The new DC-C4212RX 2MP micro dome camera is the latest addition to the DirectIP line up from IDIS, which is South Korea’s in-country manufacturer of surveillance technology. The compact design of the DC-C4212RX makes it the best choice for understated, less noticeable installation. The neat aesthetics are ideal for applications where there is a need for unobtrusive surveillance but where comprehensive, high-performance video capture is paramount. Measuring only 86 mm x 58 mm and weighing...
Vanderbilt’s SPC wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...
Time for an indepth review of IFSEC 2019 in London. This show had fewer exhibitors than previous shows, and the ‘vibe’ was definitely more low-key. Fewer exhibitors meant larger aisles and plenty of room to breathe, and the slower pace provided time for exhibitors to reflect (often negatively) on the return on investment (ROI) of large trade shows. There was little buzz on the first day of the show, but spirits picked up on the second day (when, not coincidentally, some exhibitors...
Cook Security Group (CSG) successfully unveiled its privately branded video surveillance solution, Piko VMS, during their 2019 Technology & Innovation Summit in Portland Oregon. Health monitoring Cook named Razberi Technologies as their hardware partner to provide the intelligent appliance and health monitoring component to the new VMS brand. “While we still have strong relationships with our traditional video partners, we wanted to provide an open cloud-enabled platform to deliver...
Today’s shoppers have less time than ever to get their grocery shopping done, and they expect a fast and easy purchasing experience. How does one keep waiting times to a minimum, and react quickly to growing checkout lines? Intelligent queue detection technology could be the answer. Waiting to pay is a huge problem for retailers and shoppers alike. Customers who find themselves in a seemingly endless line may grow intensely frustrated, to the point that they abandon the store. Queue dete...
Advanced video projects delivered by SECOM, Johnson Controls and ISD Tech have been recognised at IFSEC with a special award event on the IDIS stand. Over the last 12 months, large-scale implementations and high definition IP system upgrades, harnessing the latest IDIS technology, have given enhanced video capability at NHS facilities, fashion chains, coffee shops, variety stores, and market leaders in the eating-out sector. Each year, IDIS invites VIP guests to recognise outstanding achieveme...
Dahua Technology, a video-centric smart IoT solution provider, announces the addition of the new StereoVision camera: a 3MP dual-sensor, people-counting camera that incorporates Artificial Intelligence (AI). The camera uses advanced image processing technology for improved depth perception to count people with up to 98% accuracy. The close, side-by-side positioning of the StereoVision camera’s dual lenses allows each sensor to capture images of the same area from slightly different angles, resulting in higher depth perception. The camera then combines real-time people-counting and behaviour analytics with video images. By unifying video surveillance and operational capabilities in one device, the camera helps users make more business operations decisions more efficiently. People-counting cameras Retail environments, museums, sports venues, or other areas where AI can be used to keep track of headcount can all benefit from the StereoVision camera. The camera can monitor capacity during crowded events, send an alert when entry or checkout lines become long, and help reduce loitering by notifying users when visitors idle for a specified period of time. The camera can easily integrate with regional people-counting cameras to give users a better understanding In addition to counting those who enter and exit a location, the camera can easily integrate with regional people-counting cameras to give users a better understanding of how people move throughout the area. “In a retail environment, the StereoVision camera arms managers with valuable information to improve customer service and make merchandising decisions,” adds Jennifer Hackenburg, senior product marketing manager for Dahua Technology USA. “It can gauge areas of interest for product positioning, or measure foot traffic at mall entrances to identify prime retail space, for example.” Wide dynamic range The camera can also analyse data to improve customer conversion rates, such as count the number of people who walk past a store and then compare the data to the number of sales generated. Other features of the camera include a built-in microphone, an onboard SD card slot to store video at the edge, and Dahua Technology’s proprietary Smart H.265+ codec, which saves up to 90% on bandwidth and storage compared to H.264. A low lux level of 0.009, digital wide dynamic range, and Smart IR up to 33 feet ensure reliable performance in low-light, low-contrast, and bright scenes. “Dahua Technology is pleased to present this high-performing AI solution made for business intelligence,” Hackenburg remarked. “By offering cameras that can go beyond basic security, we are able to empower dealers to grow their business by providing their customers with a higher ROI for their security spend.”
PerpetuityARC Training, part of the Linx International Group has announced that it is making its ‘Managing Security Risks in the Oil and Gas Sector IQ Level 4’ training course accessible to security managers and consultants operating in the sector anywhere in the world, with a new online learning programme. Security risk assessment course The new online course can be studied at the students’ own pace and uses elements of the ANSI/API STD 780 Security Risk Assessment Methodology. It highlights the spectrum of risk elements that have the potential to impact upon the security management of upstream and downstream operations. The comprehensive course syllabus includes: Security risk analysis in oil and gas sector Corporate social responsibility, human rights, and community management Managing activism risk Managing acts of militancy and terrorism against the oil and gas sector Oilfield and pipeline security Refinery security Maritime and offshore security Downstream (retail security) Managing Security Risks in the Oil and Gas Sector The latest addition to PerpetuityARC Training’s portfolio builds on the success of its in demand five-day - Managing Security Risks in the Oil and Gas Sector – accredited Level 4 classroom course, which this year is being taught in the UK, Nigeria and the UAE. Director of Sales and Marketing at the Linx International Group, Sarah Hayward-Turton, states “The course was developed by trainers with extensive operational security experience in the oil and gas sector and is continually in high demand by security professionals and consultants all around the world. By making this valuable training available online we are making it accessible to all.” The new Managing Security Risks in the Oil and Gas Sector online course is available at a cost of £575 excl VAT, with discounts available to members of ASIS and The Security Institute.
