Remote video surveillance
Avigilon Corporation, a Motorola Solutions company, announced that it is launching its Avigilon Blue™ platform in the United Kingdom. For Avigilon partners, the Avigilon Blue cloud service platform provides an easy-to-install, cloud-based video security solution with features and capabilities that allows them to remotely monitor and manage more sites with fewer resources. Partners can easily monitor the health of customer sites, update configurations and deploy system updates, all remotel...
Panasonic Business has announced the latest addition to its PTZ camera range at InfoComm 2019, with the brand new AW-UE4 set to enhance the flexibility and usability of filming solutions for AV professionals. AW-UE4 PTZ camera In celebration of the ten year anniversary of Panasonic’s PTZ camera range, the AW-UE4WG/KG has been revealed as the successor to the popular AW-HE2 remote camera, offering upgraded features which include 4K resolution and an ultra-wide viewing angle of 111 degrees...
Matrix aims at increasing the networking opportunities by explaining decision makers the application of latest telecom and security solutions at the International Police Expo. The event organised on 19th and 20th July’19 gathers high level professionals of defence forces and gives them an overview of technologically advanced solutions. From telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for...
ES Broadcast Hire, the company’s broadcast hire division, announces the purchase of a large quantity of Panasonic’s AW-UE150 and AW-HE130 PTZ cameras, for high-end 4K and Full-HD remote production across a range of verticals. The announcement coincides with the company’s ‘4K Fact or Fiction: A Live Production Showcase’ which took place on the 9th May. The Panasonic’s PTZ camera line-up has been recognised as an essential addition to ES Broadcast’s dry h...
Avigilon Corporation, a Motorola Solutions company, has announced that Avigilon Blue, its video security as a service platform, is now available in Australia and New Zealand. Avigilon Blue video SaaS platform Powered by Microsoft Azure, Avigilon Blue is a subscription-managed video security platform featuring self-learning video analytics technology that detects the presence and movement of people and vehicles. When a potentially critical event is detected, the Avigilon Blue platform generates...
Resideo Technologies, Inc. is highlighting its latest offerings at ISC West 2019 for the first time as a standalone company, following its successful spinoff from Honeywell. The security industry will see Resideo’s new home automation platforms, a new security dealer loyalty program and how the companies’ new voice, video and mobile solutions integrate with consumer’s connected lifestyles to give dealers opportunities to expand their businesses. Home security “We are fu...
At ISC West, Bosch will showcase how its offerings deliver value to integrators and end users by enhancing security, improving efficiency, and solving common challenges. Visitors to the booth will see intelligent solutions for vertical markets and new products and services that make systems easier to install and manage. “Gaining efficiency, reducing costs, and increasing profits are challenges for integrators and end users alike," said Brian Wiser, President of Bosch Security and Safety Systems, North America. "With technology that is faster to install and easier to integrate, and services that simplify system management, we're helping integrators serve more customers in less time. Seamless integration and built-in intelligence also combine to empower integrators to create smart, customised solutions that substantially improve security and offer clear business advantages beyond security. As a result, there is significant value for integrators and end users that choose Bosch for their security, safety, and communications needs." Wireless remote commissioning At ISC West, Bosch will launch a new fixed dome camera series with wireless remote commissioning capabilities At ISC West, Bosch will launch a new fixed dome camera series with wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. The FLEXIDOME IP starlight 8000i cameras offer an innovative product concept that enables set-up in only three convenient steps: installing the mounting bracket, connecting the cables, and attaching the camera module. Innovative wireless remote commissioning enables installers to work smarter. Currently, to reach cameras, technicians must repeatedly climb ladders, or a lift needs to be rented. With this new camera series, commissioning can be done wirelessly or remotely with no need for ladders or lifts. A tablet or smartphone with the Bosch Project Assistant app can be used to adjust the pan, tilt, roll, and zoom to set the required field of view without touching the camera or lens. If any changes are required post-installation – to accommodate a different store layout or high-risk area – this can be done remotely to save time, effort, and resources. i Series intelligent IP cameras Bosch’s portfolio of intelligent ‘i’ Series cameras featuring built-in video analytics is also expanding. In addition to the existing IP 4000i, 5000i, 6000i, 7000i, 9000i and new FLEXIDOME IP starlight 8000i cameras, Bosch will preview MIC IP starlight and MIC IP ultra 7100i cameras. These rugged cameras are made with anti-corrosive metal and can function at temperatures ranging from -40 to +140 degrees Fahrenheit. The MIC IP ultra 7100i delivers 4K ultra HD resolution for mission critical applications, such as city and highway surveillance, making them ideal for monitoring highways, bridges, ports, perimeters, and more. A new firmware release for the IP 7000i, 8000i and 9000i cameras will also introduce Camera Trainer functionality to "i" Series cameras with on-board Intelligent Video Analytics. Camera Trainer brings machine learning to Bosch IP cameras, enabling integrators to tailor them to detect the objects and situations that matter most. The ability to identify user-defined objects and situations can be combined with the existing alarm rules and object filters of Intelligent Video Analytics for even more flexibility and accuracy. It substantially improves the level of security for people and property and opens up new possibilities for customised applications. For example, it could be used to separate vehicles clustered in front of traffic lights or to determine how long a vehicle has been parked in a bay. With Camera Trainer, video cameras can be taught to recognise and detect stationary objects or certain situations instead of being triggered by motion alone. Installer Services Portal Bosch will also preview an improved Installer Services Portal to help dealers and integrators better manage security devices, services, and invoices Bosch will also preview an improved Installer Services Portal to help dealers and integrators better manage security devices, services, and invoices. The mobile-ready site offers single sign-on for secure and easy access to Bosch communication services, including cellular data plans for control panel communications and cloud connectivity for remote programming and end user app connectivity. With the portal, dealers and integrators gain enhanced reporting for service billing by device, secure online invoice payment capabilities, and the ability to customise access to technical or billing information by assigning employee roles within an account. In addition, a new Installer Services Portal companion app will make it easier for dealers and integrators to add devices to their portal accounts by simply scanning a product's QR code with the app. Bosch security control panels ISC West attendees will also learn how Bosch security control panels, video systems and analytics, access control, and communications technology work together to deliver increased security, efficient monitoring and control, automated audio announcements, and more. To demonstrate the full power of these solutions, Bosch will simulate a retail store within its booth where visitors can experience how integrated solutions improve overall safety and security, reduce shrink, and help retailers improve merchandising and operations. For example, visitors can see how pressing a cashier station panic button connected to the Bosch G Series Control Panel will display an alarm and video in the Bosch Video Management System (BVMS) as well as trigger the Telex Radio Dispatch system (IP-224) to issue an announcement on store personnel’s two-way radios. In addition, attendees can flip a switch to simulate a fire and experience how the AVIOTEC IP starlight 8000 camera uses video-based fire detection to quickly detect a fire before it spreads, while notifying store personnel. Parking lot video monitoring Attendees will also learn how to improve management of outdoor areas, such as parking lots and loading docks, and to identify high-risk situations Attendees will also learn how to improve management of outdoor areas, such as parking lots and loading docks, and to identify high-risk situations like loitering using security and communications technology. For example, they will see how a camera can be used as a sensor to detect a delivery truck approaching a loading dock bay. The camera can trigger the warehouse's Bosch public address system to issue an audio notification that sends staff to a specific bay to receive the delivery. If the dock door is left open, the Bosch G Series Control Panel will issue an alarm and trigger a different audio notification to prompt staff to close the door. Bosch loudspeakers installed throughout the store, outdoor area, and booth can be used for both announcements and background music. Designed to work together, Bosch systems make it easier for integrators to implement customised solutions that provide significant benefits for their customers. Integrated systems are possible whether customers choose a complete Bosch solution or use software from other providers. Bosch products are compatible with solutions from a range of industry partners.
