Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situatio...
With security threats on the rise, LILIN Americas is answering the call by introducing an advanced yet easy-to-install Access Control System for monitoring entry to a building, resulting in a safer environment for personnel and assets. When integrated with other platforms such as IP cameras, fire alarms, and sensors, the system provides a layered security approach that significantly enhances peace-of-mind and acts as a deterrent for theft and vandalism. "The LILIN Access Control System is a sin...
Ring, whose mission is to make neighborhoods safer, announced Ring for Business to provide business owners with the ability to protect their companies with Ring Alarm and Ring Video Doorbells and Security Cams the same way that homeowners have been doing for years. Small businesses are an integral part of our communities and, thanks to Ring, they now have access to smart, DIY security that’s free from long-term commitments, hidden fees and professional installation. With Ring for Business...
By popular demand, NAPCO Security Technologies, known for innovative technology and reliable professional security solutions, is expanding its globally renowned and award-winning line of StarLink Universal Cellular Communicators with new models on the AT&T LTE network, so important in various areas of the United States of America. The much-anticipated StarLink LTE AT&T Cell and Cell/IP Communicator models include StarLink Fire Commercial Fire Communicators, plus StarLink Intrusion Cellu...
Johnson Controls has updated its Tyco Software House C•CURE 9000 security and event management system with new tools to optimise its security operations. Enhancements include metatags, broadened search capabilities and enhancements in video association, along with adding an additional layer of security with Multi-Factor Authentication mobile integration. C•CURE 9000 v2.80 users now have the ability to add two-factor authentication without needing to upgrade readers. With this added la...
Honeywell announces the release of 30 Series IP Cameras, a new suite of video cameras that strengthens building safety and security through advanced analytics and secure channel encryption. The Honeywell 30 Series IP cameras are designed for use as part of video systems that comply with U.S. government procurement standards instituted under the John S. McCain National Defence Authorisation Act for Fiscal Year 2019 (NDAA Section 889). With the new cameras, end users can also benefit from lower t...
Ajax Systems, globally renowned manufacturer of innovative security solutions, announces a partnership with Oprema, renowned and rapidly growing independent security distributor in the UK. Oprema’s customers now have access to a full range of Ajax wireless products for complete protection of residential and commercial properties from intrusion, fire, and leaks. Remote access management Ajax users can remotely manage their systems, control appliances, and check the CCTV streams via mobile apps Ajax users can remotely manage their systems, control electrical appliances, and check the CCTV streams via mobile apps. Whenever the detectors spot a potential threat, the hub notifies the users via push-notifications, calls, and SMS. If an alarm response company oversees their property, it will also receive an alert. Ajax products are notable for their user-friendly design that gently fits any interior and a straightforward installation process. Jeweller radio-protocol connects all of the devices in the system on a distance of up to 2000 m from the hub central panel and allows them to serve up to 5-7 years on the pre-installed batteries. ReX intelligent signal range extender The system’s radio coverage area extends to up 16 sq. m using the ReX intelligent signal range extender. If an intruder attempts to interfere with the signal or jam it, the hub immediately raises an alarm. Ajax devices have earned the highest reliability grade available to the wireless security systems after testing in five independent accredited laboratories. The system runs on a proprietary software OS Malevich. It is immune to viruses, resistant to cyber-attacks, and regularly updates over the air to expand functionality. Oprema - Ajax Systems partnership Together with Oprema, we’re excited to bring Ajax, the next generation of wireless systems, to the UK security market" Aleksandr Konotopskyi, CEO/Founder at Ajax Systems, stated, “Oprema’s team is demonstrating an impressively profound dedication towards customer service, marketing, and operations management. Their far-sighted vision for innovative technologies and business qualities resonate with the core values at Ajax Systems. Together with Oprema, we’re excited to bring Ajax, the next generation of wireless systems, to the UK security market and stimuli its future development.” Ross Hawkins, Operations Director at Oprema said “We are always searching for the latest technology advancement in the industry for our customers. We are excited about this new partnership with Ajax. The new technology will provide our customers with new opportunities and advancements within the industry. We look forward to the future and working with Ajax as a key strategic partner.”