Consumers are managing their financial services in more digital and diverse ways than ever before. But as card-not-present (CNP) transactions across e-commerce, m-commerce and remote commerce rise across the globe, so does fraud. Adding security without simply creating more points of friction is a real challenge, but one that the EMV 3-D Secure protocol – EMV 3DS for short – is trying to combat. The protocols are generating real interest across the industry, but what exactly is EMV 3DS? And what are the key considerations stakeholders in the online payments and financial services world should be making? Verifying CNP Transactions Three-Domain Secure (3DS) is a standard messaging protocol used to identify and verify cardholders for CNP transactionsThree-Domain Secure (3DS) is a standard messaging protocol used to identify and verify cardholders for CNP transactions. It creates a standardised, harmonised and secure authentication solution for all stakeholders: merchants, issuers, acquirers and schemes. Initiated by Visa and followed by other payment schemes such as Mastercard, a new version of EMV 3DS has now been developed and is being maintained by the industry body, EMVCo. Goals of EMV 3DS specifications The main goals of the latest EMV 3DS specifications can be broken down into three: Increase approval rates Fundamentally, achieving this boost the total volume of transactions and increases revenues for retailers, banks and schemes alike. Reduce fraud Merchants or issuing banks have historically been liable for fraudulent chargebacks, but now the responsibility is shifting depending on which version of EMV 3DS is supported during the authentication. EMV 3DS risk-based-authentication helps reduce fraud and brings huge savings, as well as more confident consumers. Enhance the user-experience Improved online authentication solutions – remembering the 3rd, 4th and 7th digit of a password set five years ago, for example – are far from user-friendly. And the stats speak for themselves: eCommerce cart abandonment rate is at nearly 70%, and around 28% of US online shoppers admit to quitting orders due to checkout processes being too long or complicated. Cutting out complex additional steps for consumers will reduce cart abandonment and result in better sales for retailers (as well as customers happier to return!). Intelligent risk-based decision-making EMVCo’s latest specification features even more intelligent risk-based decision-making with advanced algorithms By improving communication ‘in the background’ between the issuing bank, the acquirer and the merchant, EMV 3DS streamlines the user experience. At a high level, basic account holder information can now be automatically retrieved and verified without additional consumer input. EMVCo’s latest specification features even more intelligent risk-based decision-making with advanced algorithms and smarter data sharing that help evaluate if a purchase is ‘normal’ or not. For example, considering user location, amount spent and frequency of transactions. This means additional authentication processes are only requested when really needed. Say if one is making an m-commerce payment on holiday in Australia from a site they’ve never visited before – they may then be taken through some of the new, simpler additional authentication solutions defined. These now include one-time passwords sent via SMS, biometric authentication, use of existing authentication on mobile devices and background authentication checks. Compelling authentication solution Thorough testing and certification needs to be championed throughout Crucially, EMV 3DS is no longer just for payments. The use cases for identification and verification (ID&V) are expanding, so the scope of EMV 3DS has become much broader to include adding cards to a digital wallet, open banking services and financial services apps, etc. EMV 3DS is a compelling authentication solution fit for the digital, omnichannel age. But as with any major system upgrade, implementation does not come without its challenges. Selecting a trusted partner who understands the nuances and complexities of this new payments infrastructure can help take the strain of compliance. Whether defining and certifying a new solution, or upgrading an existing implementation, thorough testing and certification needs to be championed throughout. This is key to minimising unexpected delays and costs on the path to service launch. FIME’s long history supporting the industry’s digital transformation and participation in EMVCo enable them to deliver unrivalled expert support for your projects.
After the Innovation Summits in Athens and Langmeil and the company’s attendance at the ISC West in Las Vegas, where MOBOTIX presented the latest research and R&D successes and trends to customers and partners, ‘Spring Splash’ marks the market launch of the latest innovations. MOBOTIX is demonstrating the company’s innovative strength to both its partners and customers. “We want to exploit the potential of MOBOTIX technology and DNA and focus on quality from Germany and cybersecurity,” said MOBOTIX CEO Thomas Lausten at the various launches. MOBOTIX also sees good opportunities and growth potential for video surveillance outside the traditional security sector: “We focus our research and development activities on continuously opening up new markets for MOBOTIX – whether in production monitoring, customer behaviour in retail stores, in the health care sector or in logistics – in close co-operation with our technology partners,” explains Lausten. ONVIF-compliant MxManagementCenter The Spring Splash event sees the launch of version 2.1 of the MxManagementCenter, which is ONVIF-compliantMOBOTIX works on regularly optimising and expanding its range of products and solutions in order to develop market-driven and future-oriented innovations and to ensure the greatest possible cybersecurity for these innovations in Langmeil, Germany. Together with the R&D colleagues of the technology partners, such as Konica Minolta, new solutions for vertical markets were developed and brought to marketability: The Spring Splash event sees the launch of version 2.1 of the MxManagementCenter, which is ONVIF-compliant like all MOBOTIX IoT and MOVE camera models. This means it complies with the worldwide open standard for IP-based security products. MOBOTIX offers its customers a simple and scalable total solution for video-supported search for a variety of applications with its new Smart Data license, regardless of the industry. Real-time secure transmission of data The MOBOTIX Smart Data solution enables the combination of almost any multi-layered data source, such as cash register or car license plate detection systems, using the video data from MOBOTIX IoT cameras. All data can be securely encrypted and transmitted in real time, and the results can be analysed onsite or via an Internet connection from any MxMC workstation worldwide. “Our Smart Data solution is a valuable tool, especially for our solution and technology partners, for integrating their technological developments into our MxManagementCenter,” continues Lausten. MxBell 2.1, the MOBOTIX app, is the mobile remote station for MOBOTIX IP video Door Stations and IoT cameras There will be a firmware release going online for the MxThinClient, which will enable an IP video interface to display live images from all MOBOTIX IoT and MOVE camera models and Door Stations on a monitor/TV set. Both the stability and access security of the MOBOTIX system are increased thanks to the option of direct displaying camera images without the need for operating software or even a PC workstation. MxBell 2.1 app for IP video Door Stations MxBell 2.1, the MOBOTIX app, is the mobile remote station for MOBOTIX IP video Door Stations and IoT cameras. The app’s interface underwent a facelift to improve user-friendliness and now sends push notifications for all Door Stations and camera events. Especially valuable for the user is the visitor and event documentation, which makes it possible to track events quickly and easily at any time and from anywhere. The system release Mx-V184.108.40.206 for all Mx6 x16/x26 cameras reduces bandwidth and storage requirements by 25% thanks to 3D noise reduction, among other things. In addition to data security, data economy is indispensable in the world of the IoT and is therefore of utmost importance for MOBOTIX in the interests of its customers.