Growing drone use in populated areas poses significant risks that, without additional safeguards, could result in attacks by malicious entities and exploited for use in cyberattacks, terrorism, crime and invasion of privacy, according to a new research report by Ben-Gurion University of the Negev (BGU) and Fujitsu System Integration Laboratories Ltd. researchers. Computer vision algorithms The first comprehensive study on “Security and Privacy Challenges in the Age of Drones” evaluates 200 academic and industry techniques designed to detect and disable drones flying in both unrestricted and restricted areas. Its findings coincide with the U.S. government proposal to allow civilian drone flights with new security rules that permit deliveries and other commercial uses in populated areas. The researchers demonstrated a new physical method to disable drone’s active tracking functionality To highlight the threat, the researchers demonstrated a new physical method to disable drone’s active tracking functionality, a new technology that was recently introduced by drone manufacturers that is based on computer vision algorithms. Rise in drone-related security incidents “The cutting-edge technology and decreasing drone prices made them accessible to individuals and organisations but has created new threats and recently caused an increase in drone-related incidents,” says Ben Nassi, a Ph.D. student in BGU's Department of Software and Information Systems Engineering (SISE) and a researcher at the BGU Cyber Security Research Center. “There are many difficulties that militaries, police departments, and governments are seeking to overcome, as it is a recognised threat to critical infrastructure, operations, and individuals.” The researchers examined different ways to detect drones in drone-restricted areas including radar, RF Scanners, thermal cameras, sound and hybrids of these methods. However, they believe the biggest challenge is determining the drone’s purpose in non-restricted areas. Drones challenge security and privacy “An open-skies policy that allow drones to fly over populated areas pose a significant challenge in terms of security and privacy within society” says Prof. Yuval Elovici, Ben Nassi’s Ph.D. advisor, who is director of the Deutsche Telekom Innovation Labs@BGU; director of the BGU Cyber Security Research Center, SISE faculty member and the Davide and Irene Sala Chair in Homeland Security Research. The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulationAttackers can also disguise a cyber-attack as legitimate drone pizza delivery by hiding the hardware they use inside the pizza box. “In an unrestricted area, we believe that there is a major scientific gap and definite risks that can be exploited by terrorists to launch a cyber-attack,” Nassi says. “It is inevitable that drones will become more widespread, but we need to recognise that open-skies policy pose multiple risks and that current solutions are unable to solve as a result of a major scientific gap in this area.” Flying drone identification The researchers propose methods that enable flying drone identification as well as registration, which is now a U.S. regulation. This includes dedicated techniques for authenticating drones and their operators. While in their previous study, the researchers demonstrated a new technique to detect a spying drone, new methods to determine the purpose of a nearby drone must be developed.
