Remote video monitoring
VITEC, a provider of advanced video encoding and streaming solutions, announces it will showcase the latest capabilities for its award-winning EZ TV IPTV & Digital Signage Platform at ISE 2019 on Stand 14-M200. The chosen solution for sports and entertainment venues, enterprise, government, and military agencies in Europe and the U.S., EZ TV's comprehensive feature set enables any organisation to centrally manage and stream HD, low-latency, in-house feeds and TV channels, as well as create...
Rhombus Systems, an enterprise video security startup, releases Unusual Behaviour Detection (UBD) to quickly notify organisations when something is wrong. Last year, Rhombus Systems released their AI-Powered R1 security camera to provide organisations cloud-management, facial recognition, people analytics, and enterprise integrations at an affordable price point. Today’s existing video surveillance systems are reactive and used only after an incident has already occurred. Rhombus is chang...
Axis Communications is returning for the 21st edition of Intersec from 20 – 22 January 2019. Axis will showcase the many dimensions of products, solutions and services across Retail, Critical Infrastructure and Smart Cities. Future of security Philippe Kubbinga, Regional Director - Middle East & Africa, Axis Communications, “At Axis, we have stayed at the forefront by constantly challenging the status quo and investing in our people and our partners. As we move into another yea...
Matrix Comsec has confirmed its participation in the 27th Convergence India 2019 event, to be held in the Pragati Maidan, New Delhi from 29th - 31st January 2019. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and new portfolio of IP Communication endpoints. PARISAT VC video conferencing Matrix is well-known for its indigenous and innovative range of solutions for Unifie...
DW Complete Surveillance Solutions, the provider of digital recorders, surveillance cameras and related management software, announces the launch of our new 2U Blackjack X-Rack server. The DW-BJX2U is the latest addition to our Blackjack family, offering a high-end, high-capacity solution for enterprise scale applications. The Blackjack X-Rack comes with DW Spectrum IPVMS server installed for setup and configuration, and is recommended as a complete solution with one or more Blackjack NAS devic...
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure...
With more than 50 percent of U.S. households projected to use smart home technology by 2023, Interlogix, a provider of security and life safety solutions, is ready with an array of security platforms that support smart devices and links to top interactive service providers. Interlogix is a part of Carrier, a provider of innovative HVAC, refrigeration, fire, security and building automation technologies. “We’re uniquely positioned to meet the demands of the smart home segment that’s expected to nearly double over five years,” said Michael Chiavacci, general manager, Interlogix, North America. “Our flexible, integrated hardware platforms offer a variety of connected, smart devices that seamlessly integrate to proven service providers.” Enhance lifestyle convenience Interlogix has reinvested in its UL-listed, professional-grade, security panel lineup and added two touchscreen controls. In addition, it is providing access to more device integrations – such as sensors, lights, locks, thermostats and garage door controls, video doorbell cameras and voice-controlled digital devices, among others. Homeowners can design a smart home system to meet their needs today, with the peace-of-mind that they can easily expand functionality" All of these systems can be managed or monitored via a single smart home app. For example, new devices such as the Interlogix Command Button, enhance lifestyle convenience by wirelessly triggering up to three different, simultaneous automations within the home. “Our range of platform and service solutions make Interlogix a smart choice,” said Chiavacci. “Homeowners can design a smart home system to meet their needs today, with the peace-of-mind that they can easily expand functionality if their needs grow and change.” Encrypted wireless communication Interlogix solutions are professionally installed and configured through a nationwide network of security and smart home dealers to ensure each home has a customised solution that fits each homeowner’s needs. Many of these solutions will be displayed at the 2019 Consumer Electronics Show (CES). Booth visitors can preview a new line of door and window sensors, key fobs and pet-motion detectors that provide encrypted wireless communication between devices and select control panels. See many of the Interlogix solutions for home security and automation on display at the Pepcom Digital Experience, Jan. 7 in the Mirage Hotel and Jan. 8-11 in booth #40531 at the 2019 CES in Las Vegas.
