Security alarm systems
By popular demand, NAPCO Security Technologies, known for innovative technology and reliable professional security solutions, is expanding its globally renowned and award-winning line of StarLink Universal Cellular Communicators with new models on the AT&T LTE network, so important in various areas of the United States of America. The much-anticipated StarLink LTE AT&T Cell and Cell/IP Communicator models include StarLink Fire Commercial Fire Communicators, plus StarLink Intrusion Cellu...
Exacq has announced its integration with the highly rated monitoring station software, MASterMind. These technologies combined utilise video verification services to receive live video from the exacq Network Video Recorder when an event occurs, and sends a call to the monitoring station call centre. Made possible through the Connected Partner Program, the exacqVision and MASterMind integration allows seamless collaboration of video into the dispatching process through MASvideo. This provides co...
Hikvision, global supplier of innovative video surveillance products and solutions, has released a new Thermal Bi-spectrum Deep Learning Turret Camera, which will bring enhanced capabilities of indoor fire detection, including an advanced temperature anomaly alarm and visual warning. This new cost-effective camera (DS-2TD1217/V1 Series) reduces the risks of fire and property loss. Thermal Bi-spectrum DL Turret Hikvision’s Thermal Bi-spectrum Deep Learning Turret Camera supports fir...
The New Jersey Electronic Security Association (NJESA), which represents electronic security professionals, system integrators, fire alarm companies, manufacturers and distributors that do business in New Jersey, is offering a career training class for high school students that will provide extensive training in the electronic security and life safety industry. Certified Alarm Technician Level I The Certified Alarm Technician Level I Training class, exclusive for high school students who...
Rapidly-expanding, tech-driven security specialist Safer Scotland has strengthened its financial infrastructure with the appointment of a new Finance Manager to oversee the company’s fiscal processes. It has signed up former Balfour Beattie accountant Nicole Finnegan with a remit to assume responsibility for all financial matters and, with Safer Scotland Director Ryan Clark, co-ordinate future strategy regarding forecasts and targets. CCTV and security alarms expert The appointment is t...
Dahua Technology, globally renowned video-centric smart IoT solutions and service provider, has launched IVSS 2.0 (IVSS7000-I), an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. Upgraded IVSS 7000-I The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua Deep-Learning algorithm with GPU group enables IVSS7000-I to perform face recogni...
ADT continues expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich., with offices in Novi (Detroit), Mich., and Columbus, Ohio. Family owned and operated since 1974, Security Corporation has earned customer loyalty by providing responsive customer service and innovative security products to businesses, financial institutions, academic centres and government offices in the Midwest region. Growing commercial business “This strategic acquisition is the latest in a series of efforts to continue driving our commercial business to the next level giving us an opportunity to reach our customers with unmatched service in every fire, life safety and security discipline across the United States,” said Executive Vice President, ADT Commercial Dan Bresingham. “Security Corporation has built long-lasting client relationships because of their focus on putting the customer first. Bringing the team of well-trained professionals on board helps Red Hawk and ADT Commercial further strengthen our rapidly growing presence and technical capabilities in the Midwest region while also adding to our customer-centric culture,” said Senior Vice President Red Hawk Fire & Security, ADT Commercial Michael McWilliams. Technical and financial resources “Joining these industry leaders is a fitting next step in the evolution of a company that has taken pride in providing the very best of the best for our customers. Teaming up with Red Hawk and ADT Commercial will provide deeper technical and financial resources to further serve our clients here in the Midwest,” said Security Corporation President Robert Holloway II.
