The MR6442X IP 4MP dome camera is suitable for demanding outdoor installations in challenging lighting conditions, such as schools, parking lots and sports stadiums. The camera's outstanding features include 2.8 to 12mm Varifocal-Auto Iris Lens, 30-meter IR night vision, and built-in Sense up+ low light technology, all at a price point that allows smaller budget projects to have access to this powerful 4MP outdoor camera. Intelligent Video Surveillance (IVS) functionality is a cornerstone of LI...
Coming off a successful ISC West show, Honeywell is sharply focussed on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.”...
Workplaces, schools, hotels, sporting events, entertainment venues and other large –and sometimes not so large – facilities have become headlines in the news for all the wrong reasons: violent attacks. The Safer Solution is an effective training method that addresses public/workplace violence and active shooter incidents – by both alleviating a situation before it ever occurs, and by preparing civilians with appropriate response skills in the case of a crisis developing. The S...
TRISAT, a British company specialising in the protection of people and assets, launches the B L AID+ Ballistic Advanced Incident Defence System. The wearable first aid and trauma pack helps to mitigate the risks to citizen first responders from shootings, stabbings and blast shrapnel. The B L AID+ pack is accompanied by a comprehensive practical led course and blended e-learning to provide essential advice on how to stay safe and administer treatment. Catastrophic trauma kit Tremaine Kent, Di...
STANLEY Security, global manufacturer and integrator of comprehensive security solutions, launched a Managed Services Program (MSP) as part of its STANLEY IntelAssure, Powered by Viakoo, intelligent security automation platform. Managed Services Program The program’s new Camera Firmware Update Manager (CFUM) takes automated detection to a new level “We’re excited to launch our Managed Services Program and its Customer Success Team, which together will provide customers with...
Audio over IP pioneer Barix is highly regarded for the reliability, flexibility and cost-effectiveness of its IP-based paging and intercom solutions. Building on this rich history, the company announced Paging Cloud, an innovative software-as-a-service (SaaS) solution that brings paging into the smartphone-enabled mobile era. Integrating easily with almost all existing paging and public address systems, Paging Cloud records paging messages and sends them directly to registered smartphones, enab...
Security expert Abloy UK is inviting visitors to IFSEC 2019 to learn more about its innovative new global vision, ‘Abloy - For Trust’, and meet the company’s new brand ambassador, Finnish motor racing icon Valtteri Bottas. Held on 18th – 20th June 2019 at ExCeL London, IFSEC International is Europe's leading security event and the only global stage committed to the future of integrated security. Valtteri Bottas - who is currently top of the Formula 1 leaderboard - will be on the stand to explain why he is the ideal match to embrace and reflect Abloy’s brand values. Better representation of digital offering Abloy’s ‘For Trust’ campaign revitalises our core brand values and positions us for continued future growth"Aaron Yule, Managing Director at Abloy UK, said: “Abloy’s ‘For Trust’ campaign revitalises our core brand values and positions us for continued future growth, with refreshed branding to better represent our modern digital offering. “We’re keen for visitors to learn more about how Valtteri fits perfectly with our brand – he is trustworthy, technologically pioneering, innovative, has a first-class performance and puts teamwork at the heart of everything he does.” Products on display at IFSEC 2019 Alongside launching ‘For Trust’ with Valterri, Abloy is also showcasing a number of innovative products at IFSEC 2019. These include: PROTEC2 CLIQ - The easy-to-use access control system. It enables remote key management and provides comprehensive audit trails on locks and padlocks which fulfils the demands of regulators. It also has the ability to electronically remove lost or stolen keys from the system, meaning security can still be confidently maintained in circumstances where a key has been misplaced. PROTEC2 CLIQ can also ensure the safety of the people on site through not just managing and controlling access but delivering significant health and safety benefits by guaranteeing only the most competent and compliant staff are allowed on site, reducing risk. PROTEC2 CLIQ Connect recently won a prestigious Platinum ‘Govie’ Award in the USA, honoured as an outstanding government security product. Managing building security The CLIQ Go app enables users to control security in their building and premises from their mobile deviceCLIQ Go - The CLIQ Go app enables users to control security in their building and premises from their mobile device. Features include the ability to schedule access to rooms or give contractors time-limited access. If a key is lost, access can also be revoked using the CLIQ Go app, all managed from a cloud-based system which is ideal for SMEs, education, retail and hotels. Abloy OS - This is a contemporary, modular and scalable operating system, integrated with CLIQ Web Manager, which allows users to control door environments and secure access. The visual map-based user interface provides role and area-based access control, with a real time situational view. This accurate and convenient management of keys, identities and access reduces the resources required, thereby improving efficiency and user satisfaction. The system is Cloud hosted and is future-proofed to develop according to customer needs. Easy access and egress Escape Door System (EDS) - The EDS offers easy access and egress while ensuring compliance, safety and security with the ability to implement dynamic lockdown procedures. With the EDS, it is now possible to provide a compliant solution for an escape door when read-in/read-out access control is specified, combining the three components required for BS EN 13637 (electronically controlled escape door systems for doors along escape routes) - Blocking, Control and Trigger. Traka21 helps trace and account for every key or keyset ensuring that critical business operations are never jeopardisedTraka21 - Traka21 is a sophisticated stand-alone key management system, which combines innovative RFID technology and attractive, robust design to provide small and medium sizes businesses with the advanced management of keys or keysets in an affordable plug and play unit. Simple, efficient and cost-effective, Traka21 helps trace and account for every key or keyset, which are individually locked in place, ensuring that critical business operations are never jeopardised. Ensuring access to authorised personnel Electric locks - Products such as the Abloy EL560 solenoid lock and EL520 motorised lock work by controlling either the latch or the handle, or by motorising the bolt back once a proximity card is presented or a request to exit device is used. This ensures that only authorised personnel are able to gain access to the building, and the system will prevent any unauthorised persons from entering. This is ideal for exit and fire rated doors within the interior of premises such as business offices, public buildings, hospitals and schools. Electric locks also offer energy and emission reductions in comparison to door magnets. There are also safety benefits to be gained by choosing an electric solution, including removing the fire risks associated with the installation of door magnets on fire escape points.