Delivering another high-value benefit to users, the Maxxess eFusion security management platform now integrates off-the-shelf and seamlessly with the widely used range of deister electronic key management systems. With this latest off-the-shelf integration, eFusion users can now manage all their keys from their centralised security management platform, reducing the risk of security breaches and streamlining their day-to-day operations. Modular and scalable, the deister electronic systems encompass a range of cabinets which can store anything from 8 keys to thousands. They can be used stand-alone or as part of a global corporate solution, in applications ranging from hotels and leisure settings to retail and up-scale residential developments. Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity" Reduces criminal activity “Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity,” says Lee Copland, Managing Director, Maxxess EMEA. “The deister electronic systems make that task much simpler. And with real-time reports logging all system usage, users can be held accountable for any misuse, theft of loss of keys – better protecting buildings and assets.” The integration with deister electronic systems is just the latest example of how the eFusion platform gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. eFusion’s open technology software supports more than 60 off-the-shelf integrations from leading vendors, providing complete freedom to customise solutions combining surveillance, access control, fire and intruder systems with back-office processes. Making premises more secure Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to customers"Crucially, integration with Maxxess eFusion also reduces complexity for installers and their customers and offers unlimited future scalability at affordable price points. “Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to our customers,” says Darren Harrold, Head of UK Operations at deister electronics. “This means they can now link their essential systems together – including their surveillance, intruder, access and fire detection systems – making a wide range of premises easier to manage and more secure.” Visitors to IFSEC International can see Maxxess eFusion and deister key management in action, where both companies will be exhibiting on stand IF2120 and IF410 respectively from 18th to 20 June at London’s ExCel.
TRISAT, a British company specialising in the protection of people and assets, launches the B L AID+ Ballistic Advanced Incident Defence System. The wearable first aid and trauma pack helps to mitigate the risks to citizen first responders from shootings, stabbings and blast shrapnel. The B L AID+ pack is accompanied by a comprehensive practical led course and blended e-learning to provide essential advice on how to stay safe and administer treatment. Catastrophic trauma kit Tremaine Kent, Director of Trisat states: “It is human nature to want to help other people in trouble in emergency situations, but as testimonies in the recent inquest into the London Bridge attacks of 2017 have shown, ‘good samaritans’ can themselves become victims. We have developed the B L AID+ system to give first responders and workplace first aiders enhanced protection to confidently and effectively treat casualties during a serious incident.” The B L AID+ system is constructed of 100% DuPont™ Kevlar® ballistic and stab protection The B L AID+ system is constructed of 100% DuPont™ Kevlar® ballistic and stab protection (complying with NIJ0101.04/IIIA, STANAG 2920 V50.580m/s and KR2/SP2 knife and spike protection standards) and 100% MicrAgard™ PLUS material for infection control. It features a catastrophic trauma kit, a holistic and effective system to stop lethal bleeds in an emergency and a medium BS8599-1 first aid kit to treat up to 25 people in high-risk workplaces. Personal attack alarm system For added flexibility, the B L AID+ system also features a personal respirator for self-rescue during emergencies involving hazardous smoke and fumes, along with a VizShock personal attack alarm system that uses a multi-frequency red and blue pulse to pause and deter an assailant. Tremaine adds: “Terrorist attacks are an obvious use for the B L AID+ system, but knife crime is an even broader threat with 100 people fatally stabbed in UK in 2019 so far. It is vital that the first people on the scene have access to protection as well as the right equipment and training, in order to treat the injured, without putting themselves at further risk.” The B L AID+ system and practical led course is highly suitable for use in: offices, schools, shops, pubs, entertainment venues and anywhere else where people gather. It is Ideal for first responders, corporate first aiders, security personnel, public facing lone workers, aid workers, journalists and anyone travelling to volatile areas.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
With increased demands being placed on safety and security globally, and supported by advancements in IP cameras and 360-degree camera technology, the video surveillance industry is growing steadily. Market research indicates that this worldwide industry is expected to reach an estimated $39.3 billion in revenue by 2023, driven by a CAGR of 9.3 percent from 2018 to 2023. Video surveillance is not just about capturing footage (to review an event or incident when it occurs), but also about data analysis delivering actionable insights that can improve operational efficiencies, better understand customer buying behaviours, or simply just provide added value and intelligence. Growth of Ultra-HD surveillance To ensure that the quality of the data is good enough to extract the details required to drive these insights, surveillance cameras are technologically evolving as well, not only with expanded capabilities surrounding optical zoom and motion range,4K Ultra HD-compliant networked cameras are expected to grow from 0.4 percent shipped in 2017, to 28 percent in 2021 but also relating to improvements in signal-to-noise (S2N) ratios, light sensitivities (and the minimum illumination needed to produce usable images), wide dynamic ranges (WDR) for varying foreground and background illumination requirements, and of course, higher quality resolutions. As such, 4K Ultra HD-compliant networked cameras are expected to grow from 0.4 percent shipped in 2017, to 28 percent in 2021, representing an astonishing 170 percent growth per year, and will require three to six times the storage space of 1080p video dependent on the compression technology used. Surveillance cameras are typically connected to a networked video recorder (NVR) that acts as a gateway or local server, collecting data from the cameras and running video management software (VMS), as well as