Videonetics, the visual computing platform development company, announces that it ranked amongst top 5 Video Management Software providers in Asia market with the market share of 5.4%, according to a recently released report released by IHS Markit. IHS Markit is a provider of critical information, analytics and expertise to forge solutions for the major industries and markets that drive economies worldwide. Rankings are adjudged using a robust rating scale and evaluated on based on percentage revenue growth, competitive advantage, size and innovation capabilities over the year. Achieve widespread adoption Commenting on the achievement, Dr. Tinku Acharya, Fellow IEEE, Founder & MD, Videonetics, “It is a prestigious honour to be recognised as an industry leader in VMS by IHS Markit. This recognition validates our drive for high performance, innovation, differentiation and global scalability.” We’ve always strived to bring more value to our partners, integrators and customers" “Building upon our award winning and patented AI & deep learning framework, we continue to achieve widespread adoption of our Unified Video Computing Platform (UVCP™), in smart & safe cities, aviation, industrial, education, BFSI, retail, healthcare sectors”, he further added. Mr. Avinash Trivedi, VP – Business Development, Videonetics expressed, “We’ve always strived to bring more value to our partners, integrators and customers. I would like to dedicate this achievement to them for their continued support, commitment and excellent contribution to Videonetics growth”. Unique forensic investigation Videonetics Intelligent Video Management Software (IVMS) is an open architecture, agnostic, scalable and modular video management and analytics software. IVMS provides enterprise-class features without discriminating on the size of the project and manages the video effectively, optimally and securely. IVMS offers flexible deployment environments to suit your preferences, needs and budget. Powered with DeeperLook™ - Videonetics’ AI & DL platform offering unique forensic investigation and video evidence features, IVMS is an ideal software solution for challenging security needs of an organisation. IVMS is a part of Videonetics’ patented Unified Video Computing Platform (UVCP™) which brings together other applications such as deep learning based video analytics, intelligent traffic management and face recognition to address all of the video computing requirements. IVMS offers true open architecture to enable easy 3rd party integrations with various sub systems such as access control, fire alarm systems, SCADA, intrusion detection, ICCC, C4I and IBMS systems.
Security-Net, Inc., a network of security system integrators, is welcoming two new members, providing the organisation with important geographic reach in the New York, New Jersey and Illinois areas. These two new additions increase Security-Net’s membership to twenty. New members include FE Moran Security Solutions, headquartered in Champaign, Illinois and Care Security Systems, based out of New York City. Their addition to Security-Net will bring extensive expertise in a diverse array of markets including government, education, residential and commercial. Service-oriented relationships We are very service centric and we look to identify that in each new member" Dominic Burns, chief executive officer of A.C. Technical Systems and Security-Net member, said both companies participated in a rigorous review process before being accepted as members. Part of the Security-Net membership process is ensuring potential members are focused on developing and maintaining strong service-oriented relationships with their customers. “We are very service centric and we look to identify that in each new member,” Burns said. “A customer is not just a number.” The addition of FE Moran Security Solutions as a new member of Security-Net follows its April 2019 acquisition of MidCo, which has been a long-time active member of the organisation. Providing alarm monitoring Adam Kimball, senior vice president, operations for FE Moran Security Solutions, said it was very important to FE Moran and MidCo that they continue the relationship with Security-Net. “We’re very excited to have a group of peers that trust each other to be able to speak about best practices, industry changes and challenges,” Kimball said. FE Moran is based in the Midwest, with locations serving Illinois, Indiana, Michigan, Kansas and National Clients coast to coast, Canada and Puerto Rico. Since its founding in 2003, they have grown to one of the largest security companies in their region, providing alarm monitoring and life safety and security services to its clients. The company is recognised by SDM Magazine as one of the top 50 security companies in the nation. It’s 250 employees serve about 30,000 clients, which includes a mix of both residential and commercial customers. Integrated security systems FE Moran specialises in providing customers with innovative life safety and security solutions, high quality equipment, as well as installation and monitoring. They are dedicated to a great customer experience and its UL-Listed Central Station is one of the few to receive the Five Diamond Certification. CSS has served some of the largest state, federal and corporate organisations Care Security Systems (CSS) is a certified woman-owned company with offices located in New York City and Montebello, N.Y. In the past 30 years, CSS has served some of the largest state, federal and corporate organisations in the United States on a national level, delivering integrated security systems with a commitment to building strong relationships with customers and within communities. City-wide surveillance With a wide range of expertise, CSS specialises in a variety of industries, from city-wide surveillance, government and utilities to transportation, manufacturing, education and retail. Core services include video surveillance, security training, access control systems and visitor management. Abe Schwab, vice president of CSS, said the team is looking forward to working with Security-Net. “We are excited to be part of a group of specialists and to collaborate with others on best practices and to provide the highest level of security in the industry,” Schwab said. With these new additions, Security-Net expands its geographic footprint to serve customers in the New York and New Jersey markets, as well as Kansas, Illinois, Michigan and Indiana.