Connected Technologies LLC, maker of the award-winning Connect ONE cloud-hosted security management platform, has added Mobile Badge to its wide range of value-add features and capabilities included in the turnkey system interface. Designed for schools, campuses, construction sites, clubhouses or other locations with a changing, fluid population, Mobile Badge puts credentialing identification management on the user’s phone, similar to a traditional physical badge. Mobile Badge can be used to instantly verify active/inactive status via barcode and can also be used to print a temporary visitor’s badge if necessary. System management time The user’s Mobile Badge consists of the dealer or end-user’s company logo, name, picture, custom information fields (such as student/employee identification number) and a barcode for verification scanning, with an easily recognisable green border indicating an active credential and red border indicating inactive status. Scanning the barcode will instantly show the user's status, permissions and last activity. In the case of a visitor badge, one scan of the barcode and the user’s credentials can be quickly removed after use, saving system management time. Mobile Badge in the Connect One app is used in place of a physical badge and is conveniently accessed from the login screen (if not currently logged in), account window and ScanPass Mobile Credential screen. Headquartered in Monument, Colo., Connect ONE is a patented management solution for systems integrations that dealers resell to their customers, growing their monthly recurring revenue.
S.A.F.E., the Safety Alerts for Education Foundation, announced that it is donating the Safety Alerts for Education (S.A.F.E.) emergency mobile alerts platform to all schools, colleges and Universities across the US for free and in perpetuity. This is the exact same, fully featured system that has been in use by The Department of Homeland Security (DHS) and The Massachusetts Emergency Management Agency (MEMA) and other Federal, state and local agencies, and police departments across the country for the past seven years. S.A.F.E may save lives in situations where a few extra seconds of warning can be the difference between life and death. Ping4Alerts emergency communications technology Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation usesThe S.A.F.E. Foundation is a non-profit 501c3 organisation founded by the principals of Ping4 Inc., of Nashua, NH. Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation uses. This S.A.F.E. system is currently offered and being implemented in New Hampshire and Massachusetts Schools. This same system, developed by Ping4, was used during the Boston Marathon bomber manhunt and in the aftermath of Hurricane Sandy. At a New Hampshire launch press conference Governor Sununu lauded “the opportunity that schools now have to create a first class, world class, security and communications system for their students.” Ensuring safety of students “The wellbeing of our students, and the safety of our schools, matter to all of us,” said Jim Bender, CEO of Ping4. “This issue of school safety goes well beyond making sure that our children make it home safely from school each day. It is also about creating a positive school environment which is more conducive to learning, and more conducive to teaching. We are excited to expand our New Hampshire S.A.F.E. initiative to Massachusetts. “The Columbine High School massacre was nearly 20 years ago and not much has changed since then. In the first five months of 2018, more people were killed in American public schools than in US military operations globally. This impactful step toward improving school safety can be implemented immediately, without getting held up in contentious debates over gun laws or mental health issues.” Precise and real-time emergency alerts S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quickerS.A.F.E. enables schools to send geographically precise emergency alerts, anonymously, and in real-time, to nearly any smartphone in any school building or on any campus. A favourite of law enforcement agencies and first responders, S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quicker. First responders outside can also receive valuable information in real-time from inside a building, even before they arrive on the scene, reducing response times and giving greater situational awareness of a shooter or other emergency. Smartphone application for school safety “We are pleased to be among one of the first educational institutions in the country to encourage usage of this important and meaningful smartphone application, in an effort to keep our schools safe,” said Frank Edelblut, commissioner of the New Hampshire Department of Education. “As more schools opt-in, everyone connected to the school community – educators, parents, and students – will be able to stay informed during an emergency.” “When we reviewed every after-action report of school shootings across the country, communication was always an issue,” said Perry Plummer, Director of the Division of Homeland Security and Emergency Management for the state of NH. “How do we let the people know what they should do to protect themselves and how do we let parents know that their child is safe and where to pick them up.” Administrative alert dashboard S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alertsA free download for school students and staff on iOS or Android, S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alerts. S.A.F.E. delivers 2-way rich media messages in real-time, with any combination of audio, video, pictures and text, which can be very helpful to police, school administrators, and first responders in assessing situations, saving lives, and solving crimes. S.A.F.E. is completely anonymous and collects no personal data from users of the app. Parents of children in the school can preset ‘watched locations’ on their own phone, so that they will receive all alerts sent to their children at school, as well as designated, safe child pick-up locations, regardless of where the parents are at the time. S.A.F.E. messages can originate either from the school administration itself, or from local law enforcement, or both. S.A.F.E. can be implemented locally within weeks. Each school or school system can customise, manage and send out their own alerts via an easy to use web-based portal. S.A.F.E. can isolate a school building or campus on a map and only those in the designated areas will receive the alerts. S.A.F.E.’s ability to pinpoint locations with geographic accuracy is second to none.