analytics. Capturing this data is dependent on the communications path between individual cameras and the NVR. If this connection is lost, whether intentional, unintentional, or a simple malfunction, surveillance video will no longer be captured and the system will cease operations. Therefore, it has become common to use microSD cards in surveillance cameras as a failsafe mechanism. Despite lost connectivity to the NVR, the camera can still record and capture raw footage locally until the network is restored, which in itself, could take a long time depending on maintenance staff or equipment availability, weather conditions, or other unplanned issues. Since microSD cards play a critical role as a failsafe mechanism to ensure service availability, it is important to choose the right card for capturing video footage. It has become common to use microSD cards in surveillance cameras as a failsafe mechanism if an NVR breaks Key characteristics of microSDs There are many different microSD cards to choose from for video capture at the network’s edge, and they range from industrial grade capabilities to commercial or retail grade, and everything in-between. To help make some of these uncertainties a little more certain, here are the key microSD card characteristics for video camera capture. Designed for surveillance As the market enjoys steady growth, storage vendors want to participate and have done so with a number of repurposed, repackaged, remarketed microSD cards targeted for video surveillance but with not much robustness, performance or capabilities specific to the application. Adding the absence of mean-time between failure (MTBF) specifications to the equation, microSD card reliability is typically a perceived measurement -- measured in hours of operation and relatively vague and hidden under metrics associated with the camera’s resolution and compression ratio. Therefore, when selecting a microSD card for surveillance cams at the edge, the choice should include a vendor that is trusted, has experience and a proven storage portfolio in video surveillance, and in microSD card technologies. Endurance, as it relates to microSD cards, represents the number of rewrites possible before the card can no longer store data correctly High endurance Endurance, as it relates to microSD cards, represents the number of rewrites (program/erase cycles) that are possible before the card can no longer store data correctly. The rewrite operation is cyclical whereby a new stream of footage replaces older content by writing over it until the card is full, and the cycle repeats. The higher the endurance, the longer the card will perform before it needs to be replaced. Endurance is also referred to in terabytes written (TBW) or by the number of hours that the card can record continuously (while overwriting data) before a failure will occur. Health monitoring Health monitoring is a desired capability that not many microSD cards currently support and enables the host system to check when the endurance levels of a card are low and needs to be replaced. Having a card that supports this capability enables system integrators and operators with the ability to perform preemptive maintenance that will help to reduce system failures, as well as associated maintenance costs. Performance To capture continuous streams of raw footage, microSD cards within surveillance cams perform write operations about seventy to ninety percent of the time, whereas reading captured footage is performed about ten to thirty percent. The difference in read/write performance is dependent on whether the card is used in an artificial intelligent (AI) capable camera, or a standard one. microSD cards deployed within surveillance cameras should support temperature ranges from -25 degrees Celsius to 85 degrees Celsius Finding a card that is write-friendly, and can provide enough bandwidth to properly capture streamed data, and is cost-effective, requires one that falls between fast industrial card capabilities and slower commercial ones. Bandwidth in the range of 50 MB/sec for writes and 80 MB/sec for reads are typical and sufficient for microSD cards deployed within surveillance cameras. Temperature ranges Lower capacity support of 32GB can provide room to attract the smaller or entry-level video surveillance deployments As microSD cards must be designed for continuous operation in extreme weather conditions and a variety of climates, whether located indoors or out, support for various temperature ranges are another consideration. Given the wide spectrum of temperatures required by the camera makers, microSD cards deployed within surveillance cameras should support temperature ranges from -25 degrees Celsius to 85 degrees Celsius, or in extreme cases, as low as -40 degrees Celsius. Capacity Selecting the right-sized capacity is also very important as there needs to be a minimum level to ensure that there is enough room to hold footage for a number of days or weeks before it is overwritten or the connectivity to the NVR is restored. Though 64GB is considered the capacity sweet spot for microSD cards deployed within surveillance cameras today, lower capacity support of 32GB can provide room to attract the smaller or entry-level video surveillance deployments. In the future, even higher capacities will be important for specific use cases and will potentially become standard capacities as the market evolves. When choosing the right storage microSD card to implement into your video surveillance system, make sure the card is designed specifically for the application – does it include the right levels of endurance and performance to capture continuous streams – can it withstand environmental challenges and wide temperature extremes – will it enable preventative and preemptive maintenance to provide years of service? It is critical for the surveillance system to be able to collect video footage whether the camera is connected to an NVR or is a standalone camera as collecting footage at the base of the surveillance system is the most crucial point of failure. As such, failsafe mechanisms are required to keep the camera recording until the network is restored.