ATMs have become a cornerstone of day-to-day life for millions, but they can also be vulnerable to attack. The global ATM Industry Association reported an increase of ATM crime of 12% for 2017. And attacks, of course, often involve ATM users, potentially injuring them and causing trauma. But since, by definition, ATMs are often situated outside buildings and used at all times of the day and night, securing them is a challenge - and banks are turning to more intelligent solutions. According to ATM Industry Association (ATMIA), there are an estimated 3.5 million ATMs in the world serving those in need of cash 24/7, 365 days a year. And there’s where the difficulty in securing them lies. To be effective, most ATMs need to be in public areas and open all hours. This, coupled with the fact that they hold hard cash, makes them an attractive target. False card readers to steal card details Security precautions for ATMs are an important part of a financial institution’s overall security solutionCriminals target these machines – or more precisely – the people using them in numerous ways. Distracting customers at ATMs in an attempt to take their cards or cash from them, or to discover their PIN number for use at a later date, for example. They also try to install false card readers that steal customer’s card details for reuse. On the other side of the story, banks need to deal with customer disputes. A very small percentage of ATM transactions result in situations where the customer questions whether the transaction has been carried out as requested, or even disputes making the withdrawal at all. So, security precautions for ATMs are an important part of a financial institution’s overall security solution. Using Deep Learning technology Inside an ATM machine, two covert cameras are installed, one trained on the user, the other on the ATM panel. Deep Learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scene in front of it, referring to existing data patterns. So, if there is another face in the picture (for example someone looking over a user shoulder), or if the person wearing a mask, an alarm can be triggered in the security centre. Using the same technology, the security system can flag if the number pad is covered with a strip to steal PIN codes Using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. All of these ‘smart’ alarms streamline the security monitoring process, meaning that security personnel can react to real-time scenarios and not waste time on false alarms. The footage can provide evidence for any investigation. Hikvision DeepinMind NVR The Deep Learning ‘engine’ here would be the Hikvision DeepinMind NVR, which takes the information from the camera and analyses it using Deep Learning algorithms. This can also ‘manage’ footage, in conjunction with other NVRs and a video management system, which brings this part of a total solution together with all the other elements, providing a powerful toolset for security and business intelligence. Securing assets at the extremities of security solution is a lot easier with Deep Learning technology. Even ATMs outside the building can be safer, avoiding fraud and protecting the customers every day.
Prey Inc., provider of the cross-platform, open source anti-theft software that protects more than eight million mobile devices, announced Prey for Education, a mobile security feature-set offering developed to address the needs of K-12 and higher education environments. Co-designed with partnered schools, Prey for Education centralises and automates mobile device security management so that hard-pressed school IT staff can delegate and automate tasks and ease their workflow. This initial feature release is designed to help schools better evaluate and track their mobile fleets and grow their device environments safely to ensure they can generate better results and promote the growth of their tech programs. Features of Prey for Education IT managers can also review further inventory data, such as battery and network connection per devicePrey for Education was developed in collaboration with Prey’s education customers to provide the following: Scheduled Automations – This new capability allows managers to schedule Prey actions on their devices, such as the lock, alert, and alarm, to be executed on specific days, hours, and data ranges. For example, a curfew lock can be set from Monday to Friday at 6pm to deter out-of-hours device usage. Reactive Security – New Control Zone Actions Triggers integrate with the Control Zone settings, Prey’s geofencing movement detection parameters, to precipitate reactions and eliminate reaction time in case of an eventuality. Users can configure Prey’s alarms, alerts, locks, and the ‘Mark as Missing’ evidence reporting feature whenever a device enters, or leaves a designated area. Specific actions can be assigned to both the entry, and exit. Inventory Management – IT staff can now assign a user or specify a contact for each device. An Online/Offline tag has been added to provide visibility on the devices’ connection, as well as a ‘Last Seen Online’ device sorting for quick visibility. As for device status, IT managers can also review further inventory data, such as battery and network connection per device, together with the logged in user. The multi-OS Prey for Education platform allows IT managers to group devices by class, usage, or state with custom tags Unified Management – The multi-OS Prey for Education platform allows school IT managers to group devices by class, usage, or state with custom tags; view device status or hardware changes; and assign them to faculty or students. Data Privacy – An extra layer of FERPA / data privacy compliance is delivered with data wipe and retrieval reactions, and Prey’s tracking and evidence gathering are configurable to boost end-user privacy. Promoting safe mobile environments “The Control Zone Actions and Scheduled Automations were created from the feedback our users gave us regarding their multi-tasking and high-pressure workflow. In the end, we’re trying to make their work as easy as possible. For example, they can now do things such as create digital curfews for their devices and ensure their fleet is locked up when the day ends,” said Carlos Yaconi, founder and CEO of Prey Inc. “We’re doubling down on our promise to help promote safe mobile environments for NGOs, schools, and universities, and we will continue to work with our partners to enhance and deliver new solutions for them.”