telent, global UK technology and network services company, has launched a pioneering digital evidence management solution that could potentially save police forces millions of pounds per year. Digital Evidence Management solution telent’s digital evidence management solution is designed to specifically meet the needs of UK police forces Jointly developed with UK-based specialist policing software application provider, Innaxys and in conjunction with emergency services across the country, telent’s digital evidence management solution is designed to specifically meet the needs of UK police forces. It provides 100% UK sovereignty of the storage of digital evidence with all data encrypted and held securely on telent’s Public Services Network (PSN) accredited and UK-based cloud platform. Addressing the increase in digital evidence, such as CCTV footage, photos and videos recorded by the public, and body camera and dashcam clips, the solution will significantly reduce the time officers spend physically collecting CCTV images and enable faster analysis and processing of evidence. Police forces will also be able to securely share evidence with the criminal justice system to ensure evidence cannot be misplaced, lost or damaged, reducing court case adjournments and delays. Telent - Innaxys collaboration A proof of concept has already been successfully delivered, with the first live deployment currently in the final stages of user acceptance testing ahead of its planned go live date later this year. While specific cost savings will be proportional to the size of individual police forces, a medium sized force has estimated that the solution will save 2,100 officer shifts per annum. The same force also believes a 50% reduction in court case adjournments can be achieved through the solution’s secure sharing of digital evidence. “Jointly with Innaxys we have developed this solution in consultation with UK police forces specifically to address the challenges faced by officers collecting data in the modern policing age where there has been a huge increase in public and business CCTV use,” said Barry Zielinski, General Manager Public Safety & Defence at telent. “This is combined with a proliferation of smartphones, dash cams, social media and body worn cameras, creating both opportunities and challenges for policing. This solution helps officers efficiently collect, manage, store and share these new digital evidence sources. It will save officer time collecting images, reduce court case adjournments and ensure the security of digital evidence by eliminating the risk of it being destroyed, tampered with, lost or even left in public places.” Proliferation of digital evidence telent’s solution follows the CoPaCC/Police ICT User Perspectives 2018 report, which is based on a survey across UK police forces telent’s solution follows the CoPaCC/Police ICT User Perspectives 2018 report, which is based on a survey across UK police forces. This research highlights concerns regarding the management of digital evidence, stating that urgent action is required to manage the proliferation of digital evidence and replace current time consuming and insecure processes. The solution is available via a national police procurement framework and forces which choose to use the solution will be provided with management options for each digital asset or piece of evidence, including who has access, how long they have access, and what metadata about the evidence is shared. When collecting evidence from members of the public, the force can email a link which lets people securely upload their footage from anywhere with an Internet connection. Integration with Digital Evidence Transfer System (DETS) The solution also integrates directly with the Digital Evidence Transfer System (DETS) which will link police forces to the criminal justice system. DETS was also developed by Innaxys and is currently being trialed by the Home Office in conjunction with five police forces across the UK. It is expected to be mandated by the Home Office for use by all police forces in 2020. Jean-Claude Lafontaine, CEO at Innaxys, said: “Through the digital evidence management solution, the time and cost of collecting evidence from the public is massively reduced. Such a system will become more and more necessary in the future, as digital evidence continues to grow, and officer resources are put under increasing strain.” Faster processing, sharing of digital evidence Additional key benefits of telent’s digital evidence management solution include faster processing and sharing of digital evidence Additional key benefits of telent’s digital evidence management solution include faster processing and sharing of digital evidence with suspects which will reduce “no comment” interviews and ensure criminals are brought to justice faster. Providing more efficient analysis and management of digital assets is particularly important for larger and complex investigations. Simple crowd sourcing of phone and dash cam images for both minor incidents and major terrorism incidents will also be made possible, while police forces’ reputation will be protected due to the solution eliminating the risk of digital evidence being destroyed, tampered with, lost or left in public places. “In the context of legacy IT systems, budget cuts and increasing demand for frontline policing, this solution is exactly what’s required to ensure that the UK’s police forces have a cost-effective solution that will them see them well into the future and supplement the incredible work that they do,” added Barry Zielinski at telent.
Luxul, globally renowned innovator of IP networking solutions for security integrators, has announced its technology lineup for ISC West 2019, taking place April 10-12 at the Sands Expo in Las Vegas. In Legrand | AV's booth 29098, Luxul will exhibit PoE Self-Healing, managed Gigabit switches; award-winning routers with integrated Domotz remote management technology; the company's next-generation wireless controller; "Good, Better, Best" dual-band wireless access points (APs); and the new Easy Setup App. Switches, wireless APs "Today's security solutions are only as good as the networks they are built on, so integrators can't afford anything less than exceptional performance from all components — from switches to wireless APs," said Keith Ebert, director of channel sales at Legrand | AV – Luxul. "For our lineup at ISC West, meeting this requirement is only the beginning. Visitors to our booth will see advanced features that dramatically simplify installations, lower costs, and deliver the ultimate customer experience, all while laying the groundwork for RMR programs to increase revenue." At ISC West 2019, Luxul-managed Gigabit switches featuring Self-Healing capability will include the 18-port/16 PoE+ L2/L3 AMS-1816P and 12-port/8 PoE+ XMS-1208P At ISC West 2019, Luxul-managed Gigabit switches featuring Self-Healing capability will include the 18-port/16 PoE+ L2/L3 AMS-1816P and 12-port/8 PoE+ XMS-1208P. The units empower security integrators with two advanced features: Auto-Recovery and Power Scheduling. With Auto-Recovery, devices connected to the switches by PoE no longer need to be manually rebooted when they fall offline or become unresponsive. The configuration in the switch triggers them to reboot automatically. With Power Scheduling, integrators can now trigger the switches to power PoE-connected devices on or off based on any schedule they create within the switch. Luxul Epic Series wireless/wired routers Luxul routers on display will include the company's Epic Series, which consists of the dual-band wireless AC3100 Epic 3, wired multi-WAN Epic 4, and wired dual-WAN Epic 5. The routers' onboard Domotz technology sends security integrators alerts when network issues arise — allowing them to take immediate action — and also share device information with Luxul's support team for swift and easy troubleshooting. In addition, Domotz remote management provides security integrators with a foundation to establish added-value recurring monthly revenue (RMR) programs or offer a complement to existing camera monitoring programs. Also, on display will be the next-generation XWC-2000 wireless controller, which delivers twice the capacity of its predecessor with support for up to 32 Aps. Each AP can be configured for a designated wireless channel in addition to supporting individual wireless transmit power adjustment. Newly deployed APs are now automatically added for plug-and-play installation, and Luxul's Roam Assist technology, built into the wireless controller, ensures that mobile devices are always connected to the best AP for the highest performance. Wireless Apex APs for security systems Luxul will highlight a "Good, Better, and Best" offering of wireless Apex APs for security systems Luxul will highlight a "Good, Better, and Best" offering of wireless Apex APs for security systems. For smaller networks where budgets are a concern, Luxul's "Good" XAP-810 is a cost-effective wireless AP offering 802.11ac 2x2 dual-band technology and 5GHz beamforming for data rates up to 1200Mbps. The "Better" XAP-1510 features 802.11ac 3x3 dual-band technology and 2.4 and 5GHz beamforming for data rates up to 1900Mbps throughout a facility. The "Best" XAP-1610 features advanced 4x4 MU-MIMO (802.11ac Wave 2) technology and 2.4 and 5GHz beamforming for data rates up to 3167Mbps. The AP is designed to enhance transmission and reception performance, producing higher throughput when experiencing medium to weak signals within the effective range. Now available as a free download from the Apple and Android stores, Luxul's Easy Setup App, which allows integrators to install a Luxul wireless router and up to two wireless APs at the same time, from the convenience of a mobile phone, will be on display. The simple-to-use app not only speeds up installations but ensures the network infrastructure is installed with the appropriate settings and the latest firmware. The result is lower costs for integrators and their customers and a seamless wireless network that provides outstanding performance.
