People and vehicle access control specialist Nortech will be exhibiting at Elevate 2019, the meeting place for UK’s growing physical activity sectors at London’s ExCel on the 8-9 May to introduce its innovative products to the market. 2019 is Nortech’s first time at the show and they will be demonstrating the flexibility of the Norpass access control solution, which provides a wide range of features that are ideally suited to the leisure sector. Access control sector With No...
The Enforcer on Tour is back and this time with its flexible perimeter protection that speaks for itself, delivering voice push notifications and Full-HD video verification. The company’s dedicated Account Managers will be hosting open days at various distributors across the UK throughout May and June, showcasing the full capabilities of the Enforcer system and how Pyronix perimeter protection can deliver a plethora of business growth opportunities. “Following on from last year&rsq...
Johnson Controls updates its popular Illustra Pro camera family with the Illustra Pro Mini-Dome, featuring new Smart Wide Dynamic Range that optimises video quality while minimising configuration time. Available in a complete range of image resolutions and lens options, the Pro Mini-Dome is ideal for a wide variety of deployments in both medium and large-sized facilities. Smart Wide Dynamic Range available in the Pro Gen3 Mini-Dome reduces configuration time while greatly improving the quality...
Sonitrol, the provider of verified electronic security, announces the launch of TotalGuard Smart Hub & Wireless Devices that offer a more robust security solution to the small and medium business markets. This new offering includes a variety of wireless sensors that connect to the new TotalGuard Smart Hub, expanding reach and alarm capabilities. Sonitrol’s TotalGuard solution, launched in 2018, targets the small to medium business market by offering affordable, professional security....
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the bigges...
Comelit Group successfully inspired at the industry first, ‘The Security Event,’ presenting new and existing customers with its latest smart solutions in stylish door entry, home automation, fire and CCTV. On stand SE28 at the premiere exhibition, Comelit unveiled its innovative Switch solution, which has been developed solely for installers to enable a simple ‘switch’ upgrade to an audio or video panel option. Also well-received was Comelit’s latest simple to inst...
The Boring Lab announced that The Boring Toolbox, a set of performance and maintenance tools to help customers more efficiently manage Milestone Systems’ XProtect video surveillance networks, has added key features for enterprise and large-scale sites with 5,000+ cameras and 100,000+ devices. The Boring Toolbox V3 offers a smoother user experience and optimised performance features, both of which were necessary to support larger installations. The Boring Toolbox allows customers to maintain a higher level of security through streamlining management tools (including bulk password changing, camera settings modifications across dissimilar devices, and providing optimised and hassle-free report generation in Excel). The Boring Toolbox assists in data protection regulation compliance, such as GDPR Assists in data protection regulation In addition, The Boring Toolbox assists in data protection regulation compliance, such as GDPR, since customers can manage medium-to-large scale datasets within VMS systems, rather than having to work on each device separately. Enhancements to Boring Toolbox V3 include: Optimised to reduce loading times of the application by 85% Optimised for large data sets of 4000+ device groups, 100,000+ devices Optimised generating camera report by approximately 60% Bulk IP address updating Compatible with Sivelliance VMS The Boring Toolbox can now manage camera deployments from Arecont, Axis, Hanwha, Sony and BoschThe Boring Toolbox is now compatible with new systems and devices. Siemens Building Technology verified that it is compatible with Sivelliance VMS (video management system). The Boring Toolbox can now manage camera deployments from Arecont, Axis, Hanwha, Sony and Bosch. “The initial release of The Boring Toolbox has been applauded by the Milestone community. After coming off of our recent win as Milestone Solution Partner of the year, we’ve delivered Version 3 to support larger enterprise installations tackle surveillance network issues around cybersecurity and GDPR compliance,” said Ronen Isaac, CEO of The Boring Lab. “Additional integrations with Siemens and camera manufacturers further extends the Boring Toolbox’s value and our promise to make Milestone installations less boring to manage.” The Boring Toolbox V3 is available immediately. Visit The Boring Lab at ISC West in the Milestone Partner Pavilion at booth # 18053.
