.” The benefits offered by the deep level of integration between the two technologies are available as standard across Wavestore Premium, Enterprise and Ultimate channel license levels. Wavestore VMS supports Hybrid LED illuminators Wavestore was the first VMS to support Raytec’s Hybrid LED illuminators which brings the benefits of White light and IR technology into a single unit. With less cabling required, the 2-in-1 solution reduces installation costs as well as negating the capital cost of deploying two separate lighting units. Wavestore enables the Hybrid LED illuminators to be controlled individually or as a group with all commands, such as scheduled on/off timings and brightness, securely authenticated by Wavestore to prevent unauthorised access to the illuminators over the network.
Renowned sensor solutions provider, HENSOLDT has successfully concluded flight tests with its collision avoidance radar system for UAVs. This sensor is intended to improve safety in both military and civilian air traffic. Detect-and-avoid radar system HENSOLDT has developed a demonstrator of a so-called detect-and-avoid radar system, which uses the latest radar technology to detect objects in the flight path of a UAV and to give early warning of any threat of collision following precise evaluation of the flight direction. At the same time, the sensor also assumes all the functions of a weather radar system. HENSOLDT has developed a detect-and-avoid radar system, which uses the latest radar technology to detect objects in the flight path of a UAV In the flight tests, which were carried out on behalf of the German procurement authority BAAINBw and in collaboration with the German Aerospace Center (DLR) in Brunswick, the radar demonstrated its capabilities in a real setting, thus confirming the results previously achieved in ground tests. In test flights lasting several hours, the radar installed in a Dornier Do 228 belonging to the DLR reliably detected the test aircraft approaching at different altitudes and angles. Active Electronically Scanned Array technology The detect-and-avoid radar system uses state-of-the-art AESA technology (Active Electronically Scanned Array), which allows several detection tasks to be carried out at the same time and enables objects to be detected extremely fast. It replaces the pilot’s visual assessment of the situation. Thanks to its excellent detection capabilities, the multifunction radar is equally suitable for both military and civilian UAVs, e.g. for the delivery of cargo. A second series of flight tests is planned for the coming year. HENSOLDT is a global radar manufacturer and operates one of Europe’s largest cleanroom production facilities at its Ulm site in order to produce the radio-frequency components required for AESA equipment. The company’s radar systems and radar components are used on board aircraft, satellites, ships and in ground stations. The platforms equipped with HENSOLDT’s devices include the Eurofighter combat aircraft, the TanDEM-X satellites, the US Navy’s littoral combat ships and the German Navy’s frigates. Furthermore, HENSOLDT supplies air traffic control (ATC) authorities and armed forces all over the world with ATC radar systems and transponders.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance of ease of installation Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable and can be very expensive. In some cases, the cost of labour to install a camera can be more than the cost of the camera! If labour costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labour in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labour cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying installation of cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement through modular cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilise magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular cameras offer flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analogue video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software programs help in enhancing installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now.Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High gross profit margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier to provide managed services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running. Cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively fix problems before they occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased valuation of business Companies that utilise cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Change is happening at MOBOTIX, and the German company wants to get the word out. “This company has been around since 1999, and people still give us a blank stare because they don’t understand what’s behind the curtain,” says Joe Byron, Vice President Sales Americas, MOBOTIX