Allegion, a provider of security products and solutions, announced its ENGAGE IP Gateway integrated with the latest version of RS2 Technologies’ Access It! Universal.Net software. RS2 Technologies released Version 7 of its software on March 11, which enables it to support Schlage Control, Schlage LE and Schlage NDE wireless locks as well as the Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options via the ENGAGE IP Gateway. “Allegion is excited to grow our offering with RS2 Technologies and provide end users more flexibility when it comes to electronic access control,” said Robert Lydic, VP of PACS/ OEM Business at Allegion. “This IP-based integration gives our customers the scalable and cost-effective options they need. By completing this integration and incorporating our new Von Duprin RU and RM kits, the opportunities for the RS2 community have been expanded significantly.” Real-time access control Ethernet connectivity to the network enables real-time access control directly from an in- or out-of-network host to an edge deviceThe RS2 Technologies’ integration with the ENGAGE IP Gateway eliminates the need of an access control panel, which enables customers to grow the number of access control secured doors while maintaining their budgets. The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency. Ethernet connectivity to the network enables real-time access control directly from an in- or out-of-network host to an edge device. To further simplify installation, the Gateway can be powered over Ethernet (PoE), removing the need for separate power supplies or wiring. The ENGAGE Gateway performs regular, frequent communication between the Gateway and linked ENGAGE enabled devices. The Gateway is able to send commands such as lock and unlock from an IP host in real-time. Commands are executed in less than five seconds. As an Internet of Things (IoT) device, the Gateway leverages network security practices, including AES-256 bit and TLS encryption, to provide customers with secure, dependable experiences. Solutions for housing and education markets The ENGAGE IP Gateway integration allows us to deepen our support for specific verticals"RS2 customers were already able to utilise its Access It! Universal.Net with the Schlage NDE, LE and AD Series locks. This integration of the new software with the ENGAGE IP Gateway will further support the Schlage LE and NDE locks, and it adds the Schlage Control and Von Duprin perimeter security solutions to the offering. “In addition to expanding our scalable, flexible solutions for our integrators and end users, the ENGAGE IP Gateway integration allows us to deepen our support for specific verticals,” said Jeff Bransfield, national sales manager at RS2 Technologies. “We’ve seen demand from the multifamily housing market for the Schlage Control locks. And the Von Duprin RU and RM options are an excellent fit for the education market and larger venues. Adding these to our portfolio through the IP-based integration will help us better serve our customer bases.” Schlage Control Smart Deadbolts The Von Duprin RU and RM options expand the reach of the access control system to perimeter openings beyond main entrancesThe Schlage Control Smart Deadbolts offer highly scalable, efficiency-boosting capabilities so that multifamily properties can focus on operating more profitably—and with greater appeal for residents. Property managers can configure and manage access from virtually anywhere and moving to smart credentials eliminate the costs and hassles of managing keys. The Von Duprin RU and RM options expand the reach of the access control system to perimeter openings beyond main entrances. The Von Duprin RU option retrofit kit for exit devices is a cost-effective solution that enables remote locking (undogging) for centralised lock down and door status monitoring. The RM option is a sensor-only configuration for exit only or fire rate doors that require monitoring. Version 7.0 of Access It! Universal.NET, an industry-leading access control solution, continues to deliver a complete access control solution at an unsurpassed value. Access It! Universal.NET Version 7.0 is built with a focus on interoperability, security and scalability. New features include expanded support for leading hardware solutions, destination dispatch, expanded reporting and filtering, QR codes for badging and operating modes for enhanced system control and flexibility.
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based multi-platform solution, is demonstrating the capabilities of their visitor management and communication software at ISC West this week. Originally developed for school campus applications, the software incorporates a fully-integrated suite of modules including visitor management, lockdown initiation and much more. “Our desire for a better way to protect the students, staff and visitors at schools was the initial impetus for the development of the SilverShield system,” said Robin Baker, CTO, SilverShield. “Now we are expanding our focus to offer our unique solution to a wider audience, including medical-related facilities and businesses of all types.” Unmanned visitor screening Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time Designed to expedite emergency security procedures, the SilverShield Visitor Management System enables manned or unmanned visitor screening at all types of facilities. Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time. If there is a threat identified at any entrance, the system allows silent alerts to be sent immediately to designated stakeholders. You can also use the SilverShield system to create temporary ID badges, identify any known VIPs upon arrival, notify your staff of VIP or other visitor arrivals, and maintain a database of visitor history. When integrated with the SilverShield ID Badge System, the system can also generate permanent ID badging for staff, students, volunteers and vendors. The SilverShield Virtual Lockdown System alerts designated stakeholders via an audible siren sent to all users’ computers or mobile devices in case of an emergency. Visitor management system This siren, audible even if the users are wearing earbuds or have other applications running on their devices, instantly prompts users to take immediate action to initiate their lockdown procedures. The SilverShield Incident Management System is a near-real-time alarm system that integrates directly with the Visitor Management System or can be used stand-alone. It can alert local police, initiate a virtual lockdown, and produce mass emergency notifications via email, SMS/text, mobile and web push notifications. The siren is audible even if the users are wearing earbuds or have other applications running The SilverShield Event Management System pre-screens guests against watchlists and the national sex offender database, ensuring that unwanted guests are not invited to your events. The system will manage RSVPs and can even issue parking and visitor passes to approved guests via email and SMS/text– letting event administrators increase control over their events. Learning management system SilverShield Virtual Academy can be used for all types of security and other proprietary training. A video-based Learning Management System with lessons and assignments that you can create or purchase from SilverShield ensures that your staff is trained properly. The in-app SilverShield HR & Safety Resource Center connects schools and businesses with local, highly-trained security professionals to develop a security assessment, plan and documentation – ensuring your organisation and staff is prepared and trained in the event of an emergency. The SilverShield Kiosk System empowers visitors to register themselves upon arrival – manually or by scanning a valid ID. Ideal for organisations with unstaffed entrances, the Kiosk System will quickly notify staff of VIPs or unwelcome guests, increasing security at all entrances.