The National Security Inspectorate (NSI), the UK’s independent certification body specialising in the security and fire safety sectors, shared in the success of this year’s IFSEC and FIREX exhibitions as the integrated events proved important forums for approved companies and applicants, as well as key industry stakeholders, to engage face-to-face with NSI experts. The three-day events provided a vital opportunity to raise awareness of the valuable role of independent certification in enhancing the performance and operational effectiveness across the sectors. NSI’s continued support for the Show Me How feature was evident with a series of sessions on the NSI stand. The topics included updates on PD 6662 for the installation of alarm systems, the new Kitchen Fire Protection Systems scheme (SP206), NSI’s CCTV Code of Practice NCP104 and the latest modifications to the SIA Approved Contractor Scheme workbook. Importance of using trained risk assessors NSI Chief Executive Richard Jenkins presented the heat winners’ prizes at the end of the final day in the Keynote ArenaNSI’s Head of Field Operations (Systems), John Davidson spoke at FIREX to a packed theatre on the importance of using competent, trained risk assessors to complete life safety fire risk assessments. Once again, NSI auditors judged the work of teams competing in the Engineers of Tomorrow Competition, a key attraction within IFSEC International. This year the competition not only showcased the skills and talent of apprentices, but laid the foundations for becoming a part of the highly respected World Skills competition. NSI Chief Executive Richard Jenkins presented the heat winners’ prizes at the end of the final day in the Keynote Arena. The heat winners on day three were Matt Eminson and Ryan Harker from Chubb (Intruder Alarm competition) and Callum Tootle and Chris Lomax from EFT Systems (Fire competition). Coming together to enhance public security Independent certification is recognised as an important framework for continual improvement for businesses" Richard Jenkins NSI Chief Executive commented: “Once again IFSEC and FIREX exemplified the benefits of industry coming together to enhance public security. Our stand welcomed a considerable number of enquiries from companies interested in engaging with NSI’s highly trained team of experts. “Independent certification is recognised as an important framework for continual improvement for businesses; one we are pleased to spearhead within the security and fire safety sectors. We employ the most highly trained professionals who help to drive up the performance of businesses of all sizes as part of the assessment for approval. “It was inspiring to see so many NSI approved companies attend this year’s event and we were proud to play our part in helping to shine a spotlight on new talent within the sector. It was also a pleasure to welcome so many invited guests to our VIP drinks reception celebrating our collective commitment to raising standards.”
Over a fifteen-month period, Sonitrol has opened new franchises and expanded current markets in eight states including Illinois, Indiana, Kentucky, Ohio, Connecticut, Massachusetts, California and Florida. The expansion of current markets where Sonitrol has a footprint assists in the growth of the Sonitrol brand and secure more businesses with the best in verified electronic security, keeping our communities safe and keeping more criminals off the streets. “Sonitrol is excited to continue to expand our footprint and bring best-of-class service and verification technology to every market in North America,” says Julie Beach, VP of Sonitrol Corporate. “The need for alarm verification and false alarm reduction is growing in every community. We pride ourselves in providing police with the very best information to improve their safety and increase police response time to our clients.” In addition to this exciting growth, Sonitrol is celebrating its 55th anniversary this year Celebrating 55th anniversary In addition to this exciting growth, Sonitrol is celebrating its 55th anniversary this year. Bryan Bates, VP of Sales of Sonitrol of Northeast Florida and Sonitrol of Lexington says, “I have always been impressed with the entrepreneurs of the Sonitrol family. My mother and father worked for Sonitrol of Dallas before taking the chance on purchasing their own Sonitrol dealership in Lexington, KY in 1984. “With our recent opening of Sonitrol of NE Florida in 2018 and continuing to grow the Sonitrol of Lexington business, my brother, Jeremy Bates, and I can continue the legacy and provide the best security technology in the industry.” Tested and verified security services Expansion for us to Columbus, Ohio is very exciting especially with Sonitrol’s tested and proven verified security services"Chip Shiver, President of Sonitrol of SW Ohio, also has found recent success in growing the Sonitrol presence from the SW Ohio area to expansion in Columbus, OH. Shiver says, “Expansion for us to Columbus, Ohio is very exciting especially with Sonitrol’s tested and proven verified security services. Sonitrol’s enhanced verified technology and our many years of operation in Cincinnati, Dayton, and Springfield brings huge opportunities for us in Columbus, Ohio.” Sonitrol of SW Ohio has been in business since 1971. Lastly, Sonitrol of Fort Lauderdale recently expanded the Sonitrol brand to the Miami-Dade market. John Ray, President & CEO, says, “Sonitrol’s unique verified intrusion technology has grown over the past 55 years to become part of a world-class integrated security solution, keeping us at the forefront of protecting people and assets. Here in South Florida, we’ve expanded our franchise area with the recent addition of the Miami market, paving the way to providing more businesses in Dade County with the best security technology available on the market.”