Custom Consoles reports a successful and well-attended the Security & Counter Terror Expo (SCTX) 2019 show, held at the London Olympia exhibition centre March 5th-6th. The company exhibited its SteelBase range of control room and the latest version of the MediaWall monitor mounting system. Technical control applications "Increasing use of remote cameras throughout the security and process control industries has generated greater than ever demand for multi-screen video displays," says Sales Manager Gary Fuller. "We expanded our exhibit floor space this year to accommodate an example of MediaWall and a SteelBase Lite desk in a classic CCTV supervision configuration. This attracted a lot of interest from visitors in the defence and corporate security sectors." MediaWall is an ideal way to mount multiple flat-panel video display screens in any combination of sizes" "There was a big focus at this year's show on the use of drones as aerial surveillance platforms. These generate even more video content which needs to be studied live or after the event. MediaWall is an ideal way to mount multiple flat-panel video display screens in any combination of sizes for side-by-side comparison of live or stored security feeds from any source. Originally developed for the broadcast industry, MediaWall has proved highly successful for technical control applications in security and process monitoring." MediaWall and flat-screen monitor displays Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. It can be used as a fully self-supporting structure or coupled directly to a studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel itself. Ergonomic efficiency All wiring between components mounted on MediaWall is fully concealed and can enter or leave the structure at any desired point. Redesigned lateral support beams in the latest version allow display panels to be mounted even more easily than before. Redesigned lateral support beams in the latest version allow display panels to be mounted even more easilyCable management is in stronger and more attractively styled steel ducts rather than plastic. The supporting leg sides are now black instead of silver, matching the latest Custom Consoles Module-R desk styles. Media Wall is available in any specified element widths. Built to withstand the wear and tear of the utilities and marine industries, SteelBase Lite desks are designed to ensure ergonomic efficiency particularly during a long working shift. The desks are attractively styled and built on extremely robust steel base frames with desktops surfaced in a choice of hard-wearing laminate or Marmoleum. SteelBase Lite range features Additional design features of the SteelBase Lite range include hinged removable access doors, 19 inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. SteelBase-Lite is designed to conform to ISO9241 part 5, ISO11064 Part 4 and EN527 Parts 1, 2 and 3 All elements of the desks are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO9241 part 5, ISO11064 Part 4 and EN527 Parts 1, 2 and 3. ISO 9001 certified manufacturer Custom Consoles Ltd is an ISO 9001 certified manufacturer of project-specific and modular broadcast, process-control and security furniture. Its product range includes motorised, manually-adjustable and fixed-height units plus fan-cooled sound-insulated equipment housings. The company operates from a 1,200 square metre UK-based production facility equipped with 3D computer-aided-design facilities, computer-controlled cutting machinery and a thermoform press. These resources provide the dual benefits of precise quality control and prompt delivery times, typically 21 days from receipt of order. Custom Consoles' clients include governmental and corporate organisations in Europe, the Middle East, Asia and Australasia.
RISCO Group, globally renowned intruder alarm and security solutions provider has launched a new wireless product designed to deliver an enhanced performance for UK installations. The Agility 4 is a wireless, modular and multi-layered security systemAgility 4 multi-layered security system The Agility 4 is a wireless, modular and multi-layered security system which includes a new range of accessories available immediately with more add-ons expected to follow. With an enhanced choice of communication modules, ranging from IP to 3G, the new solution is designed to provide an adaptable solution for any type of installation and monitoring. Multi-socket communication modules enable parallel reporting to the cloud and monitoring stations with multiple IP addresses using one communication module. Enhanced intrusion detection Detecting intruders outside, before they enter the property was a key challenge as the risk of false alarms has historically been an issue in new security systems. This was a significant design consideration in respect of the design of the new Agility4 system with the inclusion of the new Beyond Wireless DT outdoor detector. Beyond Wireless leverages cutting-edge outdoor detection technologies and algorithms based on four detection channels. It is widely regarded as one of the most secure wireless outdoor detectors in the industry. The multi-layered protection includes cover tamper, active IR Anti-Mask and an accelerometer-based shock sensor. If force is applied to the detector, the shock sensor generates a tamper alert to the panel. Indoor and outdoor camera detectors RISCO Group has now developed both indoor and outdoor camera detectors for alarm verification with new features RISCO Group has now developed both indoor and outdoor camera detectors for alarm verification with new features including Agility 4’s ability to receive a short clip of the event alongside a series of snapshots through an integrated camera. Upon detection, the camera is triggered automatically with snapshots and video clips available to the end user and the monitoring station simultaneously; all of which can be enabled by an installer using RISCO Cloud, the manufacturer’s remote, cloud-based system. Remote, cloud-based wireless system The complimentary range of new accessories include a contemporary keypad, a compact key fob and award-winning BWare detector now available as wireless. A Beyond Wireless DT detector camera will also be released in the forthcoming months, along with a discreet PIR detector and contemporary indoor sounder. Commenting on the launch, Ian Stones, head of sales for RISCO UK: “For a long time, RISCO has led the way for cloud-based wireless intruder system technology. Agility 4 moves this on a step further with significantly enhanced technology and improved aesthetics demanded by today’s end user customer.”