SeeTec, provider of video management software solutions in Europe, launches the second release of its products in 2018. The recent version R13 of the video management software SeeTec Cayuga comes with a new interface to unleash the software’s full potential in integrated security ecosystems, generating significant added value for corporate and enterprise customers. SeeTec BVI, the customisable video solution to support business processes, undergoes a paradigm shift towards real-time operations. One of the key benefits of SeeTec Cayuga has always been its flexibility to hook up to security ecosystems via interfaces and integrations. With its latest release R13, SeeTec now unveils an innovative tool, which makes it even easier to create comprehensive environments consisting of multiple systems and applications communicating with each other. The extension of the SeeTec Analysis Interface supports the integration of any edge or server-based license plate recognition solutionThe SeeTec Event Interface (SEI) breaks new ground to connect the SeeTec Cayuga video management software to third-party security products using a flexible, driver-based approach. All events from third-party applications such as access control, burglar alarm and many more can now be visualised within the VMS, for example by displaying them in maps and floor plans or opening the relevant camera streams. Implementation of integrated security systems This gives system operators a much better overview, reducing the reaction time in case of critical incidents significantly. Andreas Conrad, Marketing Director at SeeTec, explains a further benefit of the new interface: “As the SEI is a well-documented and open interface, technology and solution partners are now able to easily develop plugins by themselves to connect SeeTec Cayuga with their product portfolios. “This facilitates the implementation of integrated security systems, providing added value especially for corporate and enterprise customers. Furthermore, it underlines the solution-based approach of SeeTec.” Another essential move into this direction is the extension of the SeeTec Analysis Interface, which now also supports the integration of any edge or server-based license plate recognition solution on the market. Improved video backup, failover and performance An improved notification system provides full transparency about the status of scheduled and ongoing backupsAmongst the usability features implemented in R13, the video backup functionality within SeeTec Cayuga received a major revamp. It allows the automatic backup of video recordings based on time schedules or – which is new – on event triggers. If a backup operation is interrupted (e.g. when using Wi-Fi connections to offload data from mobile units such as trains or trams), it can be resumed automatically. An improved notification system provides full transparency about the status of scheduled and ongoing backups. In addition, many smaller improvements and functionalities are part of the release, providing added value and improved usability. Especially in critical infrastructure projects, continuous recording even in case of a server breakdown is crucial. To keep recording gaps at an absolute minimum, SeeTec Cayuga R13 now supports mirrored recording, which means that the video streams coming from the cameras can be recorded simultaneously on two servers. Furthermore, the playback of archive footage has been optimised, now allowing a more precise timeline navigation as well as seamless and smooth reverse playback. Last but not least, the average CPU load on server side could be reduced by up to 50% through optimisations in communication between internal components. Live monitoring of scans and transactions Security guard can now at once monitor multiple cash desks and mark suspicious activities directly within SeeTec BVISeeTec BVI, the second SeeTec software product that will be published as R13, also sees various improvements. With especially the logistics and retail industry in mind, SeeTec BVI is shifting its paradigm, because the software can – for the very first time – be used for the live monitoring of scans, transactions or other events. For the application in retail that means, e.g., that a security guard can now at once monitor multiple cash desks and mark suspicious activities directly within SeeTec BVI, whereas for a logistics scenario this new functionality can be used for the surveillance of the picking process of an order. In addition, SeeTec BVI provides numerous further improvements, e.g. a more precise timeline handling in the video archive, which give users palpable advantages in everyday use. Customers with a valid Software Maintenance Agreement (SMA) can already download and install the update to SeeTec Cayuga R13, whereas SeeTec BVI R13 will become available in late January 2019. For both applications, the installation can be done either manually or if updated from an installed base via the built-in Auto Updater.