PACOM, the provider of integrated security and access control solutions, is getting ready to exhibit at the ASIAL 2019 Security Exhibition & Conference, which takes place between the 24th-26th July at the International Convention Centre in Sydney. Now in its 34th year and firmly established as the premier event for Australasia’s security sector, thousands of industry professionals will gather for an impressive exhibition display, a world class conference programme and the chance to network with their peers. The last 12 months have been a period of considerable activity for PACOM, and the ASIAL 2019 Security Exhibition & Conference provides the perfect opportunity to engage with integration partners and end users. Security management platform PACOM will use the event to introduce its sister company, 3xLOGIC, to the Australasian security sector and demonstrate how products from these two innovative brands can be integrated to offer a unique proposition for the entire region. All the information Unison collects is presented in a single graphical user interface Taking prime position on Stand A16 will be PACOM Unison – an open and integrated security management platform that permits the management of access control, intrusion detection, fire detection, intercom and video systems. All the information Unison collects is presented in a single graphical user interface, allowing customers to respond quickly to different types of events. Unison is the solution of choice for organisations within verticals such as healthcare, universities, commercial buildings, public facilities, municipalities, airports, shipping ports and data centres. Video management system PACOM Unison can now intelligently integrate with the 3xLOGIC range of video products for alarm verification, offering customers the opportunity to benefit from a completely integrated single solution. 3xLOGIC’s VIGIL video appliances come pre-configured with enterprise grade video management system software. 3xLOGIC’s VISIX power over Ethernet (PoE) enabled dome, bullet, cube, 360°, thermal imaging, and PTZ cameras are designed to suit any application. As one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has acquired an enviable track record for redefining what’s possible with security technology. For example, its pioneering TRENDS business intelligence software has already been deployed in over 7,000 locations across North America and now Australasian security professionals can take full advantage of its ability to provide a clean, simple visual snapshot of an organisation’s operations. Facial recognition technology A fully functional demonstration facility on Stand A16 will highlight how the TRENDS cloud-based solution provides actionable intelligence on data, with intuitive icons, graphs and images that can be configured specifically to meet an end user’s needs. 3xLOGIC’s VISIX VX-FR-01 is a special purpose, low cost dual lens 2MP camera Visitors will also be able to see that easy-to-use facial recognition technology is firmly within the reach of organisations of all sizes. 3xLOGIC’s VISIX VX-FR-01 is a special purpose, low cost dual lens 2MP camera that is designed for instant face detection, identification and notification of persons of interest, as well as access control and people counting. Using camera-based analytics and 3xLOGIC’s exclusive facial recognition software application and mobile app, users can review images and choose individuals to place on a watch list. Cutting-edge security systems Ahead of the ASIAL 2019 Security Exhibition & Conference, Josh Empson, National Business Development Manager at PACOM, commented, “This is the first time we have exhibited at this event for a number of years and we are keen to show visitors why our level of technological innovation remains second to none.” “With a large number of dedicated PACOM engineers working throughout the region, PACOM continues to lead the way in the design, manufacture and installation of cutting-edge security systems. Visitors therefore have a great opportunity to discover how integrated solutions from PACOM and 3xLOGIC can transform a diverse range of built environments and the many advantages of working with us.”
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase in revenue for dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, connected smart locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio of home automation products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages of professional installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realise they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realise that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling additional home automation products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labour warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces connection instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realise over time. On the other hand, one issue DIYers may recognise right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognisable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not everyone is a DIY customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing complete and custom solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SourceSecurity.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organisations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organisations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritises use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air Established in 2011 in Kyiv, Ukraine, Ajax Systems produces wireless security equipment for end users and small-medium-sized businesses. Ajax is a complete eco-system. The devices are ready to work out of the box. There are 24 devices for protecting residential and commercial properties from intrusion, fire, and floods as well as a set of automation modules. Users treat them as gadgets that make their homes smarter. Ajax wireless systems are easier to maintain, configure, and monitor for installers as well as for security companies, according to Ajax. The systems are resistant to false alarms, regularly update over the air, and can be easily expanded to cover premises of any size. IoT-based security systems “Our IoT-product approach to security systems, gadget-like industrial design, and user-friendly interfaces disrupted the market in 2016,” says Valentine Hrytsenko, Chief Marketing Officer at Ajax Systems. “After receiving global recognition in the security market, the company grew 80-fold.” Today, Ajax IoT-based security systems protect more than 200,000 people in 80 countries around the world from break-ins, fires, leaks and other threats. “Our mission is to reshape security and make it a common attribute of every household,” says Hrytsenko. Ajax wireless systems are easier to maintain, configure, and monitor for installers Ajax smart technology Ajax smart technology features a combination of reliable hardware and intelligent software. A proprietary Jeweller two-way radio protocol allows placing devices at a distance of up to 2000 meters from the hub in an open space. The system is encrypted, resistant to jamming and code grabbing. Ajax detectors feature false alarm-preventing algorithms: Haze Flow, ZOE, LISA, SmartDetect. The hubs run on a real-time operating system, Malevich OS that processes the commands and sends the alarms. Ajax Cloud service helps to control the system from anywhere in the world using native apps. Easy and seamless installation Ajax features system scalability, flexible management of administrative rights"Easy installation facilitates Ajax on-boarding. The company says 67% of Ajax users purchase additional security devices within the first six months. And an average system configuration consists of nine items. “We focus primarily on the residential, small and medium-sized businesses,” says Hrytsenko. “In the residential segment, Ajax covers the needs to detect break-ins, prevent fires and floods. Ajax devices are visually appealing to fit any home and business interior seamlessly. For the small and medium-sized business, Ajax features system scalability, flexible management of administrative rights, informative notifications, professional maintenance software, as well as integration of the security camera streams for centralised monitoring.” Route-to-market approach Ajax Systems’ route-to-market approach is two-fold. First, they develop strategic partnerships with the local professional security equipment distributors in each country. From the distributors, Ajax equipment goes to the installers, system integrators, security companies, etc. In addition, Ajax seeks to build brand recognition and actualise the concept of security by weaving it into the daily routine of a general audience. “We form a good understanding of their security needs,” says Hrytsenko. As with any new technology, there is an adoption curve for both B2B and B2C clients. Thus, the educational challenge is persistent for Ajax from country to country. Ajax Systems’ route-to-market approach is two-fold Wireless security systems “On a professional market, new products are often met with understandable suspicion,” says Hrytsenko. However, a huge misconception is that user-friendly equipment is either hard to customise or unreliable. Not true, he says. After testing in five accredited laboratories, Ajax devices successfully earned Grade 2 certification for compliance with the requirements of the international standard EN50131-1:2006. Grade 2 is the highest reliability grade a wireless security system can get.