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance of ease of installation Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable and can be very expensive. In some cases, the cost of labour to install a camera can be more than the cost of the camera! If labour costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labour in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labour cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying installation of cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement through modular cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilise magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular cameras offer flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analogue video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software programs help in enhancing installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
By now your organisation should know the drill. To keep your enterprise safe from unauthorised access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect against burst attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioural DDoS protection system that utilises machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise network infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide sensitive web pages from search engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update passwords on your IoT devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use encryption to protect data in transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall video footage. Active archive strategy These challenges are thrusting storage tiers to the forefront of system design. Storage tiers in video surveillance had previously meant simply using a separate archive or attaching add-on capacity directly to network video recorders. Many of the new storage options designed for video surveillance are pulling together different storage tiers into a single storage architecture Many of the new storage options designed for video surveillance are pulling together different storage tiers (and in some cases storage media) into a single storage architecture, such as an active archive solution. This balance can be achieved with an active archive strategy that automates migration of data between different storage types, to ensure the data is on the correct storage type at the correct time to meet performance and retention requirements without blowing the budget. This approach also ensures ease of access while automatically moving content from more expensive tiers of storage to more cost-effective long-term tiers of storage. This allows for greater efficiencies in how recorded footage is treated throughout its lifecycle. In some cases, it includes moving data from edge devices to centralised storage, and then to the public cloud. Scalable video storage solutions As storage demands have increased, video management vendors have turned to storage specialists for solutions that can accommodate large numbers of high-resolution video files, metadata associated with the footage for easy searching, along with much needed scalable solutions. In terms of video management software, this means the integration of video content from different storage types, tiers and physical locations is required, and which considers the performance profile of each storage type. With an active archive solution, video content is searchable and accessible directly by the end users regardless of where it is stored. Deploying an active archive solution enables surveillance users to reduce the complexity and costs of managing data for long term retention As seen in many product categories, camera and storage vendors continue to provide extremely competitive offerings. But, storage-specific solutions for video surveillance have lagged behind the roadmaps for video equipment and, as more and more cameras have entered the market, less attention has been placed on video storage capacities. Tiered storage strategy The surveillance industry has evolved considerably from the days of the 8mm video recorder; however, enterprise storage solutions will be forced to evolve further to cope with changing storage retention requirements. Video storage is quickly becoming one of the most expensive parts in a surveillance solution, but there is hope. Deploying an active archive solution will enable surveillance users to reduce the complexity and costs of managing from terabytes to petabytes of data for long term retention. By finding a storage solution that delivers the ability to implement a tiered storage strategy, users can adhere to regulation requirements to retain video footage and meet their safety and security objectives, while also significantly reducing storage costs and operational expenses.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs and autonomous systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact surveillance radar (CSR) system SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace security and drone tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialised in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilising novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The future of drones in the security and safety industry is sooner than you think. Tyco Integrated Security and Percepto offered a glimpse of that future at ASIS 2016: Autonomous drones that can patrol a perimeter 24 hours a day, seven days a week, managed remotely and able to perform multiple tasks on-site. The technology was developed by Israeli-based Percepto, based on innovation with roots in the Israeli military. Percepto has sharpened its focus on computer vision and applied it to allow drones to fly autonomously, using global positioning systems (GPS), vision sensors and algorithms to constantly analyse what the drone “sees” through an on-board camera. The system can work with any camera that provides an adequate image for real-time vision algorithms. Perimeter security at ASIS Tyco Integrated Security invited Percepto to display its technology in the large integrator’s booth at ASIS. “It was the first show where we targeted perimeter security,” says Ariel Avitan, Percepto’s Chief Commercial Officer. “Tyco took us under their wing. We had about 100 conversations at the show. After about 10 minutes everyone understands the business logic behind the solution. You have to talk to the end users to understand that your concept is validated.” Percepto is in the contractingphase with TycoIS and alsohas a number of other pilotprojects, including energycompanies in Europe TycoIS is also working with Percepto on several pilot projects to demonstrate and fine-tune the technology. Percepto is in the contracting phase with TycoIS and also has a number of other pilot projects, including energy companies in Europe. “Our challenge is robustness,” says Avitan. “The technology is trustworthy. We just need to make sure the system is. And the industry needs to identify applications where we can provide more value.” Autonomous drone performance Percepto’s products include a hardware base station to control the drones, and the PerceptoCore module is installed on board the drone to allow it to interface with the base station. The core is pre-loaded with multiple task applications that enable the drone to perform tasks relevant to its purpose – autonomously. The “core” can be installed on almost any size or type of drone, whatever the manufacturer. In addition, Percepto provides an interface that integrates with existing systems in the security department’s control room. Cloud management software enables remote access and management of multiple drones. The software collects, analyses and presents data, while streaming live video on an ongoing basis. Perimeter security is just one application where drones will be deployed in the near future. Having a drone stationed on-site, charged and protected by its hub, enables fast reaction to any need in the field, day or night. Additional sensors and other equipment can be added to drones to detect gas leaks, thermal energy, or smoke, and even to provide life safety capabilities. Lighted drones with voice messaging could be used to direct employees or the public to the best exit route in case of a mass evacuation. 24/7 perimeter security Using drones to patrol 24/7 addresses the needs of perimeter security. Adding more sensors and providing additional data to operators helps expand the system’s utility and increase return on investment (ROI), says Avitan. “These applications are a tremendous benefit for security,” he says. “We actually find that adding safety and inspection applications is a good way to increase security. When you have a drone that knows how to provide ROI, it saves tons of money. It’s always about security, but above that we want to add value and increase ROI.” In addition to perimetersecurity, drones will soonbe used to inspect thethousands of solar panelsat solar energy sites In addition to perimeter security, drones will soon be used to inspect the thousands of solar panels at solar energy sites. Drones with cameras can detect the presence of dust or other factors that lower solar-panel efficiency, or cracks or malfunction of the actual panels. Thermal imaging on board a drone can detect which panels are under-performing. Drones could also be used to provide alerts if a transformer or cabling overheats in a power plant or critical infrastructure application. Restrictions on drones The U.S. Federal Aviation Commission is evolving its position on autonomous drones. Drones are restricted from populated areas, can only fly at certain altitudes, and must be equipped with lights if flying at night. Currently, applications require that there be an unmanned autonomous vehicle (UAV) pilot on site, maintaining “line of sight” with the drone, who can take control if needed. However, the requirement for the UAV licence has been lowered to allow certification with an online course. There have also been some exemptions granted for the line-of-sight requirement (e.g., railroad inspections). “We include control mechanisms now to be compliant, and when the barriers come down, we are ready for that,” says Avitan. Many global jurisdictions are following the FAA’s lead, although some countries do not regulate drone traffic. Avitan says he expects regulators to allow drones to fly autonomously beyond line of sight in specific closed facilities in the next 12 months. Based on the pilot projects, Percepto will fine-tune the system, streamline manufacturing and launch a fully commercialised system by Q1 2017. Avitan expects to have up to 100 units deployed in 2017, and up to 1,000 units deployed in the next 18 to 24 months. Like I said: Sooner than you think.