An innovative technology is changing the way law enforcement agencies combat crime and ensure public safety. Footprint, a web-based situational awareness software, aggregates, analyses and monitors data from multiple video monitoring systems and other sensors in one intuitive platform. The tool enables law enforcement to solve cases quicker using data-driven decisions, while minimising manpower and driving down costs as a result. Copp Integrated Systems, a Dayton, Ohio-based security systems supplier, is one of the licensees of Footprint and introduced the product to the global market. Bill DeFries, CEO of Copp Integrated Systems, says Footprint is a game changer for law enforcement agencies of any size. Footprint provides a 21st-century crime data and video analytics infrastructure that is easily deployed and visually useful" Deterring and preventing crimes “For the first time, law enforcement has total situational awareness,” said DeFries. “Footprint provides a 21st-century crime data and video analytics infrastructure that is easily deployed and visually useful. By leveraging crime data and using predictive analysis, Footprint users can deploy resources more efficiently, catch criminals faster and deter and prevent crimes before they happen.” Developed in partnership with the University of Dayton Research Institute’s (UDRI) Software Systems Group, Footprint is at the forefront of ensuring the highest level of public safety. Seamless video analysis experience “Footprint is a force multiplier,” said DeFries. “It brings together any number of disparate data sources, including public and private video, CAD 911, RMS and arrest records, and visualises it all on ESRI heat maps. Because Footprint can be accessed via smartphones, tablets, laptops and other devices, it allows law enforcement officers to rapidly gather critical information at the scene of a crime.” With the Milestone integration, Footprint can ingest and store live and recorded video from multiple sources and locations" Footprint combines several industry-leading technologies into a single operating platform. In partnership with video management solutions provider, Milestone Systems, Footprint provides a seamless video analysis experience. Jeremy Scott, Strategic Alliance Manager at Milestone Systems, said, “With the Milestone integration, Footprint can ingest and store live and recorded video from multiple sources and locations, including CCTV footage. The open platform software operates with many different brands of access control, analytics and IoT devices as well, making it a flexible tool for law enforcement.” Video content analytics platform Footprint’s extensive video content analytics capabilities are provided by BriefCam, which enables users to review hours of video surveillance footage in minutes and rapidly search and identify people or objects of interest. BriefCam’s video content analytics platform saves law enforcement agencies precious time and resources, said Stephanie Weagle, Chief Marketing Officer at BriefCam. “BriefCam takes raw video content and transforms it into actionable data that is searchable, actionable and quantifiable. Video surveillance footage has never been more valuable with the ability to efficiently and effectively review and analyse its content to accelerate investigations, attain situational awareness and derive operational intelligence,” she said. Integrated for seamless user experience It is projects like Footprint that help foster collaboration between multiple platforms for best-of-breed solutions that make a real difference"Because BriefCam and Milestone are deeply integrated for a seamless user experience in the XProtect Smart Client, the partnership with Footprint was a natural fit. As Scott explains, “It is projects like Footprint that help foster collaboration between multiple platforms for best-of-breed solutions that make a real difference. This illustrates the power of what we can do together with a third party such as Footprint.” One law enforcement agency that has deployed Footprint is the Walton County Sheriff’s Office (WCSO) in Defuniak Springs, Florida. Dave Markham, President of Copp Integrated Systems, has been working closely with WSCO on the implementation of the crime-fighting software. “I have seen first-hand how the implementation of Footprint has become a force multiplier and enabled WCSO to maximise their resources and focus on keeping all their citizens safe,” Markham said. Higher level of situational awareness Footprint could be used to deliver a higher level of situational awareness and public safety in any populated environment such as hospitals, airports"He added, “With Footprint tightly integrated with both Milestone and BriefCam, WCSO can now work closer with their local community in a private-public partnership analysing video crime data from both WCSO cameras as well as independent owners’ video feeds.” While Footprint was initially developed with law enforcement in mind, the technology can also be adapted for other environments, said DeFries. “Since Copp Integrated Systems first introduced Footprint to the market, it has garnered attention from national and international state and countrywide public safety agencies,” he said. DeFries added, “Beyond law enforcement, Footprint could be used to deliver a higher level of situational awareness and public safety in any populated environment such as hospitals, airports, arenas, stadiums, office or school campuses and military bases.”
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial Intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing humans from animals and statues The AI system continuously analyses video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting people’s privacy with AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common use cases of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognise potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security best practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organisations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology in school security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-hour monitoring solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorised to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting and landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing physical environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualisation and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organisations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you. Protecting educational facilities UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasise these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses. The primary mission of these organisations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different. This organisation, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus. Active shooter incidents In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue. Educational institutions face an increasingly complex risk environment UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder. At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralise video management, viewing and analysis. Upgrading from analogue systems Altogether, its security system consisted of older analogue platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralise system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed. Security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure The university deployed an HCI solution, one that is optimised for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximises performance and storage capacity utilisation. The platform also hosts the university’s video management solution, which serves as a centralised source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection. Protecting air travel and airports In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernise and expand the facility to meet increased passenger demand. While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernise its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs. Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process. Storage system updates It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance. Users rely on video to validate whether something did or did not happen - and this is essential in airports HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. Reducing expenses and costs The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialised IT skills. These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organisations of all types and they need to ensure their investment in capturing this data is protected. From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American market, where there was ‘positive year-over-year growth’ in 2018 and ‘strong’ sales in Q1 this year, according to Eric Chen, General Manager of Hikvision USA and Hikvision Canada. HikCentral central management software The company’s U.S. focus is shifting from products to solution sales, with emphasis on ‘mid-market’ small- and medium-sized businesses (SMBs). The largest verticals are retail and education, and there are emerging opportunities in the cannabis market. Launch of the HikCentral central management software (CMS) is a component of the company’s solution-sales approach. Launch of the HikCentral central management software is a component of the company’s solution-sales approachMr. He acknowledges the growth of ‘anti-China sentiment’ in the United States and other parts of the world, which he says will impact Hikvision’s operations globally. Specifically, in the U.S., ‘political’ elements impacting Hikvision’s business include ongoing tariffs and a trade war, Congressional calls for export controls and sanctions, and a provision of the National Defense Authorization Act (NDAA) that bans use of Chinese video surveillance products in government applications. Specifying cybersecurity initiatives at ISC West In spite of it all, Hikvision’s message at the recent ISC West show was overwhelmingly positive, and the company also detailed cybersecurity initiatives they say put the Chinese company ahead of many competitors in the industry. Eric Chen came in as General Manager last year; he previously spent a decade working for Hikvision in China. Chen reports solid 18.8% year-over-year growth for Hikvision globally, totalling $7.4 billion last year. He notes the company saw 40% compounded growth between 2010 and 2018. Globally, there are 34,000 employees, 16,000 of whom are research and development (R&D) engineers. Hikvision’s expanding global footprint includes 46 international branches. There are three manufacturing facilities in China, in addition to one in India. HikRewards program for HDP customers At ISC West, Hikvision’s theme was ‘Focus on Your Success’, including introduction of the HikRewards program that provides rebates to HDP (Hikvision Dealer Partner) customers, their core dealer base. A new online Hikvision Knowledge Library for HDPs provides training and reference materials dealers can share with employees. A new tech centre, introduced in December, provides data sheets, product information, and support resources. There is also a North American R&D team headquartered in Montreal. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls A customer satisfaction survey launched in March provided good feedback from customers. “They know who to call if they have a problem,” says Chen. “We want to focus on making customers successful.” The success theme also extends to Hikvision employees, who are featured in videos describing their jobs and enthusiasm for Hikvision. There are some 400 employees in the North American operation. At the industry’s largest U.S. trade show, Hikvision unveiled a brand-new booth with plenty of open space and video walls. Half of the booth was focussed on solutions, especially retail and education, and also gaming and commercial real estate. Security products displayed at ISC West A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS systemProduct highlights at the ISC West booth included the 32-megapixel PanoVu multi-sensor dome camera, whose 180-degree panoramic image was displayed on a 65-inch monitor. A variety of devices, including access control, intercoms and cameras, are integrated using the HikCentral CMS system. Some products new to the North American market, including intercoms, turnstiles, emergency call stations, and under-vehicle inspection, were displayed. Hikvision’s deep learning products are moving into their second generation, including the ability to obscure private information on videos to comply with GDPR/privacy requirements (previewed at ISC West and released later in the year). Algorithm components of Hikvision’s DeepInMind artificial intelligence are being adapted into a platform called AcuSense for value-priced products, which can recognise a human or vehicle and help filter out false alarms. Also being adapted to products with lower price points are the ColorVu system that incorporates visible light LEDs to provide colour images at night, and DarkFighter low-light capabilities. Penetration testing of cameras and NVRs As a global manufacturer, Hikvision faces a high level of scrutiny about cybersecurity, which Mr. Chen says is “a good thing for us,” enabling them to highlight the steps they are taking to improve cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity. Chuck Davis, Director of Cybersecurity, outlined specific milestones Hikvision has achieved in its quest to provide world-class cybersecurity In September 2017, Hikvision began working with third parties (including Rapid7) for penetration testing (ethical hacking) of its cameras and recorders. That same month, Hikvision set up a Cybersecurity Hotline open to anyone with questions about cybersecurity, including white-hat hackers and researchers. Even before that, Hikvision had an open-door policy on cybersecurity and a program for patching and disclosing responsibility. In February of 2018, Hikvision released a 40-page Cybersecurity White Paper describing cybersecurity testing and processes built into the software development lifecycle. That same month, Hikvision launched an Opened Source Code Transparency Center and offered an open invitation to anyone wanting to inspect Hikvision’s source code and let them know of any vulnerabilities. FIPS 140-2 certification by NIST Hikvision has also become a Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA), which ensures their patching and incident reporting programs have been reviewed by a CNA partnering company. Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVRsIn August, Hikvision received Federal Information Processing Standard (FIPS) 140-2 certification, a U.S. government encryption standard created by the National Institute of Standards and Technology (NIST). Hikvision's encryption module (HIKSSL) received Level 1 FIPS 140-2 certification to be used in both IP cameras and NVR products. Davis said the FIPS 140-2 certification process began before the NDAA ban on use of Hikvision products in the U.S. government, and in any case is a standard that ensures a high level of encryption. “We wanted to make sure we had the same level of technology,” he says. “It was not to win over the government.” Making industry more cybersecure “We are really trying to have third parties test and certify our equipment,” adds Davis. “We are trying to be open and transparent. Education and awareness are key.” “We need the trust of customers in the security community,” says Mr. He. “No matter what, we have to follow the highest standards to offset the concerns and accusations.” In April 2018, Davis became a member of the Security Industry Association (SIA) Cybersecurity Advisory Board to help make the entire industry more cybersecure through education, awareness and standards. Hikvision has also joined the Forum of Incident Response and Security Teams (FIRST at first.org), a global cybersecurity incident response consortium that cooperatively handles computer security incidents and promotes incident prevention programs. Davis has presented Cybersecurity Road Shows in 22 cities in the United States and Canada, and also in Australia and New Zealand. The 90-minute presentations focus on education awareness around cybersecurity and seek to get attendees engaged and aware about cybersecurity in business and also in their homes.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying buying influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalised matchmaking programs ISC West also provides personalised matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network security products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