Matrix, a manufacturer and provider of telecom and security solutions, is conducting Matrix Insight 2019 Jeddah and Riyadh on 18th and 22nd April respectively from 09:00 AM to 12:30 PM. Matrix welcomes everyone in the telecom and security industry from new prospects, strategic partners to existing customers and suppliers. At the event, Matrix will highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP, for such applications, Matrix ETERNITY NENX is a perfect fit. Enhance guest experience Matrix Hospitality solution which is specifically designed to enhance guest experience at Hotels will also be one of the major highlights Matrix Telecom domain will also be showcasing its comprehensive telecom solutions which includes IP-PBX, communication endpoints, media gateways, mobile application and much more. Along with that, Matrix Hospitality solution which is specifically designed to enhance guest experience at Hotels will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features, front desk, PMS integration, staff mobility extensions and voicemail with personalised greetings. In the events, Matrix will showcase futuristic technologies from the security domain. Matrix access control and time-attendance domain will showcase its newly launched face recognition technology for authentication through IP cameras/tablet/mobile. The technology enables contactless authentication with precise and accurate authentication. Apart from this, Matrix will display our high-end cloud based time-attendance and access control solution. Access control solution Mobile being the next generation technology in the security domain, Matrix will showcase mobile based access control solution whereby user can either scan QR code or just twist his/her phone for authentication. User can mark attendance automatically using GPS or Wi-Fi through mobile application. Matrix being the front face in innovation, Matrix is going to show some extraordinary biometric door controllers useful for applications in time-attendance, access control, visitor management, cafeteria management and many more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RF card and PIN options at Matrix Insight, Jeddah and Riyadh. Better bandwidth optimisation The entire solution focuses on automating processes, easy integration with Access Control and enhancing efficiency of organisations Matrix will also be showcasing an enterprise-grade IP video surveillance solution designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes, easy integration with access control and enhancing efficiency of organisations. Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. Intelligent software Furthermore, Matrix will be showcasing new extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time Security. “Events like Matrix Insight are important to us because they give us the chance to connect with our partners, SIs and prospects. We look forward to explore and spread our footprints in the territory through this product expo, showcasing our innovative solutions that can help accelerate business growth”, said Ganesh Jivani, Managing Director.
Security and Safety Things (SAST) - A Bosch IoT startup, hosted the first-ever live hackathon at ISC West on the 10th and 11th of April in the Sands Expo Center, Las Vegas. The two-day event featured three teams racing against the clock to create the most deployable application for an American football stadium using the new Security and Safety things system, SAST OS (Operating system). Teams were provided with Google pixel phones, reference cameras and appropriate APIs and development kits, including a video API, control API and a web server API. From there, they were tasked with developing creative solutions that would inspire new use cases and generate business insights, through the use of SAST OS. Software development environment Submissions were reviewed by Jim Coleman, Convergint; Staffan Grundström, Securitas; and Markus Berger-de León, Partner McKinsey & Company. The goal of the challenge was to develop apps, but also to show the industry how easy apps and solutions can be developed using SAST OS. Furthermore, the hackathon provided valuable feedback that will impact future development of SAST OS and the software development environment. SAST believes that the ecosystems and framework they have created will soon be a powerful standard for developers, integrators and hardware manufacturers alike. The hackathon showcased the ease of use of the system overall, and will act as a starting point for future innovations / developments.
IDIS launches the DirectIP Super Fisheye 5MP Compact camera (DC-Y6513RX), further extending its popular Super Fisheye range. IDIS fisheye cameras are some of IDIS’s best-selling models thanks to their exceptional, dual-side de-warping and Smart UX Controls, allowing for smooth and intuitive panning, tracking, and zooming with award-winning ease and accuracy. Accurate image capture The introduction of the DC-Y6513RX reflects IDIS’s continued commitment to market-responsive innovation and meets installer and end-user requests for a more compact 360° camera that can capture high-definition images in all lighting conditions without blind spots. It also lets customers to benefit from heat mapping without the hassle and cost of additional appliances or analytics software. A broad, high-specification camera, in a compact form, the new Super Fisheye 5MP builds on the success of earlier IDIS’s Super Fisheye cameras, including the award-winning 12MP DC-Y3C14WRX. It meets industry demands for clear and accurate image capture, long-term performance and reliability, exceptional de-warping, and a low total cost of ownership. Wide area surveillance The new Super Fisheye 5MP Compact is a great new choice for wide area surveillance" “The new Super Fisheye 5MP Compact is a great new choice for wide area surveillance and is already contributing to successful project wins for our integration partners in retail applications, eating-out sectors, education, healthcare and other environments where customers benefit from cost-effective and simple to use analytics.” “Its high performance 360° capability means it can replace multiple fixed-lens cameras and provide complete and clear image capture in a variety of lighting conditions. For our integrator partners, IDIS’s value proposition, fast and seamless installations and performance guarantees have the potential to increase margins, while end-users benefit from savings in terms of lower upfront equipment and installation costs, with reduced maintenance expense and video storage burden,” said James Min, Managing Director, IDIS Europe. Quick and simple installation The IDIS 5MP IR Compact Fisheye features include: IDIS Smart UX Controls for very high accuracy and ease-of-use, with intuitive ‘rubber-band’ style control to deliver a new level of operator experience. Super smooth de-warping on the camera as well as on desktop applications and mobile devices for added convenience and out-of-hours monitoring. Quick Controls allowing operators to use the CTRL button with a combination of left, right, and wheel mouse clicks for easier and faster investigations. Full protection against video loss thanks to built-in IDIS Smart Failover guaranteeing continued recording in the event of network instability, overload or failure. IDIS Intelligent Codec that delivers H.264/H.265 dual codec performance and significant bandwidth and storage savings, while eliminating the need to upgrade hardware. Quick and simple installation with DirectIP NVRs and true plug-and-play functionality. Reduced potential for cybersecurity loopholes with one-click configuration eliminating the need to manage individual passwords for multiple devices. Heat-mapping to more easily identify hot-spots, dead zones and bottlenecks in retail and eating-out sectors. Intelligent video and event trigger functions including motion detection, active tampering and trip zones. Wide dynamic range IDIS will be demonstrating its Super Fisheye range and Total Solution line up at IFSEC International “The IDIS Super Fisheye 5MP Compact camera also scores highly on essential features including, built-in LEDs for IR operation in full darkness (up to 15m); 8 zone privacy masking; true wide dynamic range; ONVIF support; built-in speakers and microphone allowing 2-way communications; 5-year free warranty. All these factors come together to deliver a lower cost of ownership to our customers,” continued James Min. IDIS offers an end-to-end, single sourced video offering that delivers unrivalled plug-and-play simplicity, combined with highest-quality performance, compatibility, and a low total cost of ownership and features warranties. IDIS will be demonstrating its Super Fisheye range and Total Solution line up at IFSEC International on 18-20 June at ExCeL, London, UK.