Video surveillance is used for more than just safety and security: users are discovering that high-resolution images and user-friendly features make surveillance cameras a valuable asset for all sorts of applications. A cattle ranch in Manatee County, Florida found that a Dahua PTZ was the perfect way to observe eagles without disturbing their habitat. Dahua PTZ cameras When Hurricane Irma pummeled Florida in 2017, Victoria and Nicholas, a pair of American bald eagles, watched their nest get destroyed. Undeterred, they began building a new nest in a tree right next to the old one. The ranchers on whose property the eagles lived were so inspired by this show of dedication that they decided to install cameras nearby to share the eagles’ story with the world. They reached out to Jens Buff, security consultant with Rapid Security Solutions, for support, and he contacted Dahua. Dahua donated a 4MP 30x IP PTZ, which was mounted to a tree in order to observe the nest up close. Dahua donated a 4MP 30x IP PTZ, which was mounted to a tree in order to observe the nest up close But disaster struck yet again! In 2018 “an unnamed storm, unexpected and unseasonable, blew through our area with pounding rain and ferocious winds,” stated the Eagle Country YouTube page. “Sadly, the eagles’ nest was blown to the ground in pieces again! We wondered if they would relocate, but this was Nicholas and Victoria. The very next day they began to rebuild. The cameras we placed after Irma were not destroyed and we are able to watch this incredible story continue.” Smart IR and day/night surveillance Dozens of YouTube videos, as well as a live feed, give viewers a rare glimpse into the day-to-day lives of these majestic birds. Whether they’re incubating eggs, eating dinner, cleaning house, or fending off intruders, their activities are captured in clear video both day and night. The camera’s true day/night IR cut filter and Smart IR allow for crisp nighttime images without “whitening out” as the eagles get close to the camera. True WDR preserves the image in the direct sunlight that’s unavoidable at the top of a tree in the Sunshine State. The easy-to-use PTZ features let the ranchers follow the eagle’s actions without bothering them by manually repositioning the camera. “Dahua’s PTZ was the perfect choice to view one of life’s most beautiful creations living in nature,” Mr. Buff remarked.
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customised security solution and integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customised security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular alarm system Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
Dundee’s rejuvenated waterfront has breathed new life into the city, and not far from the new V&A Museum building is Foxlake Dundee, an exciting new water sports facility. Taking advantage of the regenerated docks area, Foxlake Dundee offers cable wakeboarding – where boarders are propelled by an electric cable rather than a boat – paddle boarding and Scotland’s first urban Aqua Park. Hikvision thermal video solution Foxlake Dundee was the second Foxlake water park to open, following the very successful adventure park in Dunbar, East Lothian, on the Scottish coast. The Dundee facility, which opened fully in summer 2018, includes a large floating assault course, which has proven hugely popular with visitors, featuring huge obstacles, slides and rafts, and a giant 3.5m inflatable tower known as ‘the Mountain’. Unfortunately, due to its city centre location, the assault course and the wider facility was likely to be something of a magnet for unauthorised activity, primarily of the inebriated variety, explains Zak Hegarty, Foxlake Dundee’s manager. “Because of our location, right in the heart of Dundee city centre, we’re quite near a lot of pubs,” Hegarty adds. “And sometimes a 3.5m floating inflatable tower looks pretty inviting to someone with a quantity of ale in their system – it looks like an irresistible challenge.” Remote HD CCTV monitoringI introduced myself as I saw they were opening and was invited initially to look at a CCTV system" The concern was that accidental or deliberate damage or vandalism to the equipment was a real risk – and along with that came the danger of injury or worse to those attempting to exploit the park, at night, in the dark, unsupervised on the water. Hegarty’s first instinct was to investigate the option of manned guarding: having a security officer on-site during those out of hours periods overnight when the facility was at its most vulnerable. But an approach from Brian Davidson of Webster Security & Fire was to change his mind. Davidson had noticed the development in the docklands with interest. He approached Hegarty to see if Webster Security & Fire might be able to help with securing the site. “I introduced myself as I saw they were opening and was invited initially to look at a CCTV system,” Davidson says. “This then blossomed during further conversations into a proactive, remotely monitored CCTV solution. They were looking at going down the route of employing manned guarding for when the site was closed, but we thought this would provide a cost-effective and workable solution that offered the same level of protection.” GJD motion detectors The challenges presented by the Foxlake Dundee site were not insignificant. The system needed to be remotely monitored and based on some form of movement detection – on a site which itself was constantly moving, due to the changing tidal water levels. Davidson and Webster Security & Fire got in touch with Hikvision in Scotland and together they designed a solution to meet all of Foxlake’s needs. The centrepiece of the system proposed by Davidson and Webster Security & Fire was the use of Hikvision thermal cameras to detect activity on the jetties. This is complemented by the use of GJD motion detectors and Hikvision cameras to pick up movement on approach areas, further Hikvision cameras which monitor the internal office reception areas, and additional Hikvision cameras providing a security, health and safety and management overview of the both the assault course and the paddle and wakeboarding facility areas. A public address tannoy system is also connected to the surveillance solution. Hikvision thermal bullet cameras The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view The Hikvision thermal bullet cameras highlight areas of heat difference in the field of view – so a human body is always visible as hotter than its surroundings, particularly in a marine or waterfront environment. Hikvision’s thermal cameras also utilise behaviour analysis technology, so figures moving into specific zones in the image can automatically generate alarms. The advantage of thermal cameras for a water-based site like Foxlake is that they can operate in all weather conditions – they’re not impeded by fog, mist, heavy rain, snow or other environmental factors, the sorts of conditions which could severely impede even the most advanced of conventional cameras. Hikvision 8-channel DeepinMind NVRs The other cameras in the Foxlake Dundee system benefit from Hikvision’s Darkfighter technology, allowing for video monitoring and recording in even the lowest of light conditions. And the whole solution records to a Hikvision 8-channel DeepinMind network video recorder, which utilises powerful AI technology to learn to filter out false alarms and accurately raise alerts. In the evening, after normal operating hours, the site is locked up and alarms are set. It’s then remotely monitored by the Corps of Commissioners, who are alerted when the thermal cameras or motion detectors pick up any movement on the site. Operators check the live cameras to confirm that intrusion has occurred. If an intruder is detected, they immediately contact Foxlake management via phone, and are also able to contact police if required. At the same time, the Corps operatives can use the PA system to issue warning announcements to allow the intruders to know they are being monitored. The effect is almost instantaneous, Hegarty says. Enhanced intrusion detectionThe overall reception for the video surveillance solution has been extremely positive “We’ve had three incidents since the system was installed,” he says, “and the response by the intruders is pretty remarkable. I’ve reviewed the footage and compared it to the time notification I’ve received a missed call on my phone: you can see the intruder on the video footage hear the warning, and then they’re off. They just leave straight away. It’s amazingly effective.” The overall reception for the video surveillance solution has been extremely positive. “We’re really happy with the system,” Hegarty says. “The video footage quality is very high and we’re glad we haven’t had to go down the manned guarding route, as similar facilities have done. We appreciate that Webster and Hikvision took the time and thought to design something that would work for us in our specific circumstances. Of course, the proof is in the performance, and the fact that a number of intruders have been quickly and effectively warned away is evidence that it is doing the job it was designed for.”