CORP. “As we gain visibility, people really want to know ‘what’s going on over there?’” There’s a lot going on. A new CEO, Thomas Lausten, who joined the company last year, is a former Milestone employee who brings with him the Milestone philosophy of open systems. It’s a culture shift for MOBOTIX, which has historically favoured closed systems. “We needed a new leader to take us to the next level,” says Byron. “Thomas brings an open-platform mentality. He listens to a variety of opinions – from end users, architects and engineers, and MOBOTIX employees – before formulating a smart decision. That will take us to the next level.”MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common The MOBOTIX ecosystem Over the years, MOBOTIX has developed a unique “culture” that has many rabid devotees; some say it’s the security industry’s version of tech giant Apple. “MOBOTIX has many loyalists, who are enthused about the products and the culture,” says Byron. “We can build on that with a new level of products, more excitement and a new direction.” In addition to a new CEO, MOBOTIX will soon have a new chief technology officer (CTO), Hartmut Sprave, who will be joining this summer. Providing “fresh eyes on the subject” and an outside perspective from the IT industry will drive further innovation. “We don’t want to be on the bleeding edge, but on the cutting edge, and know the audience and its needs and challenges,” says Byron. MOBOTIX’ existing technology mix provides a foundation as the company makes the transition. In some cases, MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common. An example is MOBOTIX’ decentralised system approach with edge-based recording. Tradeshow successes Products highlighted by MOBOTIX at the recent ISC West show included the M16 AllroundDual Multisensor IP camera, S16 DualFlex IP camera and the Q26 Hemispheric 360-degree panoramic IP camera for indoor and outdoor applications. MOBOTIX Management Center (MxMC) 1.8 can change the camera settings on 80 cameras at a time. MOBOTIX IP Video Door Stations can interface with iOS and Android smartphone apps. “We have had so many things in place over so many years that people haven’t known about,” says Byron. He argues that MOBOTIX’ emphasis on technology development sets it apart from some camera companies in the U.S. market. Joe Byron, Vice President of Sales, and Ashley Grabowski, Regional Marketing Manager, at ISC West 2018 “People have been let down in the U.S. market with cameras that have been over-marketed, over-reaching and have little substance,” he says. The German engineering of MOBOTIX products and systems provides an antidote to the technology void, he says. “They are looking for the substance, and that’s what we have,” says Byron. What was missing – until now – was the “layer of integration” with other systems in the market, contends Byron. That separated MOBOTIX from the rest of the industry.MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video “But now we are an open platform, and we have these features sets and are the best of both worlds,” he says. “We can align with technology products and bring MOBOTIX to the masses. It’s a matter of listening to customer challenges and formulating a path to meet those challenges.” The fruits of that open system approach were on display at ISC West. The MOBOTIX booth featured integrations with ClearSite, Omnicast by Genetec, Konica Minolta and Mx-MSP by APB Technology. Other MOBOTIX technology partners include Avigilon, Bosch, Exacq, Gallagher, IndigoVision, Lenel, Milestone, Pelco by Schneider Electric, Salient Systems, Verint and Video Insight (Panasonic). Targeting local markets Another change under the new leadership is more flexibility to address the needs of local markets. “We need to be aware of our audience in the Americas,” says Byron, “and how approaching the market and the product mix may be different. We have the ability to create what we need here to be successful.” One particular concern in the Americas market is cybersecurity, and MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video. “We already have it, but we have never broadcast it to the masses,” says Byron. “We have the substance but haven’t communicated it.” Looking to enter the government market, for example, MOBOTIX faces the important requirement to be “IA compliant.” The company qualifies as IA (information assurance) compliant but just needs to go through the process of getting the “rubber stamp.” “We have so much under the hood when it comes to our products,” says Byron. He says MOBOTIX’ Internet of Things (IoT) approach can meet any end user challenges. “We can be all things to all people, if they truly get to know us. We just need to develop a vehicle to allow customers to communicate with us: What is the challenge? Nine times out of 10 we can meet that challenge with one of our cameras.”