This Christmas the risk to retailers’ margins from theft is greater than ever before, according to the Lodgic Intelligence Centre. The escalated threat results from three factors: increased activity by organised criminal gangs; reduced security staffing resulting from the hike in the minimum wage; and a decline in the response to shoplifting by the police - who may be unwilling to respond to the theft of items worth less than £200. Operating nationally Close to 80 percent of retail losses from crime result from ORC (Organised Retail Crime), committed by some 140 criminal gangs currently operating nationally, according to analysis at Lodgic, which is operated by security consultants Lodge Service. Shop staff are often distracted and many of the temporary personnel hired for the season are often poorly trained in detecting Gangs feel they can operate almost with impunity at Christmas. Their activities are hidden by large crowds in busy stores and shopping centres. Shop staff are often distracted and many of the temporary personnel hired for the season are often poorly trained in detecting and preventing the threat from shoplifters. But few retailers are aware of the scale of the problem from ORC. Often this is because seemingly small, isolated incidents are in fact related. Suspect transactions Criminals keep coming back to what they see as a soft target - and then heading off to another branch, perhaps in another city, to avoid detection. To counter gang activity, analysts at Lodgic intelligence centre are using data mining systems, working with a retailer’s on site and headquarter teams to investigate losses and track patterns of criminal behaviour. They can then link incidents to identified thieves, who usually have a string of aliases. The analysts look back at all suspect transactions to check names, addresses, dates, card details, locations, and other statistics. This data is used together with national crime reports, whistleblower and other sources, so they can anticipate where the criminal gangs are most likely to strike next. Unmanned checkouts The Lodgic intelligence centre then deploys store detectives on a daily basis to anticipate and stop crimes. Teams are trained to work undercover to identify criminals and undermine each threat to a store, shopping centre or logistics chain and then initiate a police arrest. Unmanned self-service checkouts are a recipe for shoppers to help themselves - according to research at Lodgic Britons are stealing £3.2 billion worth of goods from self-service tills each year. Unmanned self-service checkouts are a recipe for shoppers to help themselves - according to research at Lodgic. Almost 25 percent of people sampled in one survey admitted to stealing at least one item without paying. Another study shows theft from unmanned checkouts has more than doubled in the past four years. Detecting scan-avoidance Significantly, 40 percent of those who admitted to stealing said the reason was that they knew they could get away with it. With domestic budgets squeezed this Christmas, there is a sharp increase in incidents. The technology for detecting scan-avoidance is getting the full attention of the total loss community. This includes systems like Transpeye, that links transaction data with video and other systems, so that managers on site or located remotely get automatic alerts, supported by filmed evidence, when an ‘exception’ occurs. But current technology still might not be enough to protect the retailer facing this type of threat this Christmas. Costs of protection Problems include monitoring a transaction to see if a low value item is scanned but a higher priced product is bagged and taken from the store. Surveillance and analysis at the point of sale to confirm a physical match is a particular challenge. Any protection has to be proportionate. Losses must be measured against the costs of protection, including having more staff on the premises to either serve customers or observe. This is a key issue in 2018 and beyond with the increase in the minimum wage and other inflationary wage costs. A further strategy to consider is to train customers to stay honest, according to Lodgic. Fraudulent activity Clearly when people believe that they are not observed and unlikely to be stopped and questioned then the likelihood of theft increases Clearly when people believe that they are not observed and unlikely to be stopped and questioned then the likelihood of theft increases. A single incident of theft can develop into a habit for an otherwise honest customer. Strategies can include managing live transactions remotely, with supervisors monitoring and looking for patterns of behaviour that indicate fraudulent activity at the point of sale. Already with Transpeye software there is the capability to do this, with internet connection of video and data to the Lodgic intelligence centre. Measures might also feature further changes to store layouts and use of a range of behavioural cues and signals to increase the customer’s sense of being observed. This remedy might not be in time for Christmas this year, but perhaps it should be in a New Year’s wish list.
Altronix Corp. announced that it has received Lenel factory certification and joined the Lenel OpenAccess Alliance Program (OAAP). Altronix’s LINQ technology interfaces with the OnGuard access control system and facilitates the remote monitoring and reporting of power diagnostics. These alerts minimise system downtime and eliminate unnecessary and costly service calls. "Altronix has completed required factory testing at Lenel to validate the functionality of its interface to OnGuard. This provides users with a single software platform to monitor power supply status, receive alert messages, and manage settings at multiple sites with ease,” said John Marchioli, OAAP Product Management, Lenel. "We look forward to their continued involvement in the Lenel OpenAccess Alliance Program." Seamless interface for Altronix products “By integrating with the OnGuard access control platform, we are now able to provide our mutual customers with a seamless interface for their Altronix products and their OnGuard system,” said Alan Forman, President, Altronix Corporation. “We are extremely pleased to provide this value-added benefit to this segment of our market.” LINQ enables users to monitor power/diagnostics, receive emails and alert messages while managing settings of Altronix products with web-based management capabilities from OnGuard Alarm Monitoring stations or anywhere there’s a network connection. Employing an intuitive user interface, LINQ Dashboard allows users to manage multiple sites with ease, regardless of the number of monitored devices.