Axis Communications launches AXIS Q6215-LE PTZ Network Camera to meet the increasing demand for more heavy-duty PTZ cameras with built-in IR (Infrared) illumination. This new model comes with a ½-inch sensor and combines great image quality with fast pan, tilt, and zoom functionality. The camera features long-range OptimizedIR with IR-LEDs that adjust to the camera’s zoom and can deliver superior videos in low light or complete darkness up to 400m (1300ft). This camera is ideal for open-area surveillance such as airports, harbours and highways, and its robust design can withstand the toughest weather conditions including wind speeds up to 245 km/h (152 mph). High light sensitivity This heavy-duty PTZ camera meets the MIL-STD-810G standard, ensuring reliable operation in extreme weather conditions Key features include: OptimisedIR 400m (1300ft) ½” sensor for high light sensitivity and dynamic Compliant with MIL-STD-810G and NEMA TS-2 HDTV 1080p resolution, WDR, Lightfinder and 30x optical zoom AXIS Guard Suite analytics included This heavy-duty PTZ camera meets the MIL-STD-810G standard, ensuring reliable operation in extreme weather conditions. With vandal-resistant IK10-rated casing and IP66/IP68 ratings, you can be rest assured that the camera housing is resistant to both harsh weather conditions and impacts. Built-in analytics AXIS Q6215-LE Network Camera is a high-performance, HDTV 1080p, PTZ camera with 30x optical zoom. Featuring long-range OptimizedIR enables the camera’s IR LEDs to automatically adjust to the camera zoom, so the entire field of view is always evenly illuminated, even in scenes with complete darkness. It also offers Axis’ Zipstream technology to save bandwidth and storage by up to 50% – without sacrificing quality. AXIS Q6215-LE is packed with built-in analytics to alert you when needed. It comes with AXIS Guard Suite analytics, including AXIS Motion Guard, AXIS Fence Guard and AXIS Loitering Guard, for detecting motion, intrusion and loitering. The camera's flexible design allows it to be mounted facing up or down, directly to a surface or with a wall or pole mount. Additionally, it includes a wiper for removal of excess water, and is compliant with IP66, IP68, IK10 and NEMA 4X.