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the biggest news is perhaps the possible long-term impact of first-time exhibitor Security and Safety Things (SAST), a Bosch startup. SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for integrators. SOCs (system-on-chips inside cameras) are becoming much more capable" Their 1,800-square-foot booth was big for a first-time exhibitor, and the American football theme was well received, as was the substance of the company’s effort to drive innovation in a highly fragmented industry. Seeing actual cameras and apps on display at the ISC West booth is “more real than PowerPoint,” says Hartmut Schaper, CEO of Security and Safety Things (SAST). “For us, seeing is believing,” says Schaper. “It was important for us to show cameras and apps for the first time. People are surprised at how far down the road we are.” “This dynamic will change in the industry,” says Schaper. “SOCs (system-on-chips inside cameras) are becoming much more capable. Soon there will be more processing power on the edge. People will find a way to use the extra processing power.” “Seeing is believing” at the SAST booth at ISC West 2019, where CEO Hartmut Schaper showed several manufacturers’ cameras whose functionality can be expanded using Android apps Developing more apps Several large manufacturers are already involved in the initiative, but there are some holdouts. “We are having ongoing talks with everyone to convince them to join,” Schaper says. “Some of the bigger ones will come around. We are not a camera manufacturer, and not a threat. We are owned by Bosch but are managed completely separately. There will be more and more apps developed, and momentum will increase.” “A year from now we will have successful customers we can talk about, and more camera manufacturers on board,” he says. “This year we are taxiing on the runway, but next year we will have cleared the tarmac and be climbing.” If the approach succeeds, their first appearance at ISC West will be remembered as historic. Future of surveillance cameras Off the show floor, in a nearby meeting room, chip maker Ambarella demonstrated technologies that will be driving the future of video surveillance cameras, including more intelligence at the edge. “People have been using more traditional video analytics approaches, though most of them have been disappointing,” says Chris Day, Ambarella VP of Marketing and Business Development. “What is ground-breaking now is the use of neural networks and real artificial intelligence, which has increased capabilities 100x. "You will see camera products coming out over the next year that are massively better than before. It’s not just incrementally getting better. Cameras will be coming out later this year with analytics that are absolutely amazing based on [the new chips.]” Larry Anderson, editor-in-chief of SecurityInformed.com, talks about Ambarella HDR and Low Light Solutions with Jerome Gigot, Senior Director of Marketing for Ambarella. (Source: Ambarella) New systems-on-chips Ambarella has introduced four new systems-on-chips (SoCs) in the last year, with emphasis on computer vision (video analytics). The newest is the S6LM Camera SoC with 4K imaging technology, unveiled at ISC West. The S6LM includes Ambarella's latest high dynamic range (HDR) and low-light processing technology, highly efficient 4K H.264 and H.265 encoding, multi-streaming, on-chip 360-degree de-warping, cyber-security features, and a quad-core CPU. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff" “With so much focus on AI and computer vision, I’m concerned the industry has taken focus away from low light imaging, wide dynamic range and image quality,” says Day. “You have to see the details in an image. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff, it’s all included in one chip.” From products to systems With a new general manager on board (Daniel Gundlach, formerly of Bosch), FLIR Systems Security Division is continuing its transition from a product company to a solutions provider, removing internal silos to clear the path. FLIR offers a strong end-to-end portfolio for Smart Cities applications, including the TruWITNESS line of body worn cameras and newly acquired Aeryon drones. FLIR’s historical strength as the top thermal imaging provider continues, but today they are much more than a thermal imaging company, offering visible day/night cameras, infrared pan-tilt-zoom cameras, video management systems and other technologies to provide a broader platform. FLIR's Saros security cameras combine multiple security technologies, including thermal sensors, high-resolution visible imaging, IR and visible LED illuminators, onboard analytics and two-way audio and digital input/outputs. Products in critical infrastructure applications In addition to Safe Cities, FLIR installs a range of products in critical infrastructure applications, such as oil and gas and electric utilities. Ports also tend to combine traditional security with an emphasis on perimeter protection, a FLIR strength. Existing perimeter protection applications can open opportunities for the broader platform. For example, installing a complete system in an airport that already uses FLIR’s thermal technology represents “low-hanging fruit” for the company, says Fredrik Wallberg, FLIR Director of Marketing – Security and Intelligent Transportation Systems. Ambarella demonstrates its latest imaging technology for video security during ISC West 2019 (Source: Ambarella) Integrated solutions Bosch's focus At the Bosch booth, there was an emphasis on integrated solutions and the customer experience. A mock retail store setup demonstrated systems such as overhead cameras for people counting and alarm communication to provide an alert if a refrigerator door is left ajar. A wireless panic button generates a silent alarm, communicates with a 2-way radio, and triggers a camera to focus on the area. An AVIOTEK IP camera alarms if there is a fire, based on observing actual flames rather than smoke. A new Bosch fixed dome camera series offers wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. Set-up only takes three steps: install the mounting bracket, connect the cables, and attach the camera module. Commissioning can be done wirelessly or remotely with no need for ladders or lifts. Dahua marks five years in the U.S. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view Time flies in the security industry, and it has already been five years since the Dahua brand entered the U.S. market. Today the company offers products through ADI and some 20 distributors, and has more than 30 technical consultants and technical support employees and 50 or 60 sales people in the field (including independent rep firms). “We are growing,” says Tim Shen, Director of Marketing at Dahua Technology USA. “It’s exciting for the company.” At ISC West, Dahua introduced a line of Multi-Flex panoramic cameras with lens modules that can be repositioned along an internal track for 180-, 270- or 360-degree views, providing flexibility for integrators. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view. Cost savings come from ease of installation (one camera instead of four) and only one VMS license (instead of four). AI and night colour cameras Dahua is also emphasising its Night Colour cameras that remain in full colour mode regardless of how dark it gets. There is no IR illumination or IR cut filter – the camera stays in color mode and displays any visible image in colour with as little as 1 lux of illumination. The 2 megapixel version is on display at ISC West, and a 4 megapixel version will come in the fall. A year ago at ISC West, Dahua emphasised its initiatives in artificial intelligence (AI) in order to position the company as a technology leader. This year, the message was more general – ‘Power Through Technology.’ The range of Dahua technologies includes AI, Night Colour, Starlight low-light imaging, fifth-generation HDCVI, and e-POE (Enhanced Power over Ethernet). Dahua USA's Director of Marketing says "the market itself likes AI", and expects more AI applications to follow (Source: Dahua USA's LinkedIn) “When we present AI to customers, they are happy, but when it comes to the budget they don’t have it,” says Shen. “The market itself likes AI, and it’s very much a buzzword. But we still need a proof of concept that it can do something good for end users. We need time to develop broader applications. The ‘smart retail’ market and education are good places to start.” he says. “AI is for project business,” adds Jennifer Hackenburg, Dahua’s Senior Product Marketing Manager. “Projects that are looking at AI haven’t come to fruition yet; they are still in the pipeline. It’s not for your everyday business. They are implementing it, but not as fast.” Access control beyond doors Access control should extend beyond doors. That’s the message I heard at the ASSA ABLOY booth, which displayed a variety of physical locks and intelligent access systems. An example is traffic cabinets, those metal boxes in public locations that could potentially be accessed to invade an internal network. ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces throughout an enterprise. The company’s ‘security continuum’ message draws attention to the need for the right level of security for the right opening, using existing infrastructure as well as new electronic technologies. “Customers face a combination of non-traditional access control and questions on how they can secure things that are not doors,” says David Corbin, ASSA ABLOY Director of Access Control Accessories. The security message is resonating beyond the traditional security department to involve other stakeholders in an enterprise, including IT directors. There is new awareness of vulnerabilities that have been there forever, such as traffic cabinets that can be opened with a key purchased on eBay.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
K9 Fuels are a family run, fuel distribution business providing an efficient and customer focused service in and around Lincolnshire. Since moving to their new premises on an industrial site, they weren’t able to leave their fuel trucks in the yard because of constant break-ins and theft. CCTV was installed but wasn't enough of a deterrent. Seeing a Gallagher monitored pulse fence at nearby TC Harrison, K9 Fuels wanted more information on how a similar system could benefit them. Monitored building alarm A simple stand-alone, four zone system linked to their existing monitored building alarm was installed. There is potential to upgrade this to a network based system, using the same F32 fence energisers, if the company expands. System height is 3.0m (32 wire), with a fence length of approximately 200 metres including one sliding gate and one double leaf gate. The break-ins stopped after the monitored pulse fence was installed and K9 Fuels are at ease knowing that their premises are monitored and protected 24 hours a day.