Controlsoft, global developer, manufacturer and distributor of access control solutions, has fully integrated its latest Identity Access platform with the Aperio wireless locking technology from the ASSA ABLOY Door Hardware & Access Control Group. Identity Access platform upgraded By updating and upgrading its Identity Access platform to fully integrate with the Aperio AH30 1-to-8 communication hub, Controlsoft’s customers can easily add mechanical doors to their existing access control system. Aperio ensures users require minimal additional hardware to upgrade their premises to wireless access control. A communications hub providing a wireless connection with up to eight doors, the Aperio AH30 operates within a 25-metre transmission range, and has been designed for prompt, cost-effective installation and integration. Suitable for interior doors, the hub is particularly practical for hallways with a number of adjacent corridors. Identity Access security management software Easy to use and intuitive, Controlsoft’s Identity Access is a complete security management software Easy to use and intuitive, Controlsoft’s Identity Access is a complete security management software. The individual access rights of employees, visitors and contractors can be assigned according to their responsibilities. Individual time restrictions can also be applied for each access control point, and the system offers full auditing and reporting capabilities. The software also includes advanced features such as a lockdown function, which prohibits authorised users from accessing doors, as well as a further function that can allow for multiple levels of lockdown, depending on the scenario. Identity Access can even be integrated with a fire alarm system, so that selected doors automatically open when a fire alarm is activated. Controlsoft access control solutions Jonathan Summers, Managing Director at Controlsoft, said: “We are committed to providing a comprehensive range of access control solutions that are competitively priced, easy to install and highly secure. It is with this commitment in mind that we have fully integrated our Controlsoft access control solution with the Aperio AH30 1-to-8 communications hub from the Door Hardware & Access Control Group.” He further said, “The AH30 has an excellent reputation as a reliable, functional and high-performance access control solution, and this integration will help us provide customers with faster, more effective installations.” Battery-operated Aperio innovations David Hodgkiss, Director of Access Control at the Door Hardware & Access Control Group, added: “As one of our original Aperio partners, we are delighted to continue our long-standing relationship with Controlsoft and integrate our award-winning technology with its latest access control platform, Identity Access. Battery-operated Aperio innovations are highly reliable, available in a stylish, contemporary design, and offer a quick and easy installation.”
Sensor manufacturer, OPTEX Europe, returns to IFSEC during its 40th anniversary in 2019 to showcase two new solutions with visual verification at their heart: the enhanced version of its LiDAR range; and innovative RADAR technology Firstly, OPTEX provides a way to upgrade its best-selling 12m outdoor intrusion sensors to an app-based visual verification solution by introducing a Wi-Fi 180° day/night camera. The VXI-CMOD will send home and business owners immediate notification of an intrusion when it occurs, and a dedicated app provides access to the live view with sound, as well as the access to recorded pre and post event footage. Secondly, the intelligent visual verification solution for monitored alarm systems will be launched at IFSEC for the UK market. It consists of an innovative hardware, the OPTEX Bridge and a performant software package powered by CHeKT that takes separate intruder and ONVIF compliant CCTV technologies installed on the same site, but acting independently, and ‘bridges’ them to create one, seamless, integrated monitored solution. Intruder alarms can now effectively be visually verified. Display of compact surveillance radars Both REDSCAN series feature extended detection range, up to respectively 30m and 100mThe company will also be showcasing the enhanced short- and long-range LiDAR sensors. Both REDSCAN series now feature extended detection range, up to respectively 30m and 100m. The REDSCAN RLS-2020 is also now Grade 3 compliant opening up new opportunities for indoor applications. To detect and track people, vehicles, and drones in wide open areas, OPTEX will display compact surveillance radars manufactured by its business partner Spotter RF. “OPTEX is excited to be returning to IFSEC in the year of our 40th anniversary,” says Masaya Kida, Managing Director of OPTEX EMEA. “While we are proud of our heritage, we know that we can never stand still, and so we continue to design and innovate new products and solutions for an ever-changing world. Our management, sales, technical, marketing teams will be all present at the show to demonstrate the new sensors and visual verification solution as well as discuss any new opportunities.”