Hardly any other topic is creating as much excitement as Artificial Intelligence (AI) at the moment. High expectations and extravagant promises abound, particularly in the field of video security technology: Here, the ideas about what it can do range from detecting unusual behaviours such as attacks on individuals to recognising individual faces even in large crowds of people to automatic detection of the proverbial ‘bomb in a suitcase’. The Regensburg-based company Dallmeier has been working on and with AI technologies for years, and has now published four practical statements intended to help customers and providers to make a realistic assessment of AI. Video security technology People often ignore the fact that new technologies always require public debate and changes to very real framework conditions At the beginning of a hype cycle, when innovations are being introduced, people often ignore the fact that new technologies always require public debate and changes to very real framework conditions before they can be implemented wholesale. The still unresolved problem in autonomous driving – when it comes to accidents where the car has to make potentially fatal decisions – has become an almost classic example. There are similar unresolved questions when AI is used in video security technology: How much freedom to decide should a system be given? What quality criteria will be established for detecting objects, for example? Who is to be held accountable when an attack is not detected, for example, even though the expectation may possibly exist already among the people? What reaction times will be defined, by when must response teams reach the site in the event of an ‘AI alarm’? Are there even enough personnel available for the potential new intervention and search options? How are the many ‘false positives’ to be handled when facial recognition is used to find a suspect, for example? Video analysis systems Technical systems are becoming more and more complex. This is why it is essential to evaluate all of the parameters that affect the performance of a whole solution. The IT axiom ‘garbage in, garbage out’ is most apposite in this context: Neural networks for classifying objects or processes or good facial recognition software can only deliver results that are consistent with the quality of the video image they receive: AI-based video analysis systems can only be as good as the camera systems that capture the images for them. In this context, it will be particularly important to be able to define and plan minimum picture qualities properly in all parts of the video image, plan camera angles correctly, and consider many other details. And the person behind the system must be also be included in the overall consideration with regard to qualification and organisational questions. In short: Unless all factors are tuned to work together, it will not be possible to ensure compliance with standards – which by the way have not even been defined yet! Perimeter protection Initial deployment scenarios and functioning solutions already exist, whether it be in the optimisation and analysis of analogue processes With all due caution: It goes without saying that Artificial Intelligence will play a decisive role in video technology – or may even become a core component of the discipline. Initial deployment scenarios and functioning solutions already exist, whether it be in the optimisation and analysis of analogue processes, e.g., at a casino gaming table, in the improved classification of objects for perimeter protection, or in the assisted tracking of individuals in the context of urban surveillance. The key point in all of these systems: Today and probably for a long time to come a human is still at the centre – the operator, the policeman, the forensic specialist. And it is for these functions that AI in video technology now already delivers useful assistance systems. They are being improved rapidly and take over tedious, error-prone tasks. But contrary to all the advertising features on YouTube, automatic location of a planted ‘suitcase bomb’ in complex circumstances is still well beyond current technological capabilities. Technical innovation Every technical innovation is predestined to contend with ambiguous definitions, exaggerated expectations and variable interpretations of its capabilities: No one ‘really knows’, but everyone involved has an opinion. This is why it is important to examine and question closely: Which functions are market-ready and implementable – even if a little tweaking is needed –, and what is still purely in the realm of research? Particularly with a view to strategic decisions and investments, prospective users should always begin by asking themselves whether a given result can be expected in twelve months, five years, or ever. Otherwise, they run the risk of losing sight of obvious solutions to pressing problems.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. What first brought the issue of alarm verification to your attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What is the false alarm rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why did this issue resonate so strongly with you? When I first investigated this issue, I was sure that the security industry would have already recognised this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who is affected by this? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a bill for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What is the average false alarm fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why do you believe audio is the ideal technology for secondary source verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How would a secondary source verification system work with audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are there any additional resources you would suggest looking into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymising retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organisation is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimise both their security strategies and their business operations.” - Mark Perkins, Boon Edam
MIPS (Milestone Integration Platform Symposium) Copenhagen 2019 saw Milestone Systems double down on the ‘creating an intelligent world’ theme from 2018 and expand it to ‘exploring an intelligent world.’ “The intelligent world theme was bigger than we could cover in one year!” said Malou Toft, VP of EMEA at Milestone Systems. Isolate important events With 865+ registered attendees and more than 47 exhibiting partners in Denmark, this is the largest Community Days event Milestone have hosted, even larger than the very well-attended Nashville event in February. The company took the opportunity to present Marketplace, their new Amazon-style online company directory, where end-users can identify Milestone Verified and Certified companies to supply a security solution. There was also a demo of Milestone’s XProtect software updates, able to adjust a video feed in real time to show number plates, to de-blur video and to filter out irrelevant clips to isolate important events, identified by artificial intelligence (AI). Self-learning mechanism We’re seeing advances on a small scale and are now going to see it becoming an inherent part of XProtect moving forward" “We’re seeing advances on a small scale and are now going to see it becoming an inherent part of XProtect moving forward,” said Malou Toft. “One example is, the way we can ask a camera with the right type of integration to dynamically adjust to the environment.” And Malou says the best is yet to come. Of today’s technology on show at MIPS, and indeed at 2019’s trade shows, she said: “Is it super intelligent? No, not now. But it’s mostly solving the simple tasks now, that are replicable. But it is optimising the process, and to become a self-learning mechanism, we are going to see much more of that moving forward.” Exploring the intelligent world The talks of the symposium reflected these thoughts as well. Altimeter’s Brian Solis commented about AI: “We can automate the daily things we do today, or we could use the technology to automate our innovations.” This is clear in Milestone’s theme of ‘exploring the intelligent world’ – the industry has created the foundations of the intelligent, and now companies such as Milestone and their 110 (and growing) new Marketplace partners are exploring them. MIPS EMEA 2020’s location is yet to be determined, but MIPS Bali 2019 will be Tuesday April 2 – Thursday April 4. Milestone will be back in Copenhagen for their Developer Conference October 1 and October 2.