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner has announced that the Kentucky School Boards Association (KSBA) is delighted with their recently-upgraded 3xLOGIC video surveillance system, installed and monitored by Sonitrol of Lexington. 3xLOGIC - Sonitrol collaboration The Kentucky School Boards Association was established in 1936 and represents 863 school board members from across the state to provide training, services, and collegiality to aid in the effort of providing the best education possible for public school students across Kentucky. KSBA is a long-time Sonitrol of Lexington customer, going on 25 years. Hence, Sonitrol and Danny Goodpaster, Security Consultant, were well positioned to understand KSBA’s situation and recommend the solution best suited for their needs. “About three years ago, during the budgeting process, we had an incident in our parking lot in which there was a minor fender bender,” related Jeff Million, Print Shop and Operations Manager for KSBA. “The camera watching the parking lot was only 30 feet away, but I could not even make out identifying writing on the car that struck the other car. On another occasion, we had a break-in and from three feet away I could not make a positive ID on the perpetrator. After these incidents, things got rolling and we soon embarked on upgrading our video surveillance capabilities.” Full HD IP video surveillance solution The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detectionGoodpaster wrote the first upgrade proposal in 2016. After some discussion about installing a hybrid DVR, KSBA at Goodpaster’s urging decided to remove the analog cameras and go full IP. Now, the organisation has four static cameras and two 3xLOGIC multi-sensor devices, trained on the front door and the back door, loading dock, and parking lot. The multi-sensor device is a camera with a unique set of capabilities, it is also equipped with impact-activated audio, glass break, and motion detection along with video and audio verification of alarm activations. The multi-sensors are connected to an updated Sonitrol panel and they provide video feeds, as well as glass break and audio verification for both entrances. “With our former system, I’d get the first call on alarm, but often I did not have enough video information to make an informed decision. Now, I have the data and the images I need to deal quickly with any situation,” said Million. Goodpaster recalled that there was a lot of competition for this business—'KSBA really did their homework.’ At the end of the day, it was the multi-sensor’s video and audio verification that provided KSBA with real, tangible benefits they could feel. Further, between the Sonitrol app and VIGIL Client software installed on Million’s laptop, KSBA now has a fully-integrated solution, as opposed to the two separate systems they had before. The four non-monitored cameras are overseen by 3xLOGIC VIGIL Central Management software (VCM), so if any equipment issues arise, Sonitrol knows immediately and can act to proactively solve them. Multi-sensor devices The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it"As noted earlier, the Multi-sensor devices monitor the front and back entrances, as well as the parking lot. The other four 3xLOGIC cameras are trained on the front door reception area and down the hallways away from the front and back entrances, to provide visibility on where any visitor or employee is going. These cameras are viewed live and used for incident review. The receptionist at the front desk has a dual screen that shows her the approach to the building and who is coming through the door before that person reaches her desk—this creates full situational awareness and keeps the receptionist safe. “We really do like our new cameras, and we are light years ahead of where we were as far as quality and ease of use with the 3xLOGIC system,” said Million. “We now have video verification capabilities. Before I’d get a phone call, while away from the office, providing video images but I couldn’t make anything out. I’d have to head home to view the video and I still didn’t have sufficient resolution to make out what was happening. The new cameras also provide a better field of view, I’m picking up my entire parking lot, before I could only see half of it.” IP HD cameras Million continued, “Recently, we had a forced entry attempt on the front door, and we went to the video. We could immediately resolve what had happened—that’s real peace of mind. We have to make quick decisions, and in the event of a real incident, we’re shaving at least 10 minutes off of police response times. Million can view all six cameras on his mobile app. We don’t want to call on false alarms, we want to make certain. Now we can and the video quality is about 10 times better.”