TRISAT, a British company specialising in the protection of people and assets, launches the B L AID+ Ballistic Advanced Incident Defence System. The wearable first aid and trauma pack helps to mitigate the risks to citizen first responders from shootings, stabbings and blast shrapnel. The B L AID+ pack is accompanied by a comprehensive practical led course and blended e-learning to provide essential advice on how to stay safe and administer treatment. Catastrophic trauma kit Tremaine Kent, Director of Trisat states: “It is human nature to want to help other people in trouble in emergency situations, but as testimonies in the recent inquest into the London Bridge attacks of 2017 have shown, ‘good samaritans’ can themselves become victims. We have developed the B L AID+ system to give first responders and workplace first aiders enhanced protection to confidently and effectively treat casualties during a serious incident.” The B L AID+ system is constructed of 100% DuPont™ Kevlar® ballistic and stab protection The B L AID+ system is constructed of 100% DuPont™ Kevlar® ballistic and stab protection (complying with NIJ0101.04/IIIA, STANAG 2920 V50.580m/s and KR2/SP2 knife and spike protection standards) and 100% MicrAgard™ PLUS material for infection control. It features a catastrophic trauma kit, a holistic and effective system to stop lethal bleeds in an emergency and a medium BS8599-1 first aid kit to treat up to 25 people in high-risk workplaces. Personal attack alarm system For added flexibility, the B L AID+ system also features a personal respirator for self-rescue during emergencies involving hazardous smoke and fumes, along with a VizShock personal attack alarm system that uses a multi-frequency red and blue pulse to pause and deter an assailant. Tremaine adds: “Terrorist attacks are an obvious use for the B L AID+ system, but knife crime is an even broader threat with 100 people fatally stabbed in UK in 2019 so far. It is vital that the first people on the scene have access to protection as well as the right equipment and training, in order to treat the injured, without putting themselves at further risk.” The B L AID+ system and practical led course is highly suitable for use in: offices, schools, shops, pubs, entertainment venues and anywhere else where people gather. It is Ideal for first responders, corporate first aiders, security personnel, public facing lone workers, aid workers, journalists and anyone travelling to volatile areas.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. What first brought the issue of alarm verification to your attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What is the false alarm rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why did this issue resonate so strongly with you? When I first investigated this issue, I was sure that the security industry would have already recognised this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who is affected by this? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a bill for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What is the average false alarm fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why do you believe audio is the ideal technology for secondary source verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How would a secondary source verification system work with audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are there any additional resources you would suggest looking into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing key cards and fobs with app Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognises which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable access control systems for SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favour simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving security dealers and integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalising that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS to measure product quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analysing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
Faced with a number of security challenges and planned future expansion, a major airport decided it was time to implement a scalable security surveillance solution. Let’s take a look at how to manage such a scenario to ensure the selected solution provides scalability for growth. With the existing proprietary solution at the airport locked down to one manufacturer and littered with issues resulting in high maintenance and expansion costs, a new solution was required that would allow the airport to scale its surveillance solution in line with future expansion plans. Difficult in identifying people The low-resolution analogue cameras made it difficult to identify people during incidents Not only was the existing surveillance solution analogue and proprietary, it wasn’t intuitive and was difficult for operators to use. There were several ‘satellite’ security installations scattered in the various terminal buildings that weren’t viewable in the centralised Control Room which meant extra operators were required. The low-resolution analogue cameras made it difficult to identify people during incidents and coupled with the lack of video coverage, it gave operators poor situational awareness. Reviewing past events with the existing VMS was difficult as playback wasn’t synchronised and, without bookmarks, it was time-consuming to find important events. The combination of multiple terminal buildings and the Centralised Analogue Architecture resulted in bottlenecks and latency issues as all processing must pass through the centralised server. There was also no redundancy so if there was any failure in the system, the Control Room would no longer have the capability to view live or recorded video. Additionally, as the system was locked down to one manufacturer and the whole system had to be hardwired to the centralised server, there were very expensive expansion costs. Addressing security and scalability concerns New NVRs were specified to cope with the increase in camera streams and an extra NVR for redundancy and failoverThe required solution had multiple requirements to ensure that the existing issues were resolved and that the solution could scale with the planned expansion. With expansion planned to facilitate growing passenger numbers, an open IP based solution was specified to replace the existing analogue solution to improve situational awareness, provide scalability and integrate with a number of other systems operating in the airport. The architecture needed to limit bottlenecks, reduce latency issues, provide redundancy advantages and be scalable to allow for multiple new terminal buildings to be connected with ease. New HD cameras were specified to improve image quality and coverage, with a Video Wall required in order to view and manage the increase in video streams in the centralised Control Room. New large capacity NVRs were also specified to cope with the increase in camera streams and an extra NVR for redundancy and failover. Distributed Architecture reduces data bottlenecks A solution with Distributed Architecture was chosen as it solved multiple issues with the existing solution and facilitated future expansion without the need for a centralised server. Distributed Architecture allows data to be kept close to where it is produced or needed. When cameras, surveillance workstations, NVRs, alarm servers, integration gateways, all participate in a Distributed Architecture, data bottlenecks are minimised as all processing doesn’t need to pass through a centralised server. Distributed Architecture provides a truly unlimited and scalable solution that can easily accommodate the largest airports in the world. Enhancing situational awareness Distributed Architecture enables future expansion as it can support thousands of cameras, workstations and NVRsDistributed Architecture minimised the existing bottlenecks, reduced latency, and provided higher availability and faster access to data. It also allowed all ‘satellite’ security installations to be viewed in the centralised Control Room enhancing situational awareness. New HD cameras were installed and due to the scalability of Distributed Architecture, future cameras can easily be connected when needed. Furthermore, the scalability of Distributed Architecture enabled the airport to build new terminal buildings and connect with ease to the security solution when ready. Distributed Architecture enables planned future expansion as it can support thousands of cameras, workstations and NVRs, dramatically reducing the Total Cost of Ownership (TCO). The scalability of Distributed Architecture allows the airport to continue with planned expansion and add a single camera/NVR or a whole new terminal when needed.