Application of artificial intelligence (AI) and deep learning in the physical security market runs a gamut from cloud computing to edge computing. A variety of hardware solutions enable AI to be deployed at any level of a system from the cloud to edge devices such as security cameras. Smarter AI-powered applications A distributed structure can incorporate cloud computing and edge computing. It extends the Artificial Intelligence (AI) algorithm from the cloud, to an edge network of on-premises video recorders and servers, and further to edge devices like the security cameras. The three-layer architecture all supports the goal to build a new class of AI-powered applications, being even smarter and faster. A combination of in-camera video analytics and deep learning capabilities in the cloud can improve video analyticsA combination of in-camera video analytics and deep learning capabilities in the cloud can improve video analytics. Cameras can be equipped with basic video analytics, and they are tied into a cloud infrastructure that provides additional deep learning algorithms. The cameras provide computer vision pre-processing, with the bulk of detailed analysis happening in a neural network in the cloud. Data capture form to appear here! The software-as-a-service (SaaS, or cloud) model gives companies the resources to improve deep learning. Systems are more accurate and can scale better and faster, using a larger data set from multiple customers accessing the cloud-based system. One customer benefits from another customer, and all the knowledge is aggregated together. Distribution of data from edge to cloud Cloud computing allows users with various computing capabilities to store and process data either in a privately-owned cloud or on a third-party server located in a data center. However, with the computing business becoming more and more versatile and complicated, the demand for data processing performance is even higher. In the process of data transition to the cloud, cloud computing consumes tremendous network resources and time, which all result in network congestion and low reliability. Distribution of data throughout a system, from the edge to the cloud, relieves pressure at any one point Distribution of data throughout a system, from the edge to the cloud, relieves pressure at any one point. With AI algorithms woven into edge devices, only selected information such as an individual or a vehicle in a video image will be extracted and sent which significantly enhances the transition efficiency and reduces the network bandwidth, while still sustaining high quality and accuracy. The Cloud adds AI capabilities The cloud provides additional data computing capabilities required for AI and deep learning applications. A single Amazon Web Services data center has between 50,000 and 80,000 servers. All told, observers estimate Amazon Web Services may have between 3 million and 5 million servers. The other major cloud services — Google, Microsoft, VMware, Citrix and others — add additional millions of servers. Amazon Web Services offers a broad and deep set of machine learning and AI services for a business AWS (Amazon Web Services) offers a broad and deep set of machine learning and AI services for a business. In effect, the service puts machine learning in the hands of any developer, enabling them to build, train and deploy machine learning models. On behalf of customers, AWS is focussed on solving some of the toughest challenges that hold back machine learning from being in the hands of every developer. Capabilities are built on a comprehensive cloud platform optimised for machine learning with high-performance and no compromises on security and analytics. Advantages of edge systems Deep learning and neural network computing are everywhere. They are now widely available in on-premises computers, in systems embedded in edge devices, and even in the cloud. The edge is particularly important in the video surveillance market, enabling systems to function despite any bandwidth or latency issues that would limit the effectiveness of a central server-based system. Edge-based functionality also limits concerns about the privacy of information and eliminates dependence on the availability of 3G connectivity. Edge computing makes it possible to ensure data is more private, rather than having it reside in a private or public cloud Artificial intelligence (AI) is a very computational-intensive process, and doing that processing at the edge avoids the need to do it centrally, whether in the cloud or in an on-premises computer. In the case of video cameras, in particular, there isn’t enough bandwidth to transfer video data across a network infrastructure to be processed. Half the populated world has Internet speeds of less than 8 mbps, which can’t possibly handle the level of data required for new intelligence applications. Latency is another advantage of intelligence residing at the edge. Applications increasingly require little to no latency (less than 200 milliseconds), and transferring data to be processed elsewhere takes time. Edge computing also makes it possible to ensure data is more private, rather than having it reside in a private or public cloud or on premises. Higher computing ability and efficiency of embedded systems at the edge are paving the way for physical security devices with intelligence far beyond what the industry now has to work with.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
Sony’s ultra-sensitive SNC-VB770 4K network cameras are helping maintain the safety of bridge users – and the physical integrity of the structure itself – at river crossings between the neighbouring states of Pennsylvania and New Jersey. A total of twenty cameras have been installed by Delaware River Joint Toll Bridge Commission (DRJTBC), a Bi-State commission of Pennsylvania and New Jersey. This self-funded agency ensures safe, efficient and dependable journeys for road users and pedestrians. Potentially dangerous collisions A principal application for the cameras is the reliable 24/7 identification and monitoring of hazardous floating debris Several of the bridges controlled by DRJTBC are in areas, where homes are nearby, and local municipalities request not to use powerful artificial illumination at night to limit light pollution. This restriction made the SNC-VB770 an obvious choice for monitoring and surveillance, with its highly sensitive 35mm full-frame Exmor CMOS image sensor capturing crisp 4K colour images in conditions of near total darkness. A principal application for the cameras is the reliable 24/7 identification and monitoring of hazardous floating debris. Objects like fallen trees or discarded gas tanks heading down river – especially in winter when water levels are high – pose the risk of impacting with the bridge supports, making early warning of potentially dangerous collisions essential for operational staff. Low-light performance In addition to monitoring for signs of loitering and other suspicious activity around the bridge supports, the cameras also help ensure the safety and security of pedestrians using walkways to cross the bridges, especially at night and in adverse conditions of rain and snow when visibility is poor. Supplied and installed by Schneider Electric, all cameras are mounted in weather-resistant housings and integrated with DRJTBC‘s Genetec Security Center network video management system platform. We subsequently put them through their paces in a live demo at two of our bridge locations" “We first previewed the Sony 4K cameras' capabilities at ISC West” explains Eric Freeman, Director of Public Safety & Bridge Security at Delaware River Joint Toll Bridge Commission. “We subsequently put them through their paces in a live demo at two of our bridge locations. Analysing video from the SNC-VB770 and comparing it against our existing cameras, the difference was immediately clear in terms of Sony’s extra detail and low-light performance.” Video surveillance applications “4K is an increasingly popular solution in a wide range of video surveillance applications” says Allen Chan, Manager Application Design for Sony Video Security at Bosch. “Many other 4K cameras currently on the market trade extra resolution for decreased sensitivity, and that’s a big issue in environments where available light is limited. The SNC-VB770 side-steps this challenge with its unprecedented sensitivity of ISO 409600 – giving an impressively clear view at night and in situations where other 4K cameras aren’t viable without installing costly additional illumination”.