AT Brown (Coaches) Ltd is a premier coach company based in Telford, England that has been operated by the same family for over 100 years. After moving to larger premises in the town’s Hortonwood Industrial Estate in 2005, AT Brown began suffering from constant diesel theft. Installing a Gallagher monitored pulse fence stopped the thieves overnight. Despite having installed CCTV cameras and employing mobile patrols, AT Brown owner Ewen MacLeod says the diesel theft problem continued for the first eight years on the new site. “Thieves were coming through the security fence and syphoning fuel out of the coaches. The investment in CCTV cameras and mobile patrols wasn’t paying off.” Perimeter security solution Gallagher Security partnered with SPG Security Systems UK Ltd to provide a perimeter security solution that would let AT Brown get back to running their business. A Gallagher monitored pulse fence was installed around the whole site, including the large double leaf access gates. The monitored pulse fence was easily retrofitted to AT Brown’s existing security fence, making it a cost-effective option that could be quickly installed without any disruption to the business. SPG and Gallagher very quickly got to know what our requirement was and installed it around us" “SPG and Gallagher very quickly got to know what our requirement was and installed it around us,” says Ewen. “There was no impact whatsoever on us running the business.” Gallagher Security strategic business development manager Kevin Godfrey says the monitored pulse fence provided deterrence and detection for the whole site. Building alarm system “It’s a really simple, effective solution that has negated the need for guard patrols and a CCTV system.” The fence can be armed or disarmed with the building alarm or a keypad, and any break-ins are notified on a phone, through the building alarm system. Since the monitored pulse fence was installed in 2013, there have been no further incidents at AT Brown. The fence provides a powerful visual and practical deterrent to would-be thieves, preventing further break-ins and resulting in happy staff, and children getting to school on time in the mornings. “Everyone feels more secure, which is a very important factor,” says Ewen. “Now we can just carry on running our business the way we want to.”
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalises the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customised set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
Based in Muscat, Oman, the Oman Electricity Transmission Company (OETC) owns and operates the main electricity transmission network, transferring electricity from generating stations to distribution load centres in all governorates of the Sultanate of Oman. Asset and public protection Protecting the company’s assets while ensuring the safety of the public is central to ensuring business continuity for OETC and reliable distribution of electricity to over 4.6 million people. With 90 grid stations in remote locations, identifying and responding to unauthorised intrusions in a timely way was challenging. OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public “It can take up to an hour to reach some of our sites after an alarm is triggered. By then it’s too late, the intruder is gone,” says ESC Gulf Project Lead. Members of the public were also entering the sites to have picnics, unwittingly risking injury or even death. After a fatality when someone interfered with an electricity transformer, it was clear the OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public from harm. Monitored pulse fencing solution The Gallagher solution OETC work in partnership with an established local consultant ESC Gulf who provide a wide range of services including design, tender evaluation and project implementation support. During tender submission stages, security contractors Majees Technical Services and Mustafa Sultan Enterprises, proposed a Gallagher Security monitored pulse fencing solution to protect OETC’s remote sites. Upon contract award the certified contractors installed the system, while Gallagher provided support and oversight of the installation and commissioning works. Using Gallagher’s effective and reliable fencing solution, perimeter breach attempts are deterred by an energised pulse, delivering a short but safe shock. The monitored wires detect unauthorised entry or exit and trigger instant alerts. Gallagher Z20 Disturbance Sensor Gallagher Z20 Disturbance Sensor heightens perimeter security by ensuring continuous monitoring and motion detection The Gallagher Z20 Disturbance Sensor in use at the gate heightens perimeter security by ensuring continuous monitoring and detection of vibration or movement of the gate when it is closed, and the system is in an armed state. Gallagher delivers robust perimeter security systems suited to the most rigorous requirements of high security sites. The ability of Gallagher technology to easily integrate with CCTV cameras, automated lighting and a remote monitoring system, further ensures a safe and secure environment. A world class solution, Gallagher perimeter products are designed to comply with international safety and electromagnetic compatibility standards. These standards set out the safety requirements for the design, installation, and operation of pulse fencing and associated equipment. Gallagher perimeter control solutions Saving money while keeping people safe Gallagher perimeter control solutions are now under construction or completed at 70 of the remote grid station sites – including over 25 kilometres of monitored pulse fencing. Unauthorised entry to these sites has been reduced to zero. OETC now has peace of mind that assets at its remote sites are protected, while being secure from unauthorised access – ultimately keeping people safe from harm. Gallagher’s accurate and responsive security monitoring systems have also resulted in significant cost savings and business efficiencies for OETC. “OETC were employing up to six guards on each grid station at a significant cost,” says ESC Gulf Project Lead. “With a fully monitored solution, the number of guards has been reduced and they have been redeployed on other tasks”. Gallagher security solutions are successfully supporting OETC’s mission to transmit and dispatch electricity safely, reliably, securely and economically. ESC’s Gulf Project Lead concludes “Gallagher provides a great amount of support to all stakeholders and both OETC and ESC Gulf are very pleased with the outcome of this project.”