LILIN Americas, an entity of video surveillance provider Merit LILIN, serving North, Central and South America, announced that it has added an Amazon Alexa skill to its Device Hub device manager that enables customers to simply ask for a live or recorded view from any supported LILIN IP camera or NVR and have it displayed on their TV monitor. Amazon Alexa converts the end user's command to a directive and sends that directive through the Device Hub. This fast, hands-free solution eliminates the need to navigate on screen menus or have a mobile device in hand whenever video is needed for monitoring. Using the voice-controlled Alexa features of the LILINHub skill provide a convenient way to monitor the property" Enhancing the end user experience "Using the voice-controlled Alexa features of the LILINHub skill provide a convenient way for end-users to easily monitor their property, such as viewing live camera feeds, playing back video footage from a LILIN NVR and reviewing motion events," said Joe Cook, General Manager of LILIN Americas. He further added, "All the end user needs to do is tell Alexa the command to view the front door camera and the live view will display. This integration is another example of LILIN enhancing the end user experience." In addition, Device Hub provides a security professional the ability to remotely monitor multiple sites in one centralised dashboard via the LILIN Device Cloud with the up-to-date status of connected LILIN devices. The LILINHub App has a site mapping feature that plots multiple site locations within Google Maps.
Intrusion is the act of intruding, forcible inclusion or entry in an area that is not welcome. Track is the act of following the movements or trail of someone or something, typically in order to find them or note their course. Without staring monitors for 24/7, Intrusion Video Analytics can help partners to detect the act of intrusion and give alerts, and Track Video Analytics can help users to find the direction of moving object, give alert if the object goes to wrong direction. Most intrusion and track related video analytics on the market are available with Surveon, providing partners many options to meet different projects' requirements. Surveon provides a variety of video analytics to meet different projects' needs. They have been broadly divided into two categories - Intrusion and Track with numerous sub-categories under their ambit: Intrusion video analytics solutions Intrusion Detection - It detects malicious activities, policy violations or invasion; once detected, it will trigger alarm. It can be used in places where safety and security are top priorities, for example hard shoulders and the sensitive area in campus or airport. Forbidden Area Detection – Setting a detection zone as forbidden means there should be no trespasses in the set area; any incoming will trigger alarm. It can be applied for places where perimeter security is required such as server room and data center. Virtual Fence – Setting a virtual fence means drawing a line that should not be crossed; it will trigger alarm when the line is crossed. It can be employed in places where crossing will cause damage, for example country borderline and waiting line on station platform. Going Out Detection – By setting a detection area, boundaries and the object size, objects can move around in the set detection area but cannot cross the set boundaries, otherwise it will trigger alarm. This can be applied for attendance checking, preventing a student leaves the classroom or an employee gets off work before the schedule time. Track video analytics solutions Fisheye Auto Tracking - The windows show the movements of object with 360° surround and 180° panoramic viewing angles, which allow fisheye to work as PTZ camera, performing wider monitoring. It can be applied for place with valuable things and needs to be monitored intensely, for example boutique stores. Tailgating Detection - The alarm will be triggered when an object moves in the same direction but does not stop or stays too close to the previous one when crossing the dividing line in the detecting area. This can be used when the act of passing through needs to be charged or in access control, for example station gates, parking lots, toll booths, and the ATM. Surveon intrusion video analytics It is hard for most video analytics to accurately distinguish two objects when they pass each other. By analysing certain specific physical features, Surveon intrusion video analytics help partners to easily recognise two objects' behaviors even when they move side by side or cross to each other. With conventional solution, when an intrusion object goes through a pillar for seconds and shows up again, the system will wrongly recognise the object as a new intrusion object. With Surveon intrusion VA solutions, the system can resume detecting work automatically when the object passed a pillar and showed up again, giving partners an accurate alert for detecting unwelcome visit.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that can be used within a retail store to improve security and loss prevention, yet none should be used in a silo. There are tremendous benefits to integrating security technologies and communications systems together, including enhancing overall safety and security, reducing shrink, and improving operations. There are many different technologies that can be used within a retail store to improve security and loss prevention As the existing security infrastructure is evaluated and plans for the future are developed, the team responsible should consider some of the following questions. Are there areas of the store that require greater security? Are there notifications or other technologies that could improve the efficiency of personnel and the safety of shoppers? Are there other departments within the organisation that could benefit from the data gathered by the security technology? Understanding current pain points within the stores and how integrated security solutions can address these is the key to implementing the best solution. Here are a few “hot spots” within a typical retail store that easily demonstrate the power of integrated solutions. Point of sale terminals Whether it’s loss through sweet hearting or other fraud, point of sale terminals present a significant shrink risk for retailers. Integrated systems enhance security at these locations. Video recording of HD or megapixel cameras integrated with point of sale data makes it easy to locate video associated with transactions and exception reporting. This allows for visual verification of each transaction when needed.There are tremendous benefits to integrating security technologies and communications systems together Other risks like robbery not only result in loss, but also impact the safety of employees and shoppers alike. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk. When the intrusion detection system is integrated with the video system, pressing a panic button or pulling the bill from the sensor can automatically trigger a video snapshot to be sent to the monitoring station to provide verification of the alarm and more information for law enforcement when they are dispatched. Adding audio integration to the intrusion system can also result in a message sent to the store security personnel’s two-way radio when a panic button is pushed, or a bill trap sensor is activated. If no security guard is onsite, video monitoring services can allow the monitoring centre to intervene through audio, alerting the perpetrator that his or her actions are being monitored and that the authorities have been contacted. This may cause the offender to flee the area, helping to mitigate the safety risk as well as the potential for loss. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk High value displays Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communication Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications. For example, a person standing at a display for longer than a pre-defined time or touching items on display can trigger a video snapshot to be sent to the store manager and an audio message to play through a nearby loudspeaker, such as: “Thank you for your interest in our smartphone selection; an associate will be there soon to assist you.” This not only alerts potential offenders that their actions are being watched, it also serves to improve customer service for legitimate shoppers – as a retail floor associate is notified that a customer may need assistance. Cash office An access control reader at the door to the cash office restricts access to only authorised individuals. Integrating video can automatically capture an image of the person requesting access for verifying an employee’s identification prior to granting access or for retrospective analysis in the event of a theft. Exit doors If an employee props open a back door – either for easy re-entry after a break or to allow access to another person with intentions of theft – integration of the intrusion detection system to the video and audio system can significantly reduce risk of loss. For example, the intrusion detection system can monitor doors for abnormal conditions, even when the system is disarmed.Loss can also occur when a cooler or freezer malfunctions or when the door is accidentally left open A door left open for longer than a pre-defined time can cause an alarm on the intrusion panel, which can trigger a nearby camera to send a snapshot of the open door to the store manager and trigger the public address system to play a pre-recorded message through a nearby speaker. This prompts the employee to close the door, reducing risk of theft. Coolers and freezers Loss isn’t just about theft. Loss can also occur when a cooler or freezer malfunctions or when the door of one of these units is accidentally left open. The same concept for monitoring exit doors can also apply to doors for coolers and freezers to prevent spoilage. A cooler or freezer door monitored by the intrusion detection system can trigger an alert or chime to play in the area to remind an employee to close the door or to alert the store manager to the issue. While providing surveillance of the cash register area, the camera's video analytics can be used to trigger an alert in case the queue exceeds the pre-defined threshold Serving a dual purpose Retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store While the technology solutions described above positively impact loss prevention in a retail store, they can also extend beyond security to improve health and safety and enhance customer service as well as customer engagement and sales. For example, while securing a store’s main entrance with IP cameras featuring on-board video analytics, retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store. This data can help them understand peak days and times when making decisions about staffing. Or while providing surveillance of the cash register area, the camera's video analytics can also be used to trigger an alert in case the number of people in a queue exceeds the pre-defined threshold. At this point, the same public address system and loudspeakers used to play background music to enhance the shopping experience could be activated to broadcast a message to request another cash register to be opened, improving store operations. For security and loss prevention purposes, video analytics can also be used to ensure that no one enters or leaves the retail shop using the emergency exit. To address health and safety issues, these same cameras can also trigger an alarm if that emergency exit is blocked by an object – improving the safety of customers and employees. When systems are used to deliver data for purposes beyond security, other departments may be willing to contribute toward the cost Metadata generated by the cameras can also be used to gather information that when processed with sophisticated algorithms in the cloud can show trajectories of the paths that shoppers take as they travel throughout a store as well as heat maps indicating where they walk, stop and dwell – all while protecting the privacy of individual shoppers. This information can be used by merchandisers to evaluate the success of displays and store layouts, which directly impacts customer engagement and sales. When systems are used for and deliver data for purposes beyond security, other departments may be willing to contribute toward the cost of the system. This provides an added benefit by relieving some of the cost burden from security or other operational budgets. Product selection Integration is becoming easier using standards and expanding industry partnerships. However, in some cases, choosing systems from a single vendor that are designed to work together can help to speed and simplify installation, while also reducing system costs for both the integrator and the user. Regardless of the products chosen, it will be important for a retailer with many locations to have consistency in the type of equipment installed at each site. This makes support easier and enables a more uniform response to incidents that happen at various stores. As many retailers already understand, there is no silver bullet to reducing loss. However, a combination of the right technologies working together to prevent shrink and improve investigative capabilities can result in smarter and more effective loss prevention.