Bath and North East Somerset Council (B&NES Council) is extending its Videalert CCTV enforcement platform with the installation of additional cameras for its approved class C clean air zone (CAZ) that gives exemptions to private cars but charges higher polluting buses, coaches, HGVs, LGVs/vans, private hire vehicles and taxis. Videalert was awarded the contract to ensure full and seamless integration with the council’s existing hosted digital video platform which is already being used to enforce a wide range of restrictions including bus lanes, bus gates and permit parking. Videalert CCTV enforcement platform B&NES Council was one of 28 councils directed by the government to prepare an action plan to urgently reduce high levels of nitrogen dioxide (caused by vehicle emissions) to within EU and national limits by 2021 at the latest. The authority had originally proposed a Class D CAZ, charging all higher emission vehicles, including cars, to drive in the city centre. However, following further ongoing technical work and a public consultation in December - which garnered an unprecedented 8,421 responses - a class C option with additional traffic management, was agreed. According to Chris Major, group manager for Transport and Parking at B&NES Council: “The new charging class C CAZ will achieve compliance by 2021 apart from a single exceedance caused by localised traffic issues. We believe this will be resolved by installing traffic signals at two junctions.” HD ANPR cameras Videalert will be installing HD ANPR cameras to enforce the new CAZ scheme at key road junctions across the designated boundary Videalert will be installing HD ANPR cameras to enforce the new CAZ scheme at key road junctions across the designated boundary. The hosted Videalert platform will automate the management and enforcement of this new zone, providing real-time identification including vehicle make, model, colour and euro standard rating for pre-filtering and updating the whitelist of compliant vehicles held at the edge to minimise transmission costs. Information on non-compliant vehicles will then interface with the UK government’s new national clean air zone database for vehicle validation and payment. The system will also provide detailed analytics and impact analysis highlighting the reduction in non-compliant vehicles entering the zone over time. Support multiple applications Tim Daniels, Sales and Marketing Director at Videalert, added: “The award of this high-profile contract confirms Videalert’s ability to handle the evolving requirements of clean air and low emission zones. It also demonstrates how a single video data platform can support multiple applications, enabling councils to address the challenges of improving traffic congestion and air quality simultaneously.” The CAZ should commence operation at the end of 2020. The daily charge will be £9 for non-compliant taxis, private hire vehicles and light goods vehicles (the minimum standard being euro 6 for diesel and Euro 4 for petrol), and £100 for buses, coaches and HGVs (the minimum standard being euro 6).