A few friends from the security industry will gather this April to see, hear and touch the latest technologies to make the world a safer place. Actually, more than a few: there will be more than 30,000 security professionals gathering at the Sands Expo in Las Vegas April 11-13 for the International Security Conference and Exposition, usually known as ISC West. Many of the attendees will be returning to what has become a yearly ritual. The site, the players, the pace and even atmosphere of ISC West are as familiar to many as a family reunion. But the industry is changing, and those changes will be reflected in big ways at ISC West. Let’s consider a few themes we will be hearing about at the show. The cybersecurity of physical security systems Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry: How can an industry promote security unless its own products and systems can operate securely? For a long time, no one talked about cybersecurity. Some attending ISC West may wonder if now we are talking about it too much, at the risk of too much talk and not enough action. Almost every contribution to our “review and forecast” articles for 2018 mentioned cybersecurity. Every industry event I have attended so far this year has put cybersecurity front and centre. It will certainly be a major topic at ISC West.Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry Here’s the challenge for attendees to ISC West: If every manufacturer talks earnestly about cybersecurity, how can potential customers tell who is really serious about the topic, and who is merely paying lip service to the latest industry buzzword? If we all agree that cybersecurity is “everyone’s problem” – not just manufacturers, but also integrators and users – does no one really take responsibility? As the industry becomes more educated about cybersecurity, we can expect more detailed and challenging questions on the subject to permeate the ISC West show floor. Some manufacturers have likened cybersecurity more broadly to the issue of trust. Do you trust a manufacturer to address cybersecurity issues? Or do you trust them in general? The cybersecurity discussions will begin even before the show floor opens, on Tuesday, April 10, in a session titled “Cybersecurity Tier Zero: A Guide to the First Steps of Cyber Hardening.” – just one of the many other education sessions on Tuesday. The emergence of video analytics 2.0 Deep learning and artificial intelligence (AI) have become more familiar to the physical security market, and some AI applications are driving new industry trends such as robotics and analysing Big Data. But the biggest potential impact of deep learning is in the field of video analytics, a decades-old technology that has perpetually overpromised and underdelivered. The video analytics systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest The new wave of video analytics products claims to provide a higher level of accuracy because they operate more like the human brain. These new systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest. But consider the bottom line: Do the new video analytics products really perform and eliminate excessive false alarms? Can they effectively search large amounts of stored video and find the few frames that can make the difference in an investigation? Months have lapsed since the first deep learning products were announced - or, at least, “teased”. It’s been sufficient time for manufacturers to develop products that are ready for market, but are they? ISC West attendees will be scouring the booths for the latest developments and asking tough questions about how well these newfangled systems will actually perform.It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business The changing smart home market We all want Siri to set our thermostat or Cortana to arm the alarm system. We want to view video from our nanny-cams on our smart phones, and to turn on the lights from anywhere around the world. It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business that is the bread-and-butter of many security companies? Bluetooth and Wi-Fi can make a lot of things happen in the smart home environment, but what about other networking standards such as ZigBee and Z-Wave? The stakes are huge, which is why the big tech companies – from Apple to Amazon to Google – are staking their claims in the home automation market. Just this year, Amazon has purchased Ring, a video doorbell and security camera company – which will also be exhibiting at ISC West. But it’s unclear what such moves in Silicon Valley will mean for traditional security companies. The growth of do-it-yourself (DIY) systems introduces even more variables, as do alarm companies with new business models and even cloud-based approaches. Many exhibitors at ISC West – from ADT to Z-Wave – are addressing the new smart home environment and can help those attending the show do the same. About 40 companies are exhibiting in the “Connected Home” arena. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees Drones, robotics and education From robots to drones to counter-drone solutions, there other new technologies being displayed at ISC West. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees offering sessions on topics such as “Drones – Friends or Foes to the Security Industry?” There is a level of novelty to these technologies, and attendees might be lured by the entertainment value of a subject that may fall outside their job description. But one education session addresses the nuts and bolts in the real world: “Selling the Value of Security Robots by Setting Realistic Expectations.” Could these new gadgets play a bigger role than we think in the future of the security market? For all its familiarity, there is always something new for attendees at ISC West. It may be a startup company with an intriguing value proposition tucked into a tiny booth at the back of the hall. Or it could be a big surprise news announcement from a major player. For attendees, the best surprise of all is that valuable piece of information they can take home to make their business better. Here’s hoping you find it!