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American market, where there was ‘positive year-over-year growth’ in 2018 and ‘strong’ sales in Q1 this year, according to Eric Chen, General Manager of Hikvision USA and Hikvision Canada. HikCentral central management software The company’s U.S. focus is shifting from products to solution sales, with emphasis on ‘mid-market’ small- and medium-sized businesses (SMBs). The largest verticals are retail and education, and there are emerging opportunities in the cannabis market. Launch of the HikCentral central management software (CMS) is a component of the company’s solution-sales approach. Launch of the HikCentral central management software is a component of the company’s solution-sales approachMr. He acknowledges the growth of ‘anti-China sentiment’ in the United States and other parts of the world, which he says will impact Hikvision’s operations globally. Specifically, in the U.S., ‘political’ elements impacting Hikvision’s business include ongoing tariffs and a trade war, Congressional calls for export controls and sanctions, and a provision of the National Defense Authorization Act (NDAA) that bans use of Chinese video surveillance products in government applications. Specifying cybersecurity initiatives at ISC West In spite of it all, Hikvision’s message at the recent ISC West show was overwhelmingly positive, and the company also detailed cybersecurity initiatives they say put the Chinese company ahead of many competitors in the industry. Eric Chen came in as General Manager last year; he previously spent a decade working for Hikvision in China. Chen reports solid 18.8% year-over-year growth for Hikvision globally, totalling $7.4 billion last year. He notes the company saw 40% compounded growth between 2010 and 2018. Globally, there are 34,000 employees, 16,000 of whom are research and development (R&D) engineers. Hikvision’s expanding global footprint includes 46 international branches. There are three manufacturing facilities in China, in addition to one in India. HikRewards program for HDP customers At ISC West, Hikvision’s theme was ‘Focus on Your Success’, including introduction of the HikRewards program that provides rebates to HDP (Hikvision Dealer Partner) customers, their core dealer base. A new online Hikvision Knowledge Library for HDPs provides training and reference materials dealers can share with employees. A new tech centre, introduced in December, provides data sheets, product information, and support resources. There is also a North American R&D team headquartered in Montreal. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls A customer satisfaction survey launched in March provided good feedback from customers. “They know who to call if they have a problem,” says Chen. “We want to focus on making customers successful.” The success theme also extends to Hikvision employees, who are featured in videos describing their jobs and enthusiasm for Hikvision. There are some 400 employees in the North American operation. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls. Half of the booth was focussed on solutions, especially retail and education, and also gaming and commercial real estate. Security products displayed at ISC West A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS systemProduct highlights at the ISC West booth included the 32-megapixel PanoVu multi-sensor dome camera, whose 180-degree panoramic image was displayed on a 65-inch monitor. A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS system. Some products new to the North American market, including intercoms, turnstiles, emergency call stations, and under-vehicle inspection, were displayed. Hikvision’s deep learning products are moving into their second generation, including the ability to obscure private information on videos to comply with GDPR/privacy requirements (previewed at ISC West and released later in the year). Algorithm components of Hikvision’s DeepInMind artificial intelligence are being adapted into a platform called AcuSense for value-priced products, which can recognise a human or vehicle and help filter out false alarms. Also being adapted to products with lower price points are the ColorVu system that incorporates visible light LEDs to provide colour images at night, and DarkFighter low-light capabilities. Penetration testing of cameras and NVRs As a global manufacturer, Hikvision faces a high level of scrutiny about cybersecurity, which Mr. Chen says is “a good thing for us,” enabling them to highlight the steps they are taking to improve cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity In September 2017, Hikvision began working with third parties (including Rapid7) for penetration testing (ethical hacking) of its cameras and recorders. That same month, Hikvision set up a Cybersecurity Hotline open to anyone with questions about cybersecurity, including white-hat hackers and researchers. Even before that, Hikvision had an open-door policy on cybersecurity and a program for patching and disclosing responsibility. In February of 2018, Hikvision released a 40-page Cybersecurity White Paper describing cybersecurity testing and processes built into the software development lifecycle. That same month, Hikvision launched an Opened Source Code Transparency Center and offered an open invitation to anyone wanting to inspect Hikvision’s source code and let them know of any vulnerabilities. FIPS 140-2 certification by NIST Hikvision has also become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), which ensures their patching and incident reporting programs have been reviewed by a CNA partnering company. Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVRsIn August, Hikvision received Federal Information Processing Standard (FIPS) 140-2 certification, a U.S. government encryption standard created by the National Institute of Standards and Technology (NIST). Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVR products. Davis said the FIPS 140-2 certification process began before the NDAA ban on use of Hikvision products in the U.S. government, and in any case is a standard that ensures a high level of encryption. “We wanted to make sure we had the same level of technology,” he says. “It was not to win over the government.” Making industry more cybersecure “We are really trying to have third parties test and certify our equipment,” adds Davis. “We are trying to be open and transparent. Education and awareness are key.” “We need the trust of customers in the security community,” says Mr. He. “No matter what, we have to follow the highest standards to offset the concerns and accusations.” In April 2018, Davis became a member of the Security Industry Association (SIA) Cybersecurity Advisory Board to help make the entire industry more cybersecure through education, awareness and standards. Hikvision has also joined the Forum of Incident Response and Security Teams (FIRST at first.org), a global cybersecurity incident response consortium that cooperatively handles computer security incidents and promotes incident prevention programs. Davis has presented Cybersecurity Road Shows in 22 cities in the United States and Canada, and also in Australia and New Zealand. The 90-minute presentations focus on education awareness around cybersecurity and seek to get attendees engaged and aware about cybersecurity in business and also in their homes.