Located southeast of Los Angeles, California, the City of Whittier hosts a water pumping utility installation that provides water to the businesses and residents of the surrounding Gateway Cities Region. In recent years, the installation routinely suffered attacks by vandals and looters, resulting in regular defacement with graffiti and the theft of copper components from pumping stations. This caused interruptions in service to businesses and residents across the surrounding cities. To ensure the security of the water installation and avoid public health and safety concerns, the City of Whittier turned to a virtual guarding solution from iNet Security LLC. iNet Security leveraged comprehensive monitoring from the Surveillance Acquisition Response Center (SARC), powered in part by IDIS technology, for a high-performance video surveillance solution that has already shown powerful results. Enhancing multi-site security and safety The City of Whittier turned to a virtual guarding solution from iNet Security LLC With the health and safety of the City of Whittier and its surrounding region potentially at risk, it was essential that any security solution deployed by the city be dependable, effective, and capable of low-maintenance 24/7 monitoring. The system also required ease of remote use as the installation is located in a remote wildlife preservation area far from the city center. Any surveillance solution had to: Secure multiple locations within a remote wilderness location Manage authorised access to installation premises Maximise security of the installation with encryption speeds capable of constant live monitoring Provide compatibility and integrate seamlessly with SARC virtual guarding systems Enable the coordination of live responses to security events Feature intuitive software that is easy for users to operate and master. Representatives of the City of Whittier reviewed systems from several manufacturers before they determined that the virtual guarding solution from iNet Security, powered in part by IDIS, would best meet their requirements. DirectCX technology and Center VMS The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology SARC and the City of Whittier leveraged technology from the high-performance and cost-effective IDIS DirectCX solution and IDIS Center video management software (VMS) to meet their remote monitoring needs. The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology. IDIS incorporated its expertise in image processing to provide unrivaled HD recording performance at an affordable price point for the responsibly cost-conscious City of Whittier. Designed for simplicity, convenience, and performance, the DirectCX technology and the powerful, full-featured IDIS Center VMS incorporated by iNet Security have proved to be optimal components of the comprehensive solution, meeting the challenges faced by the City of Whittier. IDIS HD-TVI DVR The most powerful IDIS HD-TVI DVR, the TR-4116 16 Channel Full HD Recorder, offers: Support for HD-TVI, 960H, and analog cameras Up to 480ips Full HD recording Full HD display with HDMI and VGA output Support for CVBS spot monitor Long distance transmission over coaxial cable Support for HD-TVI camera OSD control over coaxial cable Expansion up to 32TB using 4 SATA interfaces and 1 eSATA storage interface One click network configuration using IDIS For Every Network (FEN) service Dependable security environment IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations In partnership with iNet Security and SARC, IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations. Within the first week of installation, a group of vandals was caught attempting to fault the installation fence and was successfully deterred remotely using SARC’s remote “voice-down” protocol. In a dramatic security and safety success, the system was used to coordinate a fast and effective response to two isolated fires as well as a dangerous wildfire that threatened both the utility and surrounding wildlife. SARC operatives utilised IDIS technology, in part, to accurately and quickly guide first-responders through the remote wilderness to the site of the fires, minimising damage and risk to the surrounding areas. Thanks to the power and performance provided by the iNet Security solution, including IDIS DirectCX technology, the City of Whittier is benefiting from: Low total cost of ownership Unparalleled ease of use through the IDIS Center VMS Complete dependability of system components Lower system maintenance requirements A scalable solution to allow for expansion to additional installation sites
March Networks, a global provider of video security and video-based business intelligence, is pleased to announce that one of Qatar’s top banks is deploying the company’s business intelligence software and integrated analytics to improve customer service and operations. The customer is one of six Qatari financial institutions currently using March Networks systems for advanced video surveillance and fraud prevention. The bank is already using an end-to-end March Networks video recording and management solution in all of its Qatari retail banking branches, hundreds of ATMs, and multiple corporate facilities. It is expanding that solution with Searchlight for Banking software to deliver an enhanced customer experience and strengthen its fraud investigation capabilities. Detecting suspicious transactions The software helps banks evaluate and improve customer service using dwell time, queue length and people counting analyticsMarch Networks Searchlight for Banking combines surveillance video with ATM/teller transaction data and analytics to deliver powerful fraud-fighting tools, such as the ability to rapidly detect suspicious transactions and potential cases of ATM skimming. The software also helps banks evaluate and improve customer service using dwell time, queue length and people counting analytics. The bank started using March Networks several years ago to ensure compliance with CCTV legislation first introduced by the Qatari Ministry of Interior (MOI) in 2011. The law mandates that all banks equip their locations with IP video surveillance, record at a minimum 3-megapixel resolution and 20 frames per second, and ensure 120 days of video storage. The bank, which was using an analogue video surveillance system at the time, needed an enterprise-class video solution that could meet the MOI regulation. It was also looking for a solution that offered remote video management, system health monitoring, and the ability to scale easily to accommodate future growth. Command Enterprise video management software March Networks products have proven highly reliable and are able to meet the parameters set by the Qatar Ministry of Interior regulations"When the project went to tender, only the March Networks solution performed to all of the bank’s criteria, said its group safety and security manager. “With the March Networks system, we are able to fully comply with the law. The usability and health monitoring features of the Command Enterprise video management software are also excellent, enabling us to investigate and resolve potential system issues before they become critical.” According to ISC Group Gulf, a systems integrator in Qatar with a specialised focus and expertise in the banking sector, the March Networks solution is the best choice for banks in the region. “March Networks products have proven highly reliable and are able to meet – and often exceed – the parameters set by the Qatar Ministry of Interior regulations, as our organisation has seen in our work with most of the country’s major financial brands,” said Cristian Ivan Nicolae, Project Manager, ISC Group Gulf. CCTV products for banking environments We are fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks"“In addition, March Networks offers the sole CCTV products in Qatar purpose-built for banking environments, which means you are getting a secure, highly-professional solution that is easy to scale in complexity.” “We are proud of our long-standing partnership with this Qatari bank. It is a leader in the use of innovative video technologies, and clearly understands the value intelligent video offers to its organisation,” said Trevor Sinden, Director, Middle East and Africa Sales, March Networks. “We are also fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks.” March Networks will showcase its security and business intelligence solution for banks, as well as its complete enterprise video portfolio, in Stand S1-J42 at Intersec 2019, January 20-22 in Dubai, UAE.
Round table discussion
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
Once again, ISC West has come and gone. The show continues to please exhibitors and attendees. Reviews are generally glowing and enthusiastic. For all its successes, however, there is a certain repetition from year to year – a lot of the same players, the same technology trends (not to mention the same venue every year, but who doesn’t like Vegas?) But even among the repetition, there is usually at least one element that is surprising. Perhaps it’s the unexpected elements that keep us all coming back. We asked this week’s Expert Panel Roundtable: What surprised you most at ISC West in 2017?