The Emerging Technology Zone (ETZ) at ISC West welcomes new startups to the security industry; a requirement for exhibitors is that they have been in business for five years or less. This year, the ETZ will be in the Venetian Ballroom, a new section at ISC West 2019, incorporating companies that were previously featured in the “Global Expo” area along with mid-sized domestic companies and the return of the successful Emerging Technology Zone section. Now located in the Venetian Ballroom adjacent to the Sands Convention Center, this group of exhibitors will also have three large entrances of their own. Latest technology companies The ETZ will be a draw in and of itself and will do better for us than being on the main show floor" “The Emerging Technology Zone is a place for attendees to see the latest technology companies all in one place, rather than searching out individual companies all over the main show floor,” says Tom Buckley, Vice President, Sales and Marketing, for Qumulex, a 2019 exhibitor in the Emerging Technology Zone (ETZ). “The ETZ was an easy choice for us and is, in fact, the deciding factor in our taking a booth,” says Buckley. “As a technology startup, we wanted to be located with the other new companies. The ETZ will be a draw in and of itself and will do better for us than being on the main show floor.” Consistent customer lifetime Qumulex (Booth 40932) was formed in late 2018 by the founders of Exacq and Infinias. The new mobile-first, unified video surveillance and access control platform enables security integrators to increase recurring revenue and achieve consistent customer lifetime value, says Buckley. ”We are launching in the fall of 2019 but are exhibiting at ISC West due to early interest from security integrators wanting an early preview of what is coming.” Also among the 40 or so exhibitors in the Emerging Technology Zone will be a range of new technologies, from artificial intelligence (AI) to cloud solutions to wearables to lighting solutions and more. Video analytics platform Simple, intuitive situational awareness platform that gives first responders a tactical advantage Another ETZ exhibitor is ZeroEyes (Booth 40821), an intelligent video analytics platform, powered by AI, to detect weapons and recognise faces in real time. The company’s goal is to provide school administrators and decision-makers with a simple, intuitive situational awareness platform that gives first responders a tactical advantage. The company was founded by five former Navy SEALS with a combined 50 years of combat experience. “Our platform is being developed right now and has hit an inflection point where artificial intelligence and graphics processors are both capable enough and cost effective,” says Mike Lahiff, ZeroEyes CEO. “This technology is just at the point where it is ready for a wider release and not just for early adopters.” The company will be doing live demonstrations of the product in real time. “It is one thing to tell everyone our capabilities, but it is much more powerful to show our capabilities,” says Rob Huberty, ZeroEyes COO. “We will have cameras set up that are typical of school security systems. These cameras will be linked to the best available hardware on the market. We will showcase our software as it will actually be used in practice.” Companies at ETZ Last year’s Emerging Technology Zone, located downstairs on the lower level of the Sands Convention Center, had a lot of foot traffic and created positive feedback. Some of last year’s Emerging Technology Zone companies are exhibiting in the main exhibit hall this year, emphasising its role as a ‘stepping stone’ as new companies enter the market and then achieve critical mass. This year’s ETZ exhibitors will be looking for a similar level of results from the show. Our expectation is to demonstrate the huge value proposition in proactive security solutions in schools" “We will quantify our success at ISC West in the number of partners and integrators that decide they cannot live without our product,” says Lahiff. “Our expectation is to demonstrate the huge value proposition in proactive security solutions in schools. We want to have partners after the show ready to install our product.” Pre-show preparation will help ensure success. “We are inviting prospects and arranging demos ahead of time,” says Buckley of Qumulex. “Success at any trade show starts before the show. We’re fairly certain about the turnout we will get and the level of interest that integrators will have. We are sending out invites to several thousand security integrators to gain early interest. We also have a suite off the show floor for more in-depth demos.” Affordable solutions The Emerging Technology Zone, along with the other exhibitors in the Venetian Ballroom, will be among the must-see highlights of ISC West. “Attendees will get to see the future in security,” says Huberty. “They will see actual solutions that are affordable and make sense. These solutions will have a clear value proposition.”
After a period of decline, the number of pupils being expelled from mainstream schools is increasing, placing more pressure on the need for Pupil Referral Units and the security at these premises, which is vital for managing student and staff safety. ASSA ABLOY High Security & Safety Group offers a range of locks and doors suited to the sensitive needs of Pupil Referral Units and pupils in care. Fire resistance integrity All doorsets in the Secure Education range are independently tested and certified The breadth of doorset solutions means the High Security & Safety Group can specify products for every area and need of a secure education environment. From classroom doors and personnel doors to circulation doors and high-performance doors. All doorsets in the Secure Education range are independently tested and certified to achieve 60minute fire resistance integrity and insulation to BS EN 1634 from both sides of the door. In addition, all doors within the offering are tested in line with the Department of Health’s environmental design guide attack test for secure services, as well as meeting with DD171 & BS EN 1192 severe duty performance and strength, and are tested to PAS 24 enhanced security performance requirements. Secure educational facilities This guaranteed and certified level of performance gives building owners and users the peace of mind that all doorsets are fit for purpose, as well as providing the added level of security and safety often needed in secure educational facilities. Mike Dunn, Commercial Director for ASSA ABLOY High Security & Safety Group, said: “A recent report by the think tank IPPR, found the total number of children being taught in ‘alternative provision’ for excluded children is far higher than the total number of reported exclusions. This will inevitably mean increasing pressure on facilities, such as Pupil Referral Units, and the safety of staff and pupils within those buildings.” Added level of security Pupil Referral Units are first and foremost a place of education" “Pupil Referral Units are first and foremost a place of education and therefore doors and locks must allow for this, grant access, as well as restricting permissions. However, an added level of security and safety must be considered and handled sensitively within these premises.” “Our experience and wide product range means we can advise on and supply doors and locks for every aspect of a secure education environment, mitigating any risk and ensuring a smooth specification process.” Doors within the Secure Education range come in a variety of materials and finishes, giving specifiers improved design flexibility.
Maintaining an educational environment that is conducive to learning requires, at a minimum, that we keep our school children safe and secure. It’s easier said than done, given the wide range of sizes and types of educational institutions. Campus Security High-profile violence in educational environments highlight the urgency of the need for security and safety systems High-profile violence in educational environments highlight the urgency of the need for security and safety systems, and the challenges extend beyond preventing the active shooter incidents that grab headlines. In the United States, 79% of public schools recorded that one or more incidents of violence, theft, or other crimes had taken place, amounting to 1.4 million crimes. That translates to a rate of 29 crimes per 1,000 students. Security is a 24-hour challenge. Protecting schools involves deployment of a range of security and physical hardening tools. Reducing risk requires that access to school buildings be controlled, while also preserving an ‘open’ campus atmosphere that promotes a learning environment. Schools should be an inviting place for students and families, so technology solutions aimed at restricting access should be low-profile and unobtrusive. School security must also be designed in layers, or concentric circles