Based in Muscat, Oman, the Oman Electricity Transmission Company (OETC) owns and operates the main electricity transmission network, transferring electricity from generating stations to distribution load centres in all governorates of the Sultanate of Oman. Asset and public protection Protecting the company’s assets while ensuring the safety of the public is central to ensuring business continuity for OETC and reliable distribution of electricity to over 4.6 million people. With 90 grid stations in remote locations, identifying and responding to unauthorised intrusions in a timely way was challenging. OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public “It can take up to an hour to reach some of our sites after an alarm is triggered. By then it’s too late, the intruder is gone,” says ESC Gulf Project Lead. Members of the public were also entering the sites to have picnics, unwittingly risking injury or even death. After a fatality when someone interfered with an electricity transformer, it was clear the OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public from harm. Monitored pulse fencing solution The Gallagher solution OETC work in partnership with an established local consultant ESC Gulf who provide a wide range of services including design, tender evaluation and project implementation support. During tender submission stages, security contractors Majees Technical Services and Mustafa Sultan Enterprises, proposed a Gallagher Security monitored pulse fencing solution to protect OETC’s remote sites. Upon contract award the certified contractors installed the system, while Gallagher provided support and oversight of the installation and commissioning works. Using Gallagher’s effective and reliable fencing solution, perimeter breach attempts are deterred by an energised pulse, delivering a short but safe shock. The monitored wires detect unauthorised entry or exit and trigger instant alerts. Gallagher Z20 Disturbance Sensor Gallagher Z20 Disturbance Sensor heightens perimeter security by ensuring continuous monitoring and motion detection The Gallagher Z20 Disturbance Sensor in use at the gate heightens perimeter security by ensuring continuous monitoring and detection of vibration or movement of the gate when it is closed, and the system is in an armed state. Gallagher delivers robust perimeter security systems suited to the most rigorous requirements of high security sites. The ability of Gallagher technology to easily integrate with CCTV cameras, automated lighting and a remote monitoring system, further ensures a safe and secure environment. A world class solution, Gallagher perimeter products are designed to comply with international safety and electromagnetic compatibility standards. These standards set out the safety requirements for the design, installation, and operation of pulse fencing and associated equipment. Gallagher perimeter control solutions Saving money while keeping people safe Gallagher perimeter control solutions are now under construction or completed at 70 of the remote grid station sites – including over 25 kilometres of monitored pulse fencing. Unauthorised entry to these sites has been reduced to zero. OETC now has peace of mind that assets at its remote sites are protected, while being secure from unauthorised access – ultimately keeping people safe from harm. Gallagher’s accurate and responsive security monitoring systems have also resulted in significant cost savings and business efficiencies for OETC. “OETC were employing up to six guards on each grid station at a significant cost,” says ESC Gulf Project Lead. “With a fully monitored solution, the number of guards has been reduced and they have been redeployed on other tasks”. Gallagher security solutions are successfully supporting OETC’s mission to transmit and dispatch electricity safely, reliably, securely and economically. ESC’s Gulf Project Lead concludes “Gallagher provides a great amount of support to all stakeholders and both OETC and ESC Gulf are very pleased with the outcome of this project.”