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organisation’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analogue camerasRequirement of IP camera technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analogue cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analogue cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation of 3xLogic hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analogue camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analogue camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing discrete areas with VIGIL software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working with community partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard solution for emergency situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring centre “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring centre, for prioritised verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the cut-throat high street environment. Best-selling products They resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise How do we know if our marketing strategy is working? What is the conversion rate of purchases? What are the ‘hot areas’ of the store, and do these actually represent best-selling products? Originally, with no access to significant information, they relied on experience and conversation with staff. But there was no way to verify these findings. They also needed to be able to get this information remotely – i.e. management in their HQ in Warsaw wanted to be able to see the situation in the other four stores without having to visit them separately. Sometimes, they resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise. Tailor-made solution Miniso turned to Hikvision AI products, with a solution built by Polish reseller Volta, including people counting cameras, fisheye cameras and NVRs. These were all coordinated using the HikCentral software platform. A people counting camera in each store counts people passing by, while another counts people entering and leaving. With this tailor-made solution management could calculate how many people were passing by to see a purchasing conversion rate. This also helps them to know whether marketing strategy is working. They can analyse the information further to see whether the rate of people entering the store is dropping, and whether that relates to the number of those passing outside. Miniso’s management can then look into the causes of these numbers, along with sales figures, to form a picture. For example, whether there is an external factor affecting shoppers either to pass by, or to enter. Video management platform The professional video management platform allows managers to access the information from different offices and mobile applications anywhere Because Miniso have the same technology set up in all the stores in Poland, they can compare different locations. This also comes in useful when it’s time to negotiate rent with shopping malls. Using ceiling installation of several fisheye cameras, the system can generate heat maps. This helps managers to see where ‘hot areas’ are, helping them to allocate products in the optimal place for promotion. Hot areas can also be compared with sales figures to provide further insights into shopping patterns. All the information provided by the system is coordinated, and business information on both layout and original image can be overlaid in Miniso’s HQ in Warsaw. The professional video management platform allows managers to access the information from different offices and mobile applications anywhere. This makes life a lot easier for the operations team as they need to check the situation in all stores. Fiercely competitive environment It also means that everything can be viewed simultaneously, so they can identify trends throughout the network of stores. Byron Zeng, Vice President of Miniso Poland, says: “The high accuracy of conversion rate the solutions provides really solves a number of our management issues. We can now easily see what’s going on in the other stores, including heat mapping, which makes management of the whole networks so much more efficient.” This is a great example of how AI surveillance products can change the landscape of business decision-making. In a fiercely competitive environment, like a shopping mall or high street, shopping trend data can help a retailer to survive. In fact, this worked so well for Miniso, they decided to use the solution in their stores across the whole of Europe – potentially about 200 stores in the next year.
A 300-plus camera city centre video surveillance scheme in Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The previous analogue-based CCTV system was more than 20 years old and had become expensive to maintain, so City of Lincoln Council decided to replace the analogue cameras and transmission equipment with HD digital equipment. The total cost of ownership has been reduced by the savings made on legacy fibre lease costs, as well as reduced energy consumption and the ability to configure and maintain the cameras remotely. Installation of IP full HD system The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Bandwidth efficiency using H.265 compression A combination of fixed and PTZ cameras were installed over a new 1GB duplex network. These include cameras from the Dahua Pro series, which features high image quality, bandwidth efficiency using H.265 compression and excellent low-light performance. Bullet cameras from the Ultra series – with powerful optical zoom, IR distances of up to 50 metres and software which supports people-counting and heat-mapping – were also installed. The design of the scheme incorporated both camera and server-side analytics with legacy motion and audio detection The bandwidth efficiency of the cameras meant that multiple cameras could be installed in any given position, providing 360° coverage of locations and up to 20 Megapixels of video capacity per location – compared with less than 400,000 pixels with the previous analogue cameras. The design of the scheme incorporated both camera and server-side analytics, including video content analytics, facial recognition, ANPR, heat maps and pedestrian counting, as well as legacy motion and audio detection. The objective of the facial recognition aspect is to support operators in areas such as the search for missing and vulnerable individuals. PoE switches for providing power The superior image quality of the new system is borne out in figures which show an increase in ‘actionable’ images from 5% with the previous system to 60% successful reviews with the new