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defence force. Wireless technology for cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need for more security in K-12 schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging the gap between IT and physical security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT and cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training courses for integrators and partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instil added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new centre in Barcelona (in addition to current R&D centres in Copenhagen and Sofia, Bulgaria). Making camera installation easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the colour of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras with sound detection technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analysing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralise systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine learning engine for crime prevention In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focussed on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyse shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition of IP door intercom company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analogue components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyse what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter security at ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous drone performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 perimeter security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions on drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV licence has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialised system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
A video surveillance system installed by Daemon Fire & Security, based on an AMG Systems-supplied Ethernet switch network, is helping to protect the UK’s first new inland rail freight hub for over a decade: iPort Rail. The iPort project near Doncaster, South Yorkshire, offers 6 million square feet of space across 337 acres. The massive park is already home to enormous distribution facilities for companies like Amazon, CEVA, Fellowes and Lidl, and its occupancy is set to expand in the coming years. The newly developed iPort Rail terminal, located on its own 30-acre site within iPort, is connected to the electrified East Coast Main Line via the South Yorkshire Joint Line. It offers integrated access to iPort, meaning occupiers can directly approach the rail terminal using their own specialist vehicles on the facility’s private roads. Implementing video surveillance system The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System"The terminal can handle up to six trains a day, operating 24-hours, six days a week. Each train can be the maximum UK length of 775m. iPort Rail has an 800m reception siding and two 400m handling sidings, with storage capacity for 1,500 shipping containers. With iPort Rail playing such a crucial role in developer Verdion’s iPort transportation strategy, there was a pressing need to ensure that the terminal has effective ongoing video monitoring. Buckingham Group Contracting Ltd was responsible for the work on iPort Rail, and they worked with CCTV specialist Daemon Fire & Security to implement the video surveillance system for the perimeter of the terminal. Chris Tattersall, Technical Director at Daemon, said the system runs on a redundant fibre optic network. “AMG Systems assisted us with the fibre optic network design.” Tattersall said. “The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System. The cameras are on towers from Altron, and the networking is from AMG.” Cameras for intrusion detection The cameras utilise Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through"There are 32 cameras mounted on 18 towers around the rail terminal site perimeter. Tattersall explained that the cameras are primarily used as detectors to monitor for trespass or intrusion. “The cameras utilise Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through,” he said. “The cameras are monitored live by the 24-hour security team in the site gatehouse. The system is networked using equipment and expertise from AMG Systems. Daemon and AMG designed a failsafe fibre optic ring system together,” Tattersall said. “From the gatehouse there’s a fibre optic cable which goes and loops around every camera tower and goes back to the gatehouse,” he said. “It’s a redundant ring, so if they get a fault or deliberate cut, everything will carry on working. We’re using industrial PoE Ethernet switches in the towers so they can withstand low temperatures, which is particularly important during cold winters in a relatively open site like this.” Operative in extreme temperatures The industrial managed switches are able to operate in temperatures ranging from -40 deg C to 75 deg CThe industrial managed switches, 20 of which were used in this project, are able to operate in temperatures ranging from -40 deg C to 75 deg C and are designed for medium to large network environments to strengthen network connections. AMG Business Development Director Sara Fisher said AMG was thrilled to be involved in this project. “We were delighted to be asked by Daemon to contribute our design and product expertise to help protect this important and growing freight hub,” she said. Daemon’s video surveillance project took around 10 weeks in total, including implementation and commissioning. It was handed over on time and installed on target. Tattersall said the smooth running of the project could be put down to Daemon’s good working relationship with contractor Buckingham, distributor Pro-Vision, networking and transmission expert AMG Systems, and product suppliers Bosch and Altron.