Resort World Casino New York City, (RWNYC) is the only legalised gaming casino in New York City. Its location near JFK International Airport meets New York State gaming regulations regarding geographical requirements, in order to protect visitors, patrons, and the casino’s assets. With approximately 400 million dollars channeled through its facility each week, the casino’s concerns include security across multiple points of entry, vendor offices, cashier cages, count room areas, and high limit rooms. The casino has an average of 15,000 guests per day, approximately 1,000 employees and 6,500 parking spaces. The requirement to accurately monitor and protect Resort World’s guests, facility, and personnel, demanded a state-of-the-art solution that could meet its complex security needs. Comprehensive security and surveillance program Gallagher worked closely with Resort World to understand their unique challenges In order to create and maintain a safe and secure environment for all, Gallagher worked closely with Resort World to understand their unique challenges. A comprehensive security and surveillance program were implemented to seamlessly integrate people, processes, and technology. This program included: Integration with iTrak System, providing up-to-date information on personnel and incident reports from all departments. Synectics VMS Integration (with more than 2,000 HD cameras), to control doors, acknowledge alarms, link cameras to alarms, and alter the mood of the monitor room by changing the color of the lighting. If an alarm is activated the monitor room lighting turns red. Open Process Control Integration, to automatically generate VMS alerts. These alerts convert to a WAV (audio) file that announces the location of the alert and then directs cameras to the specific area of interest. Interface and automatic export of the Employee Dining Buffet record to payroll weekly. Scalable security solution Director of Surveillance at Resort World New York City, Jason Arnett, and his team have completed the Gallagher Access Technician Training Course and are qualified as first responders. A+ Technology & Security in Bay Shore, New York is Gallagher’s Certified Channel Partner and service provider for RWNY. “Security of the property is key to the success of our business,” says Jason. “Having a system that is capable of numerous customisations, while being scalable to the constant demand for growth, proves it is an all-around solid security system for our environment.” Customer inspired Resort World Casino New York City identified a need for a solution that would disable employee access cards at the end of their shift. Employees were required to pass through a security checkpoint at the start of their day to reactivate their access card. To streamline this process, Resort World selected Gallagher’s Action on Access integration. Jason explains, “This significantly enhanced the security of the property by taking fear out of the equation.” Gallagher Action on Access integration ID badges are no longer active while off property, activation of the ID is done in the presence of security ID badges are no longer active while off property, activation of the ID is done in the presence of security, meaning unauthorised access to the property due to a lost ID badge is no longer a concern. Additionally, in the event of an emergency, a report can be run producing an accurate account of who is in the building. Lastly, it requires staff to enter and exit the property though one particular entrance, limiting the possibility of internal theft. Ultimately, Action on Access delivers a two-fold protection plan. Cardholder selection is regulated by the state to ensure that no individual has full capability to create a complete cardholder credential or select access for the cardholder. In order to maintain compliance with state regulations, RWNYC utilises features included with Gallagher Command Centre such as dual access point authorisation, interlocks, and security alarms tied-in with output to control lights, as well as additional device notifications. Authorised and secure access control In order to provide enhanced protection and authorised access control, several mantraps were positioned in critical areas of the facility. These mantraps allow RWNYC staff to know who is on duty. This step, in conjunction with Action on Access, provides a significant safety measure as it allows for the enabling and disabling of card access with time restraints, in the event a card is lost or compromised.The Gallagher system is fully customisable to meet and exceed gaming regulations for this property" “With Gallagher’s latest software update, we’ve been creating more customised views for our staff to better monitor particular areas,” says Jason. Email alert notifications are used to inform Player Development that an invited guest is entering the private gaming space, allowing a greeter to welcome them and provide best in class customer service. Gallagher security system Gallagher’s security solution affords RWNYC a reduction of five to eight hours of labor per week by utilising Command Centre’s reporting and auditing capabilities. “The Gallagher system is fully customisable to meet and exceed gaming regulations for this property. It is modular and can be divided into multi-tenant features. Gallagher’s functionality and flexibility are only limited by your imagination,” Jason summarised. Gallagher Command Centre is at the center of Resort World Casino New York City’s thorough and complex security program, helping protect their world class entertainment facility by safeguarding physical property, minimising risk, and reducing operational costs.