one. Dahua PoE switches were also installed to provide power to the cameras, which are then connected to a layer-2 network. A new video wall comprising ten Dahua DHL49-4K LED backlit 49-inch 4K Ultra HD video wall display units featuring industrial level wide-viewing LCD panels, was fitted into a newly refurbished control room in City Hall and connected to i-Comply wonderwall video display drivers. This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security" Supplied through authorised distributor Mayflex, the entire system was installed by public space CCTV specialists Videcom Security, which worked with other partners to provide a high-performance, efficient and feature-rich system. Cost-effective and reliable equipment Bill Mead, Managing Director at Videcom Security, said that working largely with Dahua video equipment meant it was easier for engineers in terms of configuration, as well as being cost-effective and representing good value for money. “Working with the Dahua product range has been great. The products have proved to be reliable and we experienced very few problems, from the initial configuration through to installation and commissioning. “This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security. We broke new ground with the development of 4K H.265 decoding, the support through Luxriot for camera-side analytics and edge recording, and the development by Dahua of camera-to-camera communication, allowing for non-connected systems to communicate locally.” Infinet 5GHz and Siklu E and V band radios Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex Academy Dahua is a solution provider in the global video surveillance industry and associated technology and has a keen focus on innovation by investing heavily in research and development. For the Lincoln city scheme, its products were selected based on their performance and cost-effectiveness to meet project budgets. Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex Academy. This helped Videcom negotiate key firmware enhancements, which added to many of the analytical features available in each of the cameras. The wireless network is built with Infinet 5GHz and Siklu E and V band radios. Resilience and diverse routing has been built into the network design, which supports video surveillance as well as public Wi-Fi and capacity for smart city services. Luxriot have worked closely with Dahua, supplying their Evo Global video management system and supporting edge analytics integration through their ‘events and actions’ management, which has also been integrated through to i-Comply’s VTAS CRVMS software (now rebranded as Viewscape). Real-time control and video streaming The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution" The introduction of H.265 compression was ground-breaking for such a project, with the system capable of displaying 4MP and 6MP H.265 to the operator’s spot monitor with real-time control and video streaming. “The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution,” said Martin Byrne, CCTV Team leader at Lincoln City Council. “The police are extremely pleased with the system and we’ve had very positive feedback from them. “There is really no comparison from how we operated previously to how we can now. It revolutionises how we manage the CCTV systems and data. The potential for what we can achieve going forward is remarkable. We have now started to get real results from the investment in analytics; in particular vehicle and people-counting has been deployed and data is used to enhance other city projects.” Martin added: “Dahua has taken time out to visit and discuss with us our ambitions for smart city services. We have adopted Dahua as our brand of choice for CCTV cameras and have so far been very pleased and impressed with their reliability, low-light performance and overall image quality.”
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that a recently renovated office space in Glasgow, Scotland, 191 West George Street, has installed Lifeline Speedlane Swing optical turnstiles for increased physical security and uncompromising aesthetics. A rising trend in the United Kingdom is the renovation of older office spaces. With a continuously growing workforce, cities across the country are transforming corporate offices into multi-level spaces with increased aesthetics. In keeping with this trend, the office space at 191 West George Street recently underwent a renovation. Revamped with space and simplicity in mind, the building’s atrium stands out due to its high-quality materials, including the sleek, Lifeline Speedlane Swing optical turnstiles used to control access to all occupants and visitors. Optical turnstiles integrated with access control The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitorsThe lead architect renovating 191 West George Street was Michael Laird Associates – a firm that flourishes in adaptable yet luxurious designs. Working directly with the architects, owners of the office space underwent a simple product selection process regarding security. The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitors. 191 West George Street is the home of a 6-level building with 87,000 sq. ft. of usable office space. The architects wanted to keep the look and feel of the entire building, open and clean, without any columns or other impeding structures. The designers chose a stainless-steel finish for the modern and sleek cabinets of the Speedlane Swing optical turnstiles to provide a perfect accent for the neutral white and mushroom colours of the lobby. Their minimal footprint allows them to integrate seamlessly into any location without being obtrusive to user access or aesthetic design. Lobby security solution All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time191 was designed to be a bustling, flexible workspace for hundreds of daily users, and as space is rented and the building starts to experience higher traffic, the four lanes of optical turnstiles will be able to handle the load. Working in collaboration with Boon Edam’s sales and specification managers, the architect had a clear idea of what they were looking for in a lobby security solution. By reviewing a number of key elements related to security, throughput, aesthetics, safety, and technology, Boon Edam was able to map out all aspects of the entry requirements prior to selection and installation. The four-lane array of Speedlane Swing optical turnstiles includes a single, wide lane at the end. Wide lanes allow large groups to pass through as well as wheelchairs, dollies and luggage. All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time.