Indiana Department of Correction (IDOC) is a state-wide organisation, comprised of 21 adult facilities housing over 28,000 inmates. Safety of both inmates and the public is a top priority for IDOC and forms part of the organisation’s mission and vision. The inefficiency and increased cost associated with managing multiple security technologies and systems led to IDOC’s Director of Construction Services Kevin Orme to seek a solution that not only increased efficiency and reliability for the prison facilities staff but ensured that both inmate and public safety remained consistent with their organisation mission and vision – the top priority. Effective pulse fence systems Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbancesGallagher Certified Channel Partner Security Automation Systems (SAS) is a valuable partner to both Gallagher and IDOC. SAS has worked with IDOC and Gallagher to design and manage the installation and maintenance of the current system and to develop further solutions to meet future requirements and increase efficiency and safety. Gallagher security monitored pulse fence systems are safe, effective, reliable, and safely deter and detect disturbances without triggering false alarms. An essential requirement for upgrading a number of low security level 1 facilities to level 2 is perimeter detection. Some IDOC facilities require up to 1000 feet of interior chain link fence to be covered by effective non-lethal perimeter detection. SAS worked with the IDOC requirements and proposed the Gallagher D21 disturbance sensors to provide the perimeter detection solution. Perimeter security for correctional facility “Gallagher’s system changed the way I think about perimeter security,” says IDOC’s Director of Construction Services Kevin Orme. “Gallagher is the specified standard for any correctional facility above minimum security.” The product is great, works reliably every day, and I don’t have to worry about it" Gallagher’s perimeter security system is included in all new IDOC construction, as well as being retrofitted into existing facilities throughout the state. The efficient installation process of the Gallagher system meant IDOC could significantly reduce time in comparison to other technology in the agency. “The product is great, works reliably every day, and I don’t have to worry about it,” he adds. “We’ve been able to make more effective user of security resources too. Officers have been reallocated from the perimeter to in-prison offender contact areas.” Operator-friendly software “Hardware failure rate and recurrent costs are very low, and the software is operator-friendly reducing human error,” says Mr. Orme. “Maintenance is much easier; the prison’s maintenance staff have the ability to fix any minor issues.” The D21 Disturbance Sensor measures and analyses the impact on the fence when disturbed. The sensor raises an alarm only when specified limits are exceeded, preventing any nuisance or ‘false’ alarms caused by disturbances such as wind or rain. Integration with Command Centre software Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution"Ryan Tomlinson from SAS says the D21 sensor was suggested for two main reasons. “First, the D21 sensors integrate seamlessly with the Gallagher Command Centre software, which was a key factor in the decision process. We were already integrating non-lethal electric fencing, door control and video systems with Command Centre and the state preferred not to add another, separate system. The second reason we chose the D21 sensors was cost. Compared to other technologies considered by the state, the D21 sensors were the most cost-effective solution.” Mr Tomlinson had confidence in Gallagher and its products to carry out the job successfully. “Although this was to be our first installation of the D21 product, we were confident that between the technical ability of our staff and the support from Gallagher, we would be able to provide a successful installation,” he says. “The D21 sensors were simple to install. They easily mounted to fence posts and other structures the system was monitoring and installing the communications backbone was low-cost and straightforward.” Monitoring real-time data in Command Centre We were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s"“After the initial process of setting the address of each sensor, we were able to power-up each new zone of sensors and get them on-line with the Gallagher Controller 6000s. Next, we were able to individually adjust the parameters of each sensor and monitor real-time data in Command Centre according to the particular characteristics of the structure the sensor was affixed to." “Overall, I was impressed with the ease of installation, the adjustability of the sensors and how well the sensors integrated with the Command Centre software.” Following the installation of the Gallagher system, IDOC was able to reclassify the facility as level 2, thus allowing them to house a wider group of offenders using the cost-effective, yet highly secure perimeter security solutions offered by Gallagher.
Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
Security alarm: Manufacturers & Suppliers
- RISCO Group Security alarm
- Vanderbilt Security alarm
- Optex Security alarm
- Bosch Security alarm
- Honeywell Security Security alarm
- Texecom Security alarm
- DSC Security alarm
- ITI Security alarm
- Klaxon Security alarm
- Climax Technology Security alarm
- Visonic Security alarm
- CQR Security alarm
- Esser Security alarm
- Scantronic Security alarm
- Guardall Security alarm
- Elmdene Security alarm
- IR-TEC Security alarm
- ADPRO Security alarm
- Senstar Security alarm
- Hanwha Techwin America Security alarm