Queensland University of Technology (QUT) is a major Australian university at the forefront of innovation and development in tertiary education. With a strong focus on research, technology, and sustainability, QUT has state-of-the-art facilities and equipment located across three campuses in Brisbane, as well as multiple remote research sites. With highly-valuable assets and facilities, open campuses, and a combined population of approximately 58,000 staff and students, it is imperative for QUT to have a robust yet discreet security and site management system operating 24/7. In 1995, QUT selected Gallagher as their technology partner to develop and implement a seamless security and site management solution. More than 20 years on, this partnership remains strong as QUT continues to seek new and innovative technology to manage their campuses and simplify operations. Intelligent access control readers QUT’s three campuses have diverse physical environments which are essentially open to the general public. One campus is situated between the Brisbane River and Brisbane Botanical Gardens, another is located in the centre of an urban retail village, residential area and high-school. “The QUT campuses, whilst tertiary education institutions, are open to the public. This open and accessible environment presents a challenge when trying to protect the people and property of QUT” says Tracey Bartlett, Security Systems Officer. We have high expectation of the Gallagher system to manage the security of the non-public domain" “We have high expectation of the Gallagher system to manage the security of the non-public domain whilst allowing staff, students and authorised visitors the access they require.” To do this, QUT operates 1500 intelligent access control readers across their sites. Integration with Command Centre With the readers communicating directly with Gallagher’s site management software platform, Command Centre, QUT is able to manage, monitor, and report on facility access. “We have buildings that are open until 10pm and others that are accessible 24 hours a day, 7 days a week.” says Bartlett. “Our security staff in the CMS (Central Monitoring Stations) are able to create building and cardholder schedules, quickly lock down areas, grant immediate access and generate report. These reports assist the QUT Space Management Team on exactly how and when our facilities are being used.” Key objectives Secure multiple campuses that have open perimeters Protect staff and students and assets Ensure quick identification and response to alarms from multiple systems Streamline cardholder administration processes Staff and students security The safety of students and staff is the number one priority for QUT and the university works hard to ensure they operate safe and secure campuses. Through Gallagher’s site management solution, QUT is able to integrate multiple systems – including emergency control points and alarms for temperature change, fire, and flooding - and feed the information into Command Centre. Having one central monitoring platform ensures staff quickly identify, locate, and respond to any potential risks on campus. CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system" “Our CMS team operates 24/7, of CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system, have a complete view of what’s happening on site. They are then able to direct the field staff to areas of the campus that need attention,” says Bartlett. Ease-to-use software With tens of thousands of cardholders, all with ever-changing access needs, QUT requires a large number of staff to be able to administer and manager cardholder profiles within Command Centre. “The feedback from staff new to the CMS have commented that Command Centre is very easy to use software and they’re surprised at just what the system can do.” says Bartlett. In addition to streamlining the administration processes involved in cardholder management, Gallagher’s system also streamlines operations for QUT. More than just a card controlling physical access, QUT’s cards act as staff and student IDs, are used to operate printers and borrow from the library and can be used to monitor time and attendance. Through Command Centre, audit trails are generated for quick and easy reporting on each card function. Site management software As a technology focused university, QUT continuously reviews and implements new systems and technology as they become available. In order to keep up with the very latest site management software available from Gallagher, QUT opts for an ongoing Software Maintenance agreement. “We’ll continue to welcome the opportunity to embrace Gallagher’s latest products as we are confident, they will meet our needs” says Bartlett.
With its capacity of 32 million tons per year and water frontage of 6 kilometres, Chernomorsk sea port is one of the largest transport terminals in Ukraine, providing trade links with more than 100 countries all over the world. This port is a part of Eurasian transport corridor connecting the Western European countries, Ukraine, Georgia and the Asian countries. Its territory embodies the unique multimodal terminal that serves railway-ferry and auto-ferry lines as well as roll-on/roll-off vessels. The mission was to implement round-the-clock monitoring of the port territory and port waters in order to detect violations and prevent them. Monitoring in challenging light conditions PTZ cameras with integrated Axis Lightfinder technology are used for monitoring Experts from Inlimited suggested fitting the port with thermal technology platforms using 11 Axis network thermal cameras aboard (including models with two sensors: optic and thermal). PTZ cameras with integrated Axis Lightfinder technology are used, among others, for monitoring in challenging light conditions with low object contrast or difficult light sources. Thermal network cameras support guard tour function that can be used for continuous monitoring of a particular area according to the preset guard tour. In the context of modernisation, the existing port security system was extended with the following video surveillance solutions: computer-aided continuous visual monitoring of the water frontage, the adjacent port area and the port waters of Sukhyi Estuary, the area along the port perimeter as well as monitoring of vehicles (license plate recognition) and approaches to the mounting locations of the main cameras. Integrated video surveillance Centralised security service control centre offer video analysis capabilities. Video surveillance solutions integrated into a single software and hardware platform provide high-quality digital video real time record and store the archive for a minimum of 30 days. The integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area Integrated video surveillance and alarm system modernisation project developed by Inlimited Ltd. for Chernomorsk sea port is of strategic importance for the customer since it is aimed at increasing the reliability of the guard tours and critical infrastructure of the port and its entire water area. When developing the architectural concept, the integrator considered all the challenging conditions that cameras may encounter at sea and in the maritime area, such as hurricane hazards, lightning strikes, salt air impact, as well as restricted visibility due to fog, heavy rain, snowfall and direct sunlight. Installation of PTZ network cameras Thermal platforms with Axis PTZ network cameras installed on the top became the ultimate solution for the port. Optical and thermal sensors combined into one system is the specific feature of bispectral modules. With this capability, such a device can substitute a significant number of conventional optical cameras and partially the security alarm system. Hence, the extensive territory of the port was covered by turntables with a total of 11 Axis network cameras: bispectral, optical and outdoor. Due to the intelligent capabilities of Axis network cameras, a real-time detection signal is automatically transferred to operator screen, immediately providing a very clear image of an object and ensuring reliable detection under any visibility and weather conditions. Moreover, the system can also detect suspicious objects even before an intrusion attempt. Recognising person, car or watercraft We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems"Automatic systems facilitate the work of security service operators displaying only actual violations, which helps to minimise the percentage of false responses. With this intelligent system, it is possible to immediately recognise a person, car or small-sized watercraft as well as detect possible smoke spread and other abnormal situations. Thus, the security staff has extra time to provide quick response. The video surveillance and alarm system of Chernomorsk sea port is integrated with IP-video control system Milestone Xprotect and vehicle license plate recognition system VIT AutoCode. “We chose to go with Axis cameras because they are flexible and yet can be customised to solve particular problems. Axis network cameras gained an excellent reputation as a part of the video surveillance system currently operating at the port and for this reason, we selected them again for additional security platforms,” noted the Chernomorsk sea port security service.