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner has announced that the Kentucky School Boards Association (KSBA) is delighted with their recently-upgraded 3xLOGIC video surveillance system, installed and monitored by Sonitrol of Lexington. 3xLOGIC - Sonitrol collaboration The Kentucky School Boards Association was established in 1936 and represents 863 school board members from across the state to provide training, services, and collegiality to aid in the effort of providing the best education possible for public school students across Kentucky. KSBA is a long-time Sonitrol of Lexington customer, going on 25 years. Hence, Sonitrol and Danny Goodpaster, Security Consultant, were well positioned to understand KSBA’s situation and recommend the solution best suited for their needs. “About three years ago, during the budgeting process, we had an incident in our parking lot in which there was a minor fender bender,” related Jeff Million, Print Shop and Operations Manager for KSBA. “The camera watching the parking lot was only 30 feet away, but I could not even make out identifying writing on the car that struck the other car. On another occasion, we had a break-in and from three feet away I could not make a positive ID on the perpetrator. After these incidents, things got rolling and we soon embarked on upgrading our video surveillance capabilities.” Full HD IP video surveillance solution The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detectionGoodpaster wrote the first upgrade proposal in 2016. After some discussion about installing a hybrid DVR, KSBA at Goodpaster’s urging decided to remove the analog cameras and go full IP. Now, the organisation has four static cameras and two 3xLOGIC multi-sensor devices, trained on the front door and the back door, loading dock, and parking lot. The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detection along with video and audio verification of alarm activations. The multi-sensors are connected to an updated Sonitrol panel and they provide video feeds, as well as glass break and audio verification for both entrances. “With our former system, I’d get the first call on alarm, but often I did not have enough video information to make an informed decision. Now, I have the data and the images I need to deal quickly with any situation,” said Million. Goodpaster recalled that there was a lot of competition for this business—'KSBA really did their homework.’ At the end of the day, it was the multi-sensor’s video and audio verification that provided KSBA with real, tangible benefits they could feel. Further, between the Sonitrol app and VIGIL Client software installed on Million’s laptop, KSBA now has a fully-integrated solution, as opposed to the two separate systems they had before. The four non-monitored cameras are overseen by 3xLOGIC VIGIL Central Management software (VCM), so if any equipment issues arise, Sonitrol knows immediately and can act to proactively solve them. Multi-sensor devices The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it"As noted earlier, the Multi-sensor devices monitor the front and back entrances, as well as the parking lot. The other four 3xLOGIC cameras are trained on the front door reception area and down the hallways away from the front and back entrances, to provide visibility on where any visitor or employee is going. These cameras are viewed live and used for incident review. The receptionist at the front desk has a dual screen that shows her the approach to the building and who is coming through the door before that person reaches her desk—this creates full situational awareness and keeps the receptionist safe. “We really do like our new cameras, and we are light years ahead of where we were as far as quality and ease of use with the 3xLOGIC system,” said Million. “We now have video verification capabilities. Before I’d get a phone call, while away from the office, providing video images but I couldn’t make anything out. I’d have to head home to view the video and I still didn’t have sufficient resolution to make out what was happening. The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it.” IP HD cameras Million continued, “Recently, we had a forced entry attempt on the front door, and we went to the video. We could immediately resolve what had happened—that’s real peace of mind. We have to make quick decisions, and in the event of a real incident, we’re shaving at least 10 minutes off of police response times. Million can view all six cameras on his mobile app. We don’t want to call on false alarms, we want to make certain. Now we can and the video quality is about 10 times better.”