Video Surveillance as a Service (VSaaS), simply stated, is a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of the plan (i.e. number of cameras, amount of storage, software features, etc.), and customers pay a monthly subscription price to use it. Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data centre via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Implementation of AI and deep learning The cloud facilitates implementation of artificial intelligence and deep learning in the video surveillance marketThe cloud also facilitates implementation of artificial intelligence (AI) and deep learning in the video surveillance market. One of the major challenges with developing deep learning-based applications is access to real-word data and the ability to train the applications to work in any environment. Companies need access to relevant datasets that need to iterate their solutions quickly. Cloud-based solutions are of significant advantage in this case, as they allow for continuous updates and easy collection of vast amounts of data. “We will see the continued adoption of cloud-based intelligent video solutions that aggregate business data through video and artificial intelligence,” says Andreas Pettersson, CEO of Arcules, one of our Expert Panelists. Leveraging AI and IoT technologies with video data is becoming more common as organisations strive to optimise business operations while also boosting security across their facilities. Actionable intelligence gathering “The possibilities for this level of actionable intelligence gathering is endless, as markets such as hospitality, manufacturing, retail and SMEs that have multiple locations to manage, look to make sense of video in intuitive, streamlined ways,” says Pettersson. “The ability for technology to aggregate and analyse video surveillance and connected sensor data, identify trends in that data, and apply predictive analysis in businesses will have a huge impact in the coming year.” Cloud systems can solve more problems than ever using artificial intelligence and machine learning Cloud systems can solve more problems than ever using artificial intelligence and machine learning, and the capabilities expand way beyond video analytics to include analytics in general, crunching a variety of data provided by Internet of Things (IoT) sensors. Another area of interest related to video in the cloud is the development of ‘smart codecs’ that security camera manufacturers are developing and marketing as a solution that goes beyond H.264 and H.265. Maximising video storage Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintainThe ongoing need to better manage network bandwidth usage and to maximise video storage is further turning the emphasis toward smart codecs, which lend themselves to cloud applications. Extremely high-resolution video can now be moved around in a fraction of the time and solves the issue of transporting many cameras over constrained WAN connections. With the elastic computing power available in the cloud, one can now envision a time where cloud computing costs could be low enough for the masses of video security solution use cases to be solved. Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintain, and in many cases, even more secure than traditional on-premise deployments. In partnership with the leading cloud providers, the security industry can carry this message to the customers and will gradually see a shift in the acceptance of cloud-based solutions in the traditional security markets.
At the University of Tennessee, Knoxville, the Technology Integration Services department provides infrastructure, customer service and web application support to the faculty, staff, students, and units of the College of Business. Its focus is to facilitate the use of the campus infrastructure and support while adding complementary infrastructure and services to meet the unique needs of the college. The college took a very innovative approach to operating and securing its 174,000sq ft state of the art Haslam Business Building. The technologically advanced facility incorporates over 40 meeting rooms and needed a way to efficiently schedule and fill classrooms and conference space, yet maintain security and control. Physical access control CSC identified the Gallagher security management platform as the best fit for the foundation of the system The university had previously used an antiquated access control and security system across the campus, and realised it did not meet the demands of this new high-tech facility. Ramsey Valentine, Director of Technology for the College of Business, turned to WWR Engineering of Knoxville, and Coactive Systems (CSC) of Canton, Ohio to design and deploy a state-of-the-art integrated security business solution. The difficulty involved in deploying this solution was that certain components, like physical access control, were readily available, but other components such as digital signage information kiosks and the integration of all components of the system, were not off-the-shelf. CSC’s Brad Green and John Kortis worked with Director Valentine to understand the college’s specific needs and develop a solution that exceeded their expectations. CSC identified the Gallagher security management platform as the best fit for the foundation of the system. Application programming interface Gallagher systems are installed in approximately 90 percent of Australia’s and New Zealand’s universities. With proven strength in the tertiary market internationally, the Gallagher system was selected because of its open architecture, application programming interface, and published software developer’s kit. CSC also teamed with the local office of Simplex Grinnell. Led by Mitch Hall, Simplex was the contractor responsible for the assembly and installation of the Gallagher security system and the kiosks provided by CSC. WWR was responsible for the engineering drawings and interface to the existing security systems. The College utilises Meeting Room Manager from NetSimplicity for room scheduling; CSC created an integration from Meeting Room Manager with Gallagher Command Centre software. CSC also designed and custom manufactured the 42 kiosks that the college uses at each classroom and in meeting room areas. Door position switches Use of the kiosk requires a valid access card carried by all students and faculty The kiosks are the user-interface to the ‘system’ for room access and scheduling. Use of the kiosk requires a valid access card carried by all students and faculty. Each touch-screen kiosk contains digital signage showing the classroom name and detailed information about the room schedule and its status. Users can also access current weather, news, and stock information via the touch screen. The kiosk may be programmed to display emergency messages and egress data if needed. The kiosks are connected to the college’s network on which Gallagher Command Centre resides. The Gallagher system controls and monitors the door functionality including electric lockset and door position switches. Meeting Room Manager is utilised by staff to schedule rooms for classes and assign students via the campus intranet. Gallagher server and controller application programming interfaces extend the functionality and flexibility of the Gallagher system as the platform for integration. Providing technology solutions Utilisation of the integrated system provides continuous communications security and access control for the college, while allowing students unencumbered access to the meeting rooms and classrooms. Gallagher would like to acknowledge the support of the University of Tennessee and their security partners Coactive Systems of Canton and Simplex Grinnell, Knoxville in the development of this in-site study. CSC is a full service IT integration company providing technology solutions for audio, video, data, voice, dispatch, asset management, inventory, kiosks, security, communication, insurance, retail and medical systems. CSC’s services include custom software development, system installation, maintenance and cabling. Photos reproduced with permission from University of Tennessee.