This year’s Super Bowl LIII American football game to determine the champions of the National Football League (NFL), has been protected by 360 Vision Technology’s ruggedised-Hybrid Invictus PTZ camera. The cameras were deployed as part of Security Centres International’s high-performance Mobile Advanced Safety Tower (MAST) rapid deployment camera solution. In all, 10 rapid deployment MAST units were deployed in various areas surrounding the brand new, Mercedes-Benz Stadium and State Farm Arena in Atlanta Georgia. With over 1 million fans expected to participate in Super Bowl and the 10-day fan festival, the Metropolitan Atlanta Rapid Transit Authority (MARTA), was keen to complement the existing CCTV networks around the grounds and mass transit point footfall areas, such as bus and rail stations. HD surveillance imaging MAST is the only product of its kind that would readily integrate into the existing CCTV infrastructure" Stuart Bostock, Executive Group President at Security Centres International explains why the 360 Vision Invictus camera based MAST system was chosen by MARTA: “Featuring world-class HD surveillance imaging, leading-edge design, robustness, zero infrastructure requirements and seamless Video Management System (VMS) integration, MAST is the only product of its kind that would readily integrate into the existing CCTV infrastructure. Additionally, MAST benefits from a significantly smaller footprint than similar trailer based stand-alone surveillance systems.” “MAST has been developed to answer the need for a more sophisticated and flexible surveillance system for infrastructure and public space safety, including large crowd gatherings, as in this application. MAST is unique, as it combines a rapidly deployable unit with some of the most advanced safety and surveillance technology available – the very reason why we selected 360 Vision Technology’s Invictus camera for its core imaging technology.” Full 1080P HD PTZ camera Invictus’ low-power consumption greatly assists the longevity of critical battery power when deployed in the field" Mark Rees Managing Director of 360 Vision Technology added: “360 Vision Technology’s Invictus is a high-performance, ruggedized all-in-one PTZ camera with full 1080P HD and ultra low-light camera technology - making it the perfect choice for off-grid temporary/rapid deployment mobile surveillance rigs, such as MAST. Additionally, Invictus’ low-power consumption greatly assists the longevity of critical battery power when deployed in the field – extending MAST’s operational performance for deployment in more remote applications.” “The Invictus camera’s unparalleled mix of competitive cost and advanced Predator low-light camera imaging technology makes it the perfect imaging component for the innovative MAST system.” MAST units at Super Bowl LIII The use of the MAST units integrated to the existing fixed camera points during Super Bowl LIII week proved a huge success with high-definition images transmitted back to the MARTA Emergency Operations Centre via a mobile network. System operators were able to identify and tackle a number of incidents Thanks to the high quality of images received, system operators were able to identify and tackle a number of incidents, including a vehicle theft. Additionally, the images were also used to predict areas of dense footfall, tackle crowd control safety issues, and manage general health and safety concerns. The deployment of the Invictus based camera system at Super Bowl LIII proved such a success that plans are already in place for deployment at other large-scale US sporting events, including the NCAA Final Four Basketball Championship in 2020 and for city centre deployment across Atlanta.
OpenView Security Solutions, the UK’S largest privately-owned independent security company and a national supplier of electrical and mechanical services, has completed a major upgrade to the CCTV security systems used at Cardiff Airport, the national airport for Wales and a key gateway to the UK. Upgrading airport security The project included a software upgrade for 40 cameras and replacement of a further 110 cameras with the latest high definition devices. The security network was expanded with an additional 80 cameras to meet the requirements of Cardiff Airport which is one of the UK’s key strategic assets that welcomes over 1.58 million passengers annually. Ian Godsell, IT Technician and GDPR Data Protection Officer at Cardiff Airport, said: “We have been impressed by the professional approach and expert advice provided by OpenView throughout the successful completion of this significant upgrade to our CCTV security systems. The safety and security of our staff and customers is our number one priority and the advanced technology in place supports our efforts to constantly monitor activity across the airport. This in turn supports our commitment to minimise risk and remain compliant in terms of regulatory standards.” IP cameras and VMS The first phase saw OpenView upgrading the CCTV control room with Indigo Vision’s Control Centre OpenView Security Solutions was invited to propose a solution for the staged upgrade of the security network as it was the airport’s incumbent CCTV systems maintainer and had received recommendations from Indigo Vision, which supplied the cameras, Video Management System (VMS) and Network Video Recorders (NVRs). The first phase of the upgrade project saw OpenView upgrading the CCTV control room with Indigo Vision’s Control Centre, the company’s latest VMS platform and a new video wall to give operators the clearest view of the expanded camera network. It also provides department heads with browser-based access to video footage to quickly review events and enhance decision-making. Indigo Vision NVRs Additional Indigo Vision NVRs were installed to capture and store images from all cameras for a 31-day period with an additional unit for failover applications. The upgrade was planned and completed to minimise disruption to the airport operation and ensure continued security vigilance throughout the process. OpenView then replaced existing cameras which were obsolete and, as soon as new cat 5 cabling had been installed by the airport’s third-party contractor, was able to complete the new installation locations across the Airport including fire stations, management suite and hangars. HD CCTV surveillance system This upgrade confirms OpenView’s ability to handle major infrastructure projects for safety critical organisations throughout the UK" “With extensive experience of working with airports and a nationwide network of strategically located offices, this upgrade confirms OpenView’s ability to handle major infrastructure projects for safety critical organisations throughout the UK,” added Andy Ward, Sales Director at OpenView Security Solutions. Several challenges had to be overcome whilst completing this upgrade, including having to unexpectedly replace collapsed ducting in some of the car parks and the handling of all intricacies involved in risk assessments relating to working at height throughout the airport. OpenView continues to provide a high-quality maintenance support service to ensure the system consistently operates at peak efficiency and is working closely with the IT team to further enhance the CCTV network as the airport continues to expand.