ProdataKey (PDK), an innovator of cloud-based network and wireless access control products and ASSA ABLOY, the pioneer in door opening solutions, announced the completion of a campus-wide security upgrade at Glenaire Retirement Community in Cary, North Carolina. Modern Systems, of Yadkinville, North Carolina, has installed a fully integrated wireless lock and access control solution securing 370 doors spread across the community’s main building entrances, public access areas, offices and residential apartment units. It makes use of ASSA ABLOY’s Aperio wireless locksets with PDK’s cloud access control software, providing administrators with the ability to remotely lock and unlock doors, set specific hours for maintenance workers’ access to buildings, continuously monitor door use, and easily retrieve system-wide reports. ASSA ABLOY IN100 Aperio wireless locks feature sleek readers integrated with the door hardware, helping to preserve the upscale aesthetic of Glenaire’s many buildings. Accessing PDK software from mobile device System management of PDK software can be handled completely from any mobile device or computer browserThe system will continue to grow, with expansion to all electrical rooms, storage rooms, mechanical rooms and closets, bringing the total to approximately 650 doors, as well as another 190 apartments and 40 assisted living units. As new doors come online, they will appear within the completely scalable PDK interface with no interruption to service or administrative functions. System management of PDK software can be handled completely from any mobile device or computer browser. Modern Systems was able to upload the user database from Glenaire’s legacy access control system to PDK’s cloud servers, allowing residents to retain use of their existing cards, which previously were used only to open the front doors of main buildings. With the PDK/ASSA ABLOY system, they now use those same cards to access public areas and their own private residences. ‘Guest’ cards, with more restricted access, are available for residents to give to family or friends as appropriate. Customised card permissions have also been established for staff groups, including service workers, nursing professionals and dining staff. Integrating security solutions When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access cardModern Systems plans to soon facilitate an integration between the PDK software and several other security solutions they have installed at Glenaire. Mapping between doors and surveillance cameras, which are part of a new Milestone Systems video management solution, will not only enhance security but assist with Glenaire’s missing resident protocol. When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access card. They also plan to connect the facility’s Situational Awareness and Response Assistant (SARA) risk management solution and mass notification system, from Status Solutions, with PDK. This integration will be important both in campus lock-down situations, as well as to assist with entry for response teams during medical emergencies. Glenaire’s Director of Facility Services, Ryan Ferguson, says he was wowed by the cloud-based PDK solution, which he says, “has the most modern, up-to-date access control software of anything I’ve seen. In addition, we were able to install the wireless PDK/ASSA ABLOY solution in about half the time it would have taken to install a wired solution, and for about half the cost.” Protection from cyber vulnerabilities The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless"Cory Jackson, PDK’s Vice President of Strategic Sales, adds, “The Glenaire project demonstrates the many ways in which our cloud solution makes sense for enterprise scale customers. “The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless – even across multiple buildings or sites, we offer seamless integration with solutions from valuable partners like ASSA ABLOY and others, and the customer’s in-house network is not exposed to any potential cyber vulnerabilities, are all reasons that PDK is gaining traction with larger customers.” “Retirement communities like Glenaire face a very unique set of challenges. The ability to provide a sense of security to residents and their families while still creating an environment that feels like home is paramount,” says Caleb Allen, electro-mechanical specialist for ASSA ABLOY Door Security Solutions. “We were happy to offer them a solution that made it easy and affordable to install comprehensive access control throughout the facility.”
Round table discussion
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?
Even the most effective technologies usually require some level of human involvement. What new technologies do, generally speaking, is change the nature of a human’s role. Most jobs in today’s world are vastly different than 50 years ago, in many cases because of the changing role of technology. In the physical security world, what specific impact does technology have on the human element of systems? We asked this week’s Expert Panel Roundtable: Have recent developments in security systems made manpower more, or less, important to the equation? Explain.