With innovative flair, characteristic Italian design and the quality of its products, Replay has become a leader in jeans and denim-based clothing manufacturers. It recently initiated a security and access control upgrade programme throughout its premises and decided to install solutions from PACOM, a STANLEY Products and Solutions company. Since 1996 Replay has been headquartered in the Italian hilltop town of Asolo in a 25,000m2 reproduction of an early 20th century American industrial building. This acts as the company’s nerve centre, where research and creative development thrive. Secursat has carved a reputation for its ability to design, specify and install integrated and strategic security solutions Since its foundation, Replay’s key strategy has been formed around product vision, expansion into new markets and increasing control of its distribution network. As a result, it is now prominent in all European markets, the Middle East, Asia, America and Africa in over 50 countries, with its wholesale distribution network boasting 3,000 sales outlets with 200 retail stores. Improving security and access control infrastructure Milan based Secursat has carved an enviable reputation for its ability to design, specify and install integrated and strategic security solutions that address existing and predicted threats in compliance with current legislation and regulations. It creates security models based on a client’s requirements that not only are a form of business protection to reduce and prevent risks but, strategically, are an important tool to create value and be a source of competitive advantage. “When Replay first approached us with the idea of improving its security and access control infrastructure, first of all we had to gain a complete understanding of its objectives,” explains Maura Mormile, Secursat. “We always try to utilise any legacy infrastructure where possible, so we needed to find a technology solution that could be integrated with the customer’s equipment as well as being able to draw upon the benefits of our remote monitoring centre. It soon became apparent to us that technology from PACOM would meet all of Replay’s objectives.” GMS enabled IP security solution GMS provides the perfect harmony between interoperability and functionality to ensure that Replay’s specific security needs can be met"PACOM and Secursat have been working closely since the beginning of 2018, after forming a strategic partnership to provide new opportunities for both companies. Secursat is the first systems integrator to be appointed in Italy by PACOM and the Replay project represented the first opportunity for the companies to work together. The solution configured by Secursat was based around PACOM’s pioneering Graphical Management System (GMS), which is engineered to communicate over an internet protocol (IP) network and has technology tailored specifically for multi-site environments. “Although not used extensively in Italy, the benefits of IP are beginning to be more widely understood and will have a dramatic effect on how security and access control systems are specified and installed,” states PACOM’s business development manager, Alfonso Lorenzo. “Our GMS technology draws on over 30 years of experience in developing applications based on a data communications platform, successfully balancing electronic security and IT applications on a single network. GMS provides the perfect harmony between interoperability and functionality to ensure that Replay’s specific security needs can be met, without compromising on quality or operational process.” PACOM 8003 hybrid control panels PACOM 8003 offers up to eight configurable 5 state inputs and 8 outputs comprising 2 relays and 6 open collectors"Alongside the PACOM GMS are the IP based PACOM 8003 next generation hybrid control panels, which incorporate PACOM-Edge technology. By offering advanced security capabilities across Replay’s Ethernet backbone this control panel reduces the need for traditional security cabling. Alfonso Lorenzo adds, “PACOM 8003 offers up to eight configurable 5 state inputs and 8 outputs comprising 2 relays and 6 open collectors. Inputs can be expanded up to 96 and outputs can be expanded up to 40 via the addition of on-board expansion modules and/or remote I/O devices. “PACOM 8003 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. It also satisfies the needs of Replay’s stores that may require access control.” Tracking events in real time Not only did we overcome traditional wiring issues but, thanks to IP, we have faster signal transmission to the remote monitoring centre"The entire installation went incredibly smoothly and was completed with minimal disruption to the stores. Maura Mormile comments, “All our integrators commented on how straightforward the PACOM equipment was to install and configure. Not only did we overcome traditional wiring issues but, thanks to IP, we have faster signal transmission to the remote monitoring centre, which centralises operations in an innovative and simple way. “Furthermore, the use of the GMS means that we are able to track events in real time, have a record of events and can engage in remote management of the entire Replay security and access control infrastructure.” Maura concludes: “The Replay project was not a particularly straightforward one but the combined expertise of Secursat and PACOM ensured a great result. The products are user friendly and, just as importantly, offer a high level of future proofing and expansion possibilities that will optimise security and access control infrastructure for many years to come.”