of protection, starting at the school’s perimeter and working inward to secure individual classrooms and other internal areas. Enhancing video security at schools Video surveillance is a technology that is unobtrusive and can promote security beginning at the outermost boundaries of the school environment – at the perimeter and as automobiles drive onto school grounds. Surveillance can keep a silent and constant watch on people comes and goes. Furthermore, incorporating new artificial intelligence (AI) and deep learning technologies are increasing the real-time capabilities of video surveillance to provide early warning of a possible security threat as it enters a campus. AI and deep learning analyse the content of video feeds and provide usable information to security personnel, including analysis of trends and real-time alarms when an event takes place. Incorporating AI into video security Video feeds are analysed in real-time and alarms can be raised only if there is a problem In addition to controlling perimeter access, video surveillance incorporating AI can also provide other benefits, such as keeping watch on a school campus after hours – before and after school, or even on weekends when extra-curricular activities may be taking place. The systems can monitor traffic flow and ensure that only authorised vehicles enter an area. The benefits of AI-driven video systems also enable greater effectiveness of systems that are not being actively monitored. Video feeds are analysed in real-time and alarms can be raised only if there is a problem. Whenever a vehicle passes into a restricted area on a school’s campus, the video system captures a vehicle image and automatically provides significant data. ANPR systems Automated number plate recognition (ANPR) systems identify the license numbers of cars that enter a school’s parking entrance or gate and can match the numbers to a watch list and provide an alarm. The technology could also be used to monitor compliance with restricted areas; for example, to only allow vehicles that registered for a parking pass to park in a certain lot. A more advanced approach could involve dual identification technologies – vehicle plate and facial recognition of a driver – to add another layer of security. Video systems with illegal parking detection can define a zone for no parking at a school. If any vehicle enters the area, the camera will be triggered to collect evidence. Images are captured of illegally parked vehicles, and the system provides data about when and where it occurred, the vehicle plate number and the parking violation. Traffic cameras with DL technology Traffic cameras with deep learning technology can also identify and classify vehicles Traffic cameras with deep learning technology can also identify and classify vehicles; in effect, to distinguish between small and large vehicles and even detect a vehicle’s make, model and colour. For instance, it is possible to differentiate between cars and buses in ‘buses only’ areas. Currently such cameras are more commonly deployed on public streets and highways, but the capability is there. The system can also capture images and produce alarm data if a vehicle is driven in the wrong direction, such as into an exit-only lane or the wrong way on a roadway. Facial recognition systems Facial recognition can be used at school entrances and gates to promote security of students and staff and to identify known suspects who attempt to enter the building. ‘Blacklist alarm’ technology generates a notification if a known suspect enters. Clarity is paramount when identifying faces, and cameras that provide wide dynamic range (WDR) can offset challenges such as backlighting on a bright day when the light behind a person coming in is brighter than the ambient light inside. People counting cameras Facial recognition systems can also be used inside school buildings. A facial recognition terminal installed at the entrance of a campus building or library can be configured to ensure that only registered students and staff have access to the buildings. People counting cameras can be used in cafeterias and libraries to provide daily or monthly traffic reports and to better understand peak times and arrange workflow accordingly. Unified security solution Tedious and error-prone manual monitoring can now be replaced by more intelligent systems Feeds from all the cameras can be managed, monitored and stored in an authorised security centre, either located on a campus or in a central location that combines camera feeds from multiple campuses in a school district, for example. In general, security staff can access surveillance data in a variety of ways, via a desktop, laptop, or mobile device. Such flexibility makes the job of security personnel easier. A campus police or resource officer can view video on a mobile device while patrolling the campus. Often video surveillance systems at schools are not monitored. School security personnel have more pressing duties than sitting in front of a video monitor, and it is difficult for operators to stay alert for detailed incidents that may be shown on the screen. Tedious and error-prone manual monitoring can now be replaced by more intelligent systems that provide alarms only when there is something to see. Maximising school surveillance capabilities Systems to maximise school surveillance and security include dedicated, high-performance cameras for event capture, embedded network video recorder for event recording and storage, and a centralised video management platform to unify the system. AI and deep learning technologies automate security processes and provide useful real-time information that extends beyond video images. Deploying these technologies at the perimeter can promote better security campus-wide by preventing danger from entering the learning environment.
Each of Denmark’s 550 individual Free Schools shares a common ethos: parents and students participate together in activities outside school hours, including weekends. It’s excellent for building a school community. Not so easy for managing security, when issuing and tracking keys becomes a 7-day task every week. The Vejle Friskole turned to SMARTair® wireless access control for a solution. Previously, key management ate up “a very long time, approximately 5 hours a week,” explains Henrik Kækel, Technical Service Officer at Vejle Friskole. Individual access permissions Vejle Friskole’s mechanical keys have been replaced by a SMARTair access control system Secure wireless electronic locks, already proven in schools across Europe, were the answer. Vejle Friskole’s mechanical keys have been replaced by a SMARTair® access control system. Over 80 doors and cabinets around the school are secured with SMARTair® wireless devices. Even at a historic property like Vejle Friskole, battery-powered SMARTair® devices are easy and unobtrusive to retrofit. Now approximately 250 students, teachers and parents each carry their own key fob, programmed with individual access permissions. Because the SMARTair® system portfolio has locking devices tailored to different kinds of openings, everyone at the Friskole opens the right doors and cabinets with a single fob. There’s no more need for the school to distribute separate keys for student or staff lockers, for example. Issuing fobs “It was really bad because we had big problems with keys that were lost,” says Henrik Kækel. “There was a lot of work in key administration.” SMARTair® is easy for the school to manage. Today, Vejle Friskole staff spend around 5 minutes a week managing their access system. It's incredibly easy to figure out... it takes 1 minute to code a student" “It's incredibly easy to figure out... it takes 1 minute to code a student,” he adds. Even managing the leasing of school buildings for non-school events is simple and secure. School facilities staff issue fobs for the duration of the event, then cancel them immediately afterwards – with no concerns someone may have copied a physical key. Saving staff time In addition to making everyday life easier and saving staff time and admin costs, SMARTair® has increased security. Using the intuitive SMARTair® software, they always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using their SMARTair® system. And it's no disaster if a credential gets lost. Henrik adds: “Then we cancel the credential and issue a new one.” Vejle Friskole’s SMARTair® system is easy, fast and cost-effective to extend to new doors, cabinets and users — at the beginning of a new school year, or any time they choose.