Sony 4K security cameras act as ‘intelligent eyes’ at EDGE Olympic, one of Amsterdam’s most technologically advanced sustainable buildings. The rugged minidome cameras give a clear picture of the flow of workers and visitors into and around the premises. In addition, their excellent low-light sensitivity is an asset for the reinforcement of security at entrances and car parking areas. Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras EDGE Olympic is an exciting landmark in sustainability. Opened in May 2018, the building constructed by EDGE offers over 11,000m2 of innovative co-working space close to Amsterdam’s Olympic Stadium. Providing a creative and energy-efficient workspace for commercial tenants, the building’s design is focused on a sophisticated digital infrastructure that connects people, devices, sensors and information via a secure cloud platform. Sony SNC VM772R 4K minidome cameras Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras installed by Netherlands security specialist, Lancker Wolters. The cameras are integrated with Genetec’s video management system to create a comprehensive video security and monitoring solution. Ruggedly built for all-weather outdoor operation around the clock, the SNC VM772R camera features a large, highly sensitive 1.0-type back-illuminated Exmor R CMOS image sensor. Offering four times higher resolution than Full HD, the camera is capable of capturing smooth, crisply detailed 4K video in conditions of near darkness. This allows people and objects to be seen clearly in a wide range of lighting conditions – and thus helps to ensure round-the-clock safety and security of employees, co-workers and visitors to the building. Video data in building operations optimisation In the future, it is expected that video data will also be used to optimise building operations In the future, it is expected that video data will also be used to optimise building operations. For example, intelligent analysis of traffic patterns could enable more efficient room bookings and use of resources such as heating, lighting and cleaning services. Further, SNC-VM772R cameras monitor the EDGE Olympic car park, scanning the registration license plates of vehicles and checking the number against a database to admit authorised staff and visitors only, while automatically raising the barrier to let vehicles exit. This also allows instant confirmation whether a particular employee is present in the building: this overview can be beneficial, for example, in the event of an emergency evacuation. Sony 4K surveillance cameras "The initial price of a particular camera doesn’t matter" comments Erik Ubels, CTO, EDGE Technologies. "It’s the usability over its lifetime that makes it a better investment. That's why we chose Sony 4K cameras for this landmark building and other properties that we’re planning in the near future."
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the cut-throat high street environment. Best-selling products They resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise How do we know if our marketing strategy is working? What is the conversion rate of purchases? What are the ‘hot areas’ of the store, and do these actually represent best-selling products? Originally, with no access to significant information, they relied on experience and conversation with staff. But there was no way to verify these findings. They also needed to be able to get this information remotely – i.e. management in their HQ in Warsaw wanted to be able to see the situation in the other four stores without having to visit them separately. Sometimes, they resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise. Tailor-made solution Miniso turned to Hikvision AI products, with a solution built by Polish reseller Volta, including people counting cameras, fisheye cameras and NVRs. These were all coordinated using the HikCentral software platform. A people counting camera in each store counts people passing by, while another counts people entering and leaving. With this tailor-made solution management could calculate how many people were passing by to see a purchasing conversion rate. This also helps them to know whether marketing strategy is working. They can analyse the information further to see whether the rate of people entering the store is dropping, and whether that relates to the number of those passing outside. Miniso’s management can then look into the causes of these numbers, along with sales figures, to form a picture. For example, whether there is an external factor affecting shoppers either to pass by, or to enter. Video management platform The professional video management platform allows managers to access the information from different offices and mobile applications anywhere Because Miniso have the same technology set up in all the stores in Poland, they can compare different locations. This also comes in useful when it’s time to negotiate rent with shopping malls. Using ceiling installation of several fisheye cameras, the system can generate heat maps. This helps managers to see where ‘hot areas’ are, helping them to allocate products in the optimal place for promotion. Hot areas can also be compared with sales figures to provide further insights into shopping patterns. All the information provided by the system is coordinated, and business information on both layout and original image can be overlaid in Miniso’s HQ in Warsaw. The professional video management platform allows managers to access the information from different offices and mobile applications anywhere. This makes life a lot easier for the operations team as they need to check the situation in all stores. Fiercely competitive environment It also means that everything can be viewed simultaneously, so they can identify trends throughout the network of stores. Byron Zeng, Vice President of Miniso Poland, says: “The high accuracy of conversion rate the solutions provides really solves a number of our management issues. We can now easily see what’s going on in the other stores, including heat mapping, which makes management of the whole networks so much more efficient.” This is a great example of how AI surveillance products can change the landscape of business decision-making. In a fiercely competitive environment, like a shopping mall or high street, shopping trend data can help a retailer to survive. In fact, this worked so well for Miniso, they decided to use the solution in their stores across the whole of Europe – potentially about 200 stores in the next year.
Round table discussion
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?