Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performa...
FLIR Systems, Inc. announces modified thermal cameras for fast and safe non-contact elevated skin temperature screening. The FLIR EST™ thermal screening solutions provide frontline screening at building entries and in high traffic areas to improve safety and help curb the spread of COVID-19. The FLIR Axxx-EST, FLIR T5xx-EST, and FLIR Exx-EST series cameras are designed to simplify the screening process, reducing the burden on screening operators and adhering to recommended social distanci...
Automation plays a major role in Industry 4.0. Cost reduction, increased productivity and zero-defect quality are factors that are increasingly prompting companies to digitise their processes. But often full automation also means high investments. At the same time, the focus will continue to be on the human being in the interaction between man and machine. Given the prevailing shortage of skilled workers and high standards of industrial safety, this is no easy task for companies. Additional cha...
Allied Universal, a renowned security and facility services company in North America, announces the availability of distance screening solutions as companies continue to launch their ‘return to workplace' initiatives. Distance screening solutions Allied Universal Technology Services experts are working with customers to design and implement the screening solutions that best fit their company's environment, requirements and existing security operations. The screening solutions include sta...
Videonetics announces that it has joined the Qualcomm® Smart Cities Accelerator Program to provide their AI and Deep Learning powered Unified Video Computing Platform™ (UVCP) to diverse industries such as smart cities, aviation, enterprise and manufacturing to name a few. To exhibit their features and functionalities, Videonetics will be implementing their end-to-end video management system and AI enabled video analytics in conjunction with Qualcomm Technologies enabled smart cameras...
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of Infrared Cameras Inc. (ICI) to its network. Infrared Cameras Inc. is an innovator in the infrared products space with a line of thermal cameras as well as multi-spectral infrared cameras and complete package systems. “The COVID-19 pandemic forced an unprecedented acceleration in demand for thermal monitoring devices,” said Bill Bozeman, Chief Executive Offi...
Badger Technologies®, a product division of Jabil, introduces the Badger PatrolBot™ autonomous robot tailored for the security guard industry. The PatrolBot autonomous robot extends security workforce operations by automatically verifying that windows and doors are secured, fire extinguishers and defibrillators are properly stored, and floors are free of debris and potential hazards. The robot also can investigate alarms and areas not supported by surveillance cameras. The Badger PatrolBot autonomous robot empowers security guard management companies and their customers to prioritise personnel deployment while automating manual security checks. Reducing operational costs This is especially relevant now that security guard companies are being called upon to support COVID-19 security requirements, including enforcing social distancing, taking temperatures and performing worker welfare checks. “The PatrolBot autonomous robot is a workforce multiplier, continuously patrolling stores, warehouses and office buildings for 12 hours on a single charge,” said Tim Rowland, CEO of Badger Technologies. “Our robots automate the most mundane inspections and share real-time data, enabling guard services companies to expand their service offerings, extend shift coverage and reduce operational costs.” Workforce management platforms Our strategic partnership will help customers’ realise greater business value from their security investments" As part of a total security solution, Badger Technologies is working with established providers of workforce management platforms to ensure seamless integration with security operations. The first partner in this growing ecosystem is Montreal-based TrackTik Software Inc., an innovator in cloud-based security workforce management focused on maximising operational efficiencies. The companies are developing Application Programming Interfaces (APIs), enabling the PatrolBot autonomous robot to use TrackTik’s cloud-based software to streamline security guard tour scheduling, real-time checkpoint logging, incident reporting, GPS tracking, messaging and alerts. “TrackTik Software is thrilled to partner with Badger Technologies in using robotics to transform security guard operations,” said Simon Ferragne, CEO of TrackTik Software. “Our strategic partnership will help customers’ realise greater business value from their security investments and allow them to take on more non-traditional security roles in a post-pandemic world.” Streaming video cameras Equipped with streaming video cameras, the PatrolBot autonomous robot lets command-centre staff view the robot’s exact location as well as access a live video feed. In addition, fixed-position cameras are programmed to take pictures of doors, windows, fire extinguishers and any blockages during the robot’s patrol tour. If needed, a robot can automatically modify its routes to avoid obstacles while performing inspection duties safely around people. Actionable data and analytics offer vital insights for improving service delivery while lowering costs Actionable data and analytics offer vital insights for improving service delivery while lowering costs. Badger Technologies also is working to accelerate integration of its Software Development Kit (SDK) with other security workforce management software as well as customer-specific security solutions. Floor-scanning robot As the latest Badger Technologies’ offering, the PatrolBot autonomous robot leverages AI and Machine Learning to produce actionable business insights to elevate security guard Service Level Agreements (SLAs) while meeting growing compliance demands. This newest robot joins Badger Technologies’ retail robots, which have travelled more than 500,000 miles safely alongside employees and shoppers at more than 500 grocery stores throughout the U.S. and Australia. The PatrolBot autonomous robot extends the capabilities of this existing line-up, which includes Badger® Retail inSight, a shelf-scanning robot that addresses out-of-stock, planogram compliance and price integrity issues; and Badger® Retail inSpect, a floor-scanning robot that automates hazard detections, such as spilled liquids and other debris.