Insurance Auto Auctions (IAA), is one of North America’s leading salvage auto auctions companies with the largest facility footprint, strong buyer base, and high auction returns. The exclusive focus is on the automotive total-loss industry with over 160 corporate owned facilities across the United States and Canada. IAA provides sellers and buyers with the best solutions to process and acquire total-loss, recovered-theft, fleet lease, dealer trade-in and collision damaged rental vehicles. Holding a variety of automobiles from cars, trucks, SUV’s, and motorcycles on site - the highest property protection measures must be taken. When IAA felt it needed a more robust security system along with unsurpassed service to protect its business, they chose Gallagher’s perimeter security solution. Over 12 strong years, Gallagher is now much more than a security solutions vendor to IAA. Gallagher is a long-term partner. Reduction in theft and vandalism The quality of the fence is rigid, and wires are closer together and tighter, not loose and easily movable"Covering auction site sizes up to and over 70 facility acres, Gallagher’s networked perimeter fencing is in use and continually being rolled out into new IAA sites across various geographical regions. IAA staff believe that the threat of theft, vandalism and damage has been significantly reduced thanks to the deterrence and detection features of Gallagher’s networked perimeter security. Compared to other electric fences on the market, IAA chose Gallagher after they tested it and found it to be the best product available. Eric Zurawski, Director of Security, said “The quality of the fence is rigid, and wires are closer together and tighter, not loose and easily movable, as we’ve found with other products. All these attractive features are what sets Gallagher’s electric fencing apart.” Monitoring perimeter security With Gallagher’s latest software system Command Centre v7.10 and Trophy FT Fence Controllers, IAA monitors and controls perimeter security by sending a regulated electrical pulse around the high voltage fence zones and sections of the perimeter fence. IAA has the ability to configure, control and monitor between 3-12 fence zones at one time giving a thorough overlay of the entire yard, zone by zone, region by region. The integration features of Gallagher Command Centre have enabled IAA to streamline and improve all operations from the head office in Chicago. By remotely monitoring all sites they can see when fences go offline and where from a central control room. Protecting assets of customers Gallagher’s electric fences are our number one perimeter security choice to protect our assets and the assets of our customers"“The interface is far better than anything on the market. It is a very powerful tool, particularly great for monitoring. We’re able to monitor sites that turn on their electric fences and the ones that don’t from a remote location. It’s really helped boost our security measures. “Gallagher’s system has grown with us as we continue to expand by opening new sites and overflow lots, and acquiring existing businesses. Gallagher’s electric fences are our number one perimeter security choice to protect our assets and the assets of our customers. It is the number one security solution on the market that deters, detects, and delays.” Gallagher perimeter electric fencing is IAA’s primary line of defence, enabling IAA to enhance the security of its facilities while at the same time reducing its security costs. IAA has integrated Gallagher’s Command Centre with third party alarm systems offering regional alarm companies advanced installation help and support.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Security alarm systems: Manufacturers & Suppliers
- DSC Security alarm systems
- Vanderbilt Security alarm systems
- LifeSafety Power Security alarm systems
- TruPortal Security alarm systems
- RISCO Group Security alarm systems
- Bosch Security alarm systems
- Climax Technology Security alarm systems
- Optex Security alarm systems
- Visonic Security alarm systems
- Alpro Security alarm systems
- Nedap AEOS Security alarm systems