The school gate is more than just a physical barrier. The moment a child passes through, the school assumes their duty of care. That’s why regulations in France stipulate schools must verify the identity of everyone who enters. And the gate is where SMARTair now begins its work at Lycée Kreisker, in Brittany. This large, mixed-age school had high standards for a prospective new access control system. The security of the site and safety of students and staff who use it every day was a must. The school also wanted to get rid of keys. Their previous, stressful solution involved managing two separate key systems. However, managers assumed any user-friendly electronic system would break the budget. They also assumed an electronic access system would be too complicated to manage and take too long to deliver and install. Wireless access control system SMARTair readers control access through the main school gate — a critical first line of defence against intrusionThe cost-effective answer was an access control system with battery-powered locks. The first phase of SMARTair system installation is now complete. SMARTair readers control access through the main school gate — a critical first line of defence against intrusion. Classrooms and the intern room are protected with SMARTair wireless escutcheons. Around 2,000 credentials have been issued to staff and students. Basic administration is carried out in-house by non-technical staff, with the easy-to-use SMARTair software. System configuration and maintenance was easily and affordably outsourced. So, for example, selected doors can be pre-programmed to remain open between 9am and 5pm but require a credential for out-of-hours access. Affordability was another issue, and common to many public sector institutions. At Lycée Kreisker, there was insufficient budget for an elaborate, expensive access control system, as wired systems can be. With SMARTair there’s no wiring around the door, so installation is fast and unobtrusive. There are multiple SMARTair devices to protect different types of opening, so minimal alterations to existing doors are required. Protecting staff, students during emergency SMARTair plays a key role in the Lycée’s regulatory duty to protect staff and students during an emergencySMARTair plays a key role in the Lycée’s regulatory duty to protect staff and students during an emergency, including terrorism or natural disaster: the “plan for implementing security” (or PPMS). SMARTair ensures only authorised people enter the building. Under the PPMS, real-time control enabled by SMARTair also allows staff and children to be safely confined within locked classrooms, should they need to await emergency services. With the myth that powerful access control must be expensive now shattered, Lycée Kresiker plans to extend the SMARTair installation to all doors. The process of becoming keyless — and stress-free — is under way.
IDF Aluminium has installed transom closers, solenoid locks and hook locks from Alpro Architectural Hardware at a building in a historic section of London’s Finsbury Square. 4 Chiswell Street backs onto the Artillery Ground which has seen archery in Tudor times, some of the first organised games of cricket in the 1730s and even a hot-air balloon flight in 1784. The four-storey structure was refurbished by main contractor Parkeray to a design by Ben Adams Architects that created column-free office space with exposed concrete soffit and a signature golden mesh & grille facade based on curtain walling with bold circles. Automatic voltage regulation The glazing is unusual since the Reynaers’ curtain walling for the double-height reception uses innovative bracketry to support massive panes from Euroview Architectural Glass. The Alpro closers are on the distinctive gilt exterior doors and the client is also benefiting from solenoid bolts in the door heads. Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg, a bolt throw of 14mm and models with oversize pins. The advanced microprocessor module provides power reduction allowing for continuous operation without heat generation as well as automatic voltage regulation, dual monitoring and access control features to fully monitor and control movement. Installers can use housings from the same series for surface mounting which facilitates the securing of glass doors. Dress plates are offered for a clean finish. Public sector environments The 4 Chiswell Street refurbishment was carried out with tenants in occupation and even involved use of abseiling techniques to replace glazing. A temporary reception was created for access and egress. Daylight has been maximised and floor-to-ceiling height is used wherever possible in a design that meets the Equality Act and includes a revised fire strategy. IDF specialises in the design, manufacture and installation of aluminium doors. The door projects are often in business and public sector environments where usage may be high but maintenance costs must be minimised. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that Utrecht University in The Netherlands has installed a custom-made, TQM manual revolving door at the entrance to the school’s newest addition, the Viktor J. Koningsberger building, dedicated to the faculties of Geosciences, Science and Medicine. Renowned Rotterdam-based architects, Ectory Hoogstad, were asked to create a building at Utrecht University that would serve as an addition to two other existing buildings: the Minnaert building and the Buys Ballot building. The new entrance had to be functional and recognisable, but also belong to the story of the building as a whole"Joost Ector, Director and Project Architect, explains, "All buildings had to be combined into one educational centre for the science faculties. We solved that very simply by making a kind of 'loop' on the first floor; a circuit that runs through all the buildings. A new building has been added on the corner, and that is what has become the Koningsberger building. Through the 'walk', all buildings are now connected, and the students can easily walk from one building to another.” Functional and aesthetic entrance The central themes in the design of this iconic building are lightness, openness and transparency. These properties are reflected in the façade and play an important role at the main entrance. "Of course, we want you to be able to enter the cluster of buildings from all sides of the campus easily,” says Ector. “So the new entrance had to be functional and recognisable, but also belong to the story of the building as a whole. You walk down to the building, make that little turn through the entrance and then you suddenly see that the big atrium going up a hundred times. We just love that!" TQM manual revolving door Once we decided to go with a manual revolving door, there was obviously only one name that stood out - and that was Boon Edam"When it came to selecting the entrance to the new building addition, Ector said his choice for the revolving door came naturally. “Once we decided to go with a manual revolving door, there was obviously only one name that stood out - and that was Boon Edam. We knew that Boon Edam made premium products and was capable of doing what we needed when it comes to these kinds of custom-made solutions. We came to our final solution after close consultation with their experts." The TQM manual revolving door installed at the Koningsberger building is nine meters (29-1/2 feet) high and is constructed almost entirely of glass. Nine-meter high rotating parts were not desirable, so a different solution was chosen. Installing illuminated cylinder A special tall, illuminated cylinder was installed above the revolving door for an impressive and recognisable appearance. "Our inspiration were old houses, such as canal houses,” explains Ector. “There is sometimes a kind of 'lantern' incorporated in the skylight above the front door in these old-fashioned homes. We utilised this in the TQM revolving door. “The cylinder was pulled upwards, and an illuminated element was manufactured. This constructed feature can be seen from both the outside and inside and serves as a beacon of light in the evening to help guide and locate the entrance.”
Round table discussion
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s Expert Panel Roundtable to reflect on instances when the industry may fall short: Which segments of the physical security industry are most under-served and why?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
The new year presents new opportunities for the physical security marketplace. In many ways, 2018 will undoubtedly see further development of trends we saw in 2017. In fact, some of the trends determining the future of the physical security industry have been in place for many years. However, not every event in 2018 can be foreseen or easily predicted. To be sure, it is sometimes the surprises that keep life interesting! We asked this week Expert Panel Roundtable: What will be the security market’s biggest surprise in 2018?