Senstar, global provider of video management solutions and perimeter intrusion detection systems, has published a case study detailing how its Senstar Symphony video management system (VMS) and video analytics are helping Ferretería Ochoa secure spaces and gather business intelligence. Senstar Symphony VMS Ferretería Ochoa is a hardware and home improvement retail chain that has been operating in the Dominican Republic for over 45 years. Symphony was first installed at one of its retail stores in 2013 and is now being used at six locations, including a storage facility and a manufacturing facility. Ferretería Ochoa also uses several of Senstar’s video analytics to better understand customer and employee behavior. One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control. This not only refers to shoplifting by customers, but also to errors – accidental or intentional – made during shipping and receiving. Employees are aware they are being monitored at all times and understand the system’s ability to capture incidents and provide proof. Central video monitoring “It dissuades deceitful and malicious situations such as shipping more items than ordered or a more expensive item,” said Mr. Gomez. “The deterrence factor Symphony provides is probably the most important result we have achieved.” Symphony has also enabled Ferretería Ochoa to utilise security personnel more efficiently and has reduced costs by having video from all sites managed from one central location. Retail security “Senstar Symphony and analytics are ideal for retailers looking to deter theft, protect staff and customers and improve the overall customer experience,” said Senstar’s Director, North America Business Development Anthony Hackett. “We are happy to be helping Ferretería Ochoa achieve such results.”
Trackforce has entered the retail market with a leading security workforce and activities management platform that empowers retailers to effectively manage their physical security and loss prevention environment. The platform delivers actionable data analytics to anticipate, assess, and mitigate risk; it enhances compliancy management, and helps supervisors manage more resources at multiple sites from one centralised location. Retail security and loss prevention teams operate in a challenging and complex environment" Retail Security According to Guirchaume Abitbol, CEO and Founder of Trackforce, “Retail security and loss prevention teams operate in a challenging and complex environment. To be successful they must access the best type of technology to support their security and loss prevention teams and streamline management of the entire security and risk environment. Our platform is seamless. Simpler to operate and more cost effective, it helps retailers deliver enhanced shopper safety while optimising security and loss prevention management.” Trackforce supports security and loss prevention teams by giving them predictive and historical data analytics to boost their strategic decision-making capabilities. The SaaS platform’s predictive analytics capabilities facilitate easy identification and analysis of theft patterns so that weak areas within the store can be improved to reduce risk and loss. Historic data are analysed, cross-referenced with trends and industry best practices, and then broken down. The resulting intelligence can then be used to fine tune security both within the store and externally. Trackforce SaaS platform The platform also consolidates and centralises the security command and control function, eliminating the expense of posting multiple supervisors at various sites. “Now one supervisor using the Trackforce command center is empowered with communication and management capabilities to effectively oversee security at numerous retail sites. The supervisor can communicate over multiple communication channels to security officers at all locations they are responsible for,” adds Abitbol. “This delivers major budgetary savings for the retail enterprise without compromising quality in any aspect of its security environment.” The Trackforce platform prevents loss and mitigates risks by securely maintaining digital records Security and risk management within the retail environment is complex, with numerous code and compliancy requirements. Missing a deadline can result in severe fines, increased insurance premiums, or even prosecution. The Trackforce platform prevents loss and mitigates risks by securely maintaining digital records and proactively alerting stakeholders when licenses need renewing and audits and inspections are due. The security manager commands a dashboard view of the entire regulatory and compliancy landscape across all store locations. Security and risk management “No two retail security departments are the same,” concludes Abitbol. “So we help retail clients customise their Trackforce workforce management platform based on their unique security, loss prevention, and risk environment. Trackforce eliminates the need for time-consuming paper reports and antiquated guard tour devices. It assists security officers and loss prevention officers in fulfilling their duties effectively, giving them improved capabilities to help them face their security challenges with greater efficiency and economy.”
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorised personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorised staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the video are helping the bank make more strategic decisions about staffing, customer service and even future branch design. Business intelligence Our March Networks surveillance platform is providing us with some significant business and non-security-related uses" “Our March Networks surveillance platform is providing us with some significant business and non-security-related uses,” Ishikawa explained. Bank of Hawaii, which operates 69 branches and 373 ATMs across Hawaii, American Samoa and the West Pacific, is currently using March Networks Searchlight for Banking software to gather business intelligence at its branches. Searchlight’s mix of surveillance video, teller/ATM transaction data and analytics delivers valuable insights into the bank’s operations, as well as helping to enhance security and uncover fraud. “Our branch division folks look at the data to get ideas on how we should do our branch operations or staffing differently,” he said. People counting data — collected by FLIR Brickstream3D sensors integrated with the Searchlight software — tells them which entrances and exits are most used so they can place marketing materials in high-traffic areas. Video surveillance products The information is also being used to help determine future branch layouts. Queue length and dwell time data, meanwhile, help them understand their busiest time of day, and day of the week, so they can staff branches appropriately. “It’s a huge plus for us,” said Ishikawa. “Our executive management team can see the benefits of the video solution, and the future possibilities for this data.” A forward-thinking bank that’s keen to try new technology, Bank of Hawaii began exploring Searchlight after its success with March Networks’ other video surveillance products. The bank first started using March Networks systems in 2015, when it was time to upgrade its legacy DVRs. At the time, Bank of Hawaii was relying on two different video platforms, and it wasn’t happy with their performance. After enlisting the help of a consultant, and doing his own research at security tradeshows, Ishikawa says the decision to go with March Networks was clear. Network video recorders 'March Networks’ products are really engineered for the banking environment" “I remember asking some of my banking counterparts, ‘Hey what are you guys using?’ And they strongly recommended March Networks,” he recalled. The consultant came to a similar conclusion. He said, "March Networks’ products are really engineered for the banking environment,’ so that helped us make the decision.” Bank of Hawaii is currently using March Networks 8000 Series Hybrid Network Video Recorders (NVRs) in about half of its banking branches. The Linux-based devices provide reliable video surveillance recording and management, and are also easy to service, which is a huge bonus for Ishikawa and his team. In addition, the 8000 Series rack mount units feature an innovative ‘dock and lock’ station that allows technicians to easily remove and service the recorder while leaving all rear connections clean and organised in place. Existing analogue cameras “With other companies, you have to power down the recorder for several minutes to service it, and that means unplugging and re-plugging all the inputs. You miss a number of minutes of recording during that time. With March Networks, we’re able to just pull out the hard drive and pop in another one without taking the NVR offline,” he said. “That’s huge for us.” According to Ishikawa, Bank of Hawaii also appreciates the 8000 Series’ hybrid support, which allowed the bank to continue using its existing analogue cameras, and the motion histograms in March Networks Command video management software, which show Ishikawa and his team where motion occurred and helps them rapidly locate video evidence. “Command’s modern interface is really user-friendly, and it’s very easy to find video,” said Ishikawa. Dynamic range technology Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs “When someone is telling you, ‘Hey we had a problem at this branch this morning, I don’t know what happened, but it must have been around this time’, we’re able to find that video much more quickly on a March Networks platform.” The bank’s high resolution cameras also make it easy to discern important details. In its newer branches, Bank of Hawaii is using March Networks ME4 Series IP cameras, which capture 4MP images and feature high dynamic range technology to optimise image quality in both low and bright light. The bank is also using Oncam 360° cameras for high-resolution panoramic views. For security at its bank machines, Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs. Video is integrated with the bank’s ATM transaction data in the Searchlight software for rapid investigations into customer complaints and potential fraud. More comprehensive oversight “It’s so easy to search,” said Ishikawa. “It takes us exactly to that transaction and the associated video so we can figure out what transpired.” The bank is also integrating its teller transaction data with video in Searchlight for more comprehensive oversight of its branches. The combination of video, transactions and analytics helps it get a more holistic view of its services. “Transaction data is not always indicative of how busy a branch is,” Ishikawa said, noting that lengthier conversations at the teller counter often create value because the customer returns later to access another bank product or service. Having video and analytics is an added layer of information. Being able to remotely access video also helps Ishikawa’s security team conduct virtual patrols. This saves them both time and money. Uniformed security member Capturing video of the incident helped underscore the serious nature of the situation “In the past, whenever there was an issue, we had a uniformed security member head out and physically check the branch. But with virtual patrols, we can do fewer physical visits and, when we do visit, it’s a more meaningful visit.” The security team, for example, can keep an eye on issues with vagrancy and loitering by simply logging into the Command software. March Networks video has helped the bank successfully address some of these issues. In one case, a person was routinely visiting a branch and causing disruptions by yelling and throwing deposit slips on the floor. “We don’t always know the situation, but if a person is yelling or displaying erratic behaviour, they pose a risk,” said Ishikawa. Capturing video of the incident helped underscore the serious nature of the situation. Investigating a fraud “We were able to show police that this was not a minor disruptive party. It was a very concerning issue for us. And it wasn’t just our bank, it was occurring in other banks, too.” Going forward, Bank of Hawaii is planning to migrate its remaining retail branches to March Networks. Given the widespread benefits of intelligent video, Ishikawa predicts that, like him, more bank security managers will receive requests to share their video surveillance securely with other departments. “In the future, it won’t just be security that’s asking for a video upgrade,” he said. “It’s going to be other parts of the business saying, ‘We want a piece of the pie too.’ Because surveillance is more than just investigating a fraud or robbery incident. Now, video surveillance is a lot more than that.”
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent video solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation centre in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS integration “Once all the bids were in, I went through the process of analysing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR dome cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid network video recorder At the centre of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the centre of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customised embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight intelligent software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Traditionally, many stores have used an assortment of tags and labels on a diverse range of merchandise, most of which were designed for an entirely different set of products. As a result, many apparel retailers have recognised that in some instances merchandise and textiles are being damaged. Checkpoint Systems, renowned supplier of source-to-shopper solutions, has therefore developed an innovative new anti-theft solution to meet their specific requirements – Mini NeedleLok. Mini NeedleLok anti-theft solution Designed to protect all types of garments, including very thin fabric, the one-piece solution deters thieves while preventing damage that would usually occur on application of pinned security tags. Whilst other products on the market feature a hinged mechanism which can snag and rip textiles, Mini NeedleLok uses a needle in place of a separate pin, which separates the fibres rather than breaking through them. This allows store assistants to gently spread fabric threads on application to avoid leaving a visible hole after removal. In order to reduce time spent on in-store tagging labour, the Mini NeedleLok mechanical design allows quick and easy application, whilst the solution’s wide opening also allows freedom of placement anywhere on the garment. Minimum product damage risk The Mini NeedleLok speeds up the self-checkout process The Mini NeedleLok also speeds up the self-checkout process. It can be removed quickly and efficiently at the point-of-sale, thanks to its single-piece design and wide opening, enabling store associates to assist with other enquiries, improving the in-store customer experience. It also eliminates the risk of damage to the merchandise, or injury to the customer, as the needle is never exposed. Not only that, with 70% of purchase decisions made at the shelf, Mini NeedleLok has been designed with display in mind. Its sleek look and smart black colour ensures it doesn’t impede on the garment’s aesthetics in order to help turn a browser to a buyer. For those retailers wishing to take their visual merchandising a step further, the solution can also be customised, from adding a logo to a bespoke colourway that matches the company’s branding. Anti-theft retail solution Irene Fernandez, Product Management Europe at Checkpoint Systems, commented: “We’re more customer focused than we have ever been in our history, which is demonstrated through the diverse range of solutions that we now offer retailers across a variety of markets. With the Mini NeedleLok, we took our existing technologies and created a product that fits our apparel customers’ requirements - an effective anti-theft solution that protects merchandise, with the added benefit of being customisable. This is ideal for fashion brands where aesthetic is crucial to their identity.”
Round table discussion
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?