Hikvision, global provider of innovative security products and solutions, is partnering with Green River, a China-based NGO that promotes and organises environmental protection activities, in particular towards protecting the bar-headed goose, one of the highest-flying birds in the world. The Yangtze River source and Bender Lake in Western China is a natural high-altitude habitat for the wild bar-headed goose. Although this area is a “no-man’s land” at 4,700 meters above sea level, it serves as a haven for rare animal species. Threatened by poachers and theft of their eggs, the number of bar-headed geese in this area once plummeted to about 1,000. In 2012, Green River launched its program to monitor and protect the bar-headed goose, with non-stop monitoring and protection of the birds and the local environment. Hikivison security cameras for wildlife monitoring Earlier this year, Green River began using Hikvision security cameras to monitor and protect bar-headed geese. Dozens of bird observation spots have been set up to implement an all-weather, 24/7 monitoring solution in the high-altitude wilderness. Hikvision has provided video technology that reduces the need for conventional manual patrol as well as the associated negative impact of human activities on bird habitats. Green River uses Hikvision equipment to stream high-definition live video to online audiences, raising awareness about the need to protect all kinds of wildlife, including the bar-headed goose. On December 6, 2018, Green River and Hikvision signed a memorandum of understanding (MoU) to continue their collaboration in 2019. Hikvision will develop customised video cameras to be used in high-altitude habitats of the bar-headed goose. The company will continue to support Green River using advanced image processing, data storage and transmission technology, to ensure the organisation can effectively collect and process wildlife data. All of this serves to secure the biodiversity and sustainability in the Yangtze River source region. Advanced video technology Public welfare and environmental protection are benefiting from high-tech applications around the globe" “Public welfare and environmental protection are benefiting from high-tech applications around the globe. In particular, video technology helps wildlife protection efforts immensely. And Hikvision has the tools as well as the willingness to help,” said Yang Xin, founder and president of Green River. He further added, “Signing this MoU is only a start. In the future, we will collaborate to promote research and conservation, and use new technologies to unveil the beauty of biodiversity.” Environmental protection Hikvision is best known as a provider of security equipment that is used to secure businesses, communities, and families. However, as evidenced by its collaboration with Green River, Hikvision’s security equipment can also be used to protect our natural world. Noting that Hikvision video technology has been used in a number of environmental protection projects, Hikvision senior vice president Cai Changyang said that the company is pleased to promote environmental protection and conservation. “In the past few years, Hikvision has accumulated valuable experience and technical know-how in environmental protection with video technology. We have engaged in the protection programs for pandas, Siberian tigers, and now bar-headed geese. But there is still a long way to go,” said Cai Changyang. “And, we will continue to explore new technologies in the future to make our own contribution to the sustainable development of the world.”
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-site CCTV surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Centre, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Centre, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defence Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defence. High-definition video security to secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfil the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedised Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analogue and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analogue systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP video streaming networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminium and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical relationship with 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centres via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-speed fibre-optic connectivity High-speed fibre-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Immersive Display Solutions, Inc. (IDSI) announced that it has selected the Barco F70 for its advanced dome display project. Using thirteen F70-4K6 projectors per dome and featuring the powerful Barco Pulse electronics processing platform and unique Single Step Processing (SSP) pixel-shifting technology, the integrated solution from IDSI will support high-performance fast jet pilot training. This selection continues the successful relationship which has been built between IDSI and Barco over many years and has produced some of the highest quality display systems in the industry. Barco F70-4K6 display projector The F70-4K6 is a high performance, robust laser-phosphor projector with sealed optics and minimal number of moving components inside. This construction enables rugged performance that ensures stability and predictability over the 60,000-hour lifetime of the product. 4K resolution is achieved using the high bandwidth Barco Pulse electronics platform and the proprietary SSP technology. All this leads to the delivery of exceptionally sharp and detailed dynamic imagery allowing trainees to detect moving objects at long distances and totally immersing them into the perfect simulation experience. The team at IDSI is well-respected throughout the industry for their precision, quality, and low-risk approach to program requirements “Our relationship with Barco is built on performance, support, and trust,” says George Forbes, President and founder of IDSI. “When we decide on which projector to use for a project, we consider much more than the technical performance- which has to be there. We know we can rely on Barco, and that the entire Barco Simulation team from top-down is behind us, and that is a big factor in who we choose to partner with.” IDSI-Barco partnership “The team at IDSI is well-respected throughout the industry for their precision, quality, and low-risk approach to program requirements,” says Dave Fluegeman, VP, Simulation at Barco. “Our teams have always integrated very well, and when there is a seamless approach and singular focus to a project, the likelihood of success is always very high.” Recently IDSI won the ‘Small Business of the Year’ award after careful selection by the MS&T judging panel and votes by the simulation and training industry. The honor was awarded for their way of leveraging human capital, innovation and agility to grow and meet client needs, all while cultivating and growing technical and social influence in the community. The Barco F70-4K6 in turn received an honorable mention as an Outstanding Innovative Product that has positively impacted the client’s ‘way of doing business.’
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative remote monitoring platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilises the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email alerts during equipment failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restoredExplaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behaviour, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote diagnostics and servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorisation check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming key fobs remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless migration to cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realise any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced safety and security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”