Matrix Comsec has confirmed its participation in the Virtual Exhibition on Railway Equipment from 1st July 2020 to 31st August 2020. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and a new portfolio of IP Communication endpoints. Matrix has indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Each of the solutions is specifically designed for large, multi-location enterprises, SME and SMB organisations. Security and Telecom Matrix continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Security and Telecom solutions at the Virtual event. At VERE 2020, Matrix COMSEC is going to show the newly launched Matrix COSEC COGNIFACE INTEGRA200, a touchless time-attendance terminal with face recognition. This solution can also be deployed for visitor management, cafeteria management, contract workers management and job processing and costing. Matrix COSEC COGNIFACE INTEGRA200 combines all elements used for face recognition into a single package for ease of transportation, installation, mounting and application at the customer end. Network Video Recorder and IP Cameras Apart from this, Matrix COMSEC are going to showcase Network Video Recorder for high-resolution recording and live view of multiple streams. The company will also showcase IP Cameras that deliver exceptional low light performance and are specifically built for demanding enterprise and project applications. Matrix caters various industries with a range of IP security Cameras (also known as network cameras) powered by Sony STARVIS sensor with Exmor technology for better Video Surveillance. Matrix will also be showing IP based Unified Communication Server as well which is a combination of hardware, SPARK200 and software PRASAR UCS. With IP-at-core, PRASAR forms the basis of a Voice over IP solution for modern day business enterprise that adapts to existing infrastructure set-up with ease. It is a unique single box office UC solution for small-medium & large enterprise, with the same hardware for workforce strength varying from a small unit with 100 users to large enterprise up to 2100 users. It connects internal and external decision-makers at multiple locations for effective communication and real-time collaboration.
Cyber security is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cyber security. Explosion-proof rated cameras Customers are currently overwhelmed by the perpetual advertisement of products related to cyber security. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cyber security. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. For software, similar requirements exist but there is less clarity than with their counterparts The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist: in general, it is possible to universally define safety requirements for installation in special environments, such as a drilling rig, a marine vessel or along a railway. For software, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Video management software Furthermore, a device's firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever-changing conditions. Other aspects of security, such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements, such as gases or dusts, and deducting the product requirements. Video surveillance equipment During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. Several certification options are currently available on the market, and these can be placed in two main groups The result of the lack of certainty that characterises software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap, by pursuing certifications and stamps or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Cyber security certification Several certification options are currently available on the market, and these can be placed in two main groups: System certification Product certification As the name suggests, system certification addresses cyber security at a system level. This group includes ISO27001, NIST SP 800-53° ISA/IEC62443-3 for example. In these frameworks, risks related to information management are evaluated across every aspect of the organisation: information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Video surveillance system Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organisation willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/IEC 15408, also known as Common Criteria. It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Cyber secure surveillance Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products: developing safe products for all possible tasks - mechanical, electrical, electromagnetic and software - according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. New security feature Software architecture must be flexible enough to guarantee integration into very different products Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalogue. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. Accomplish video acquisition For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Secure video surveillance Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while the company proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by the company's customers or identification of an issue, it also updates the testing tools to increase the reliability of the company's products. Videotec has yet to definitively choose a certification scheme for the DeLux technology Videotec believes that its products, and the continual updating of these, actively contribute to maintaining the safe operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, they call this cyber-sustainability. System-level security requirements At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as the company search for a solution that will create value for the company’s customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent the company from having a clear and active development path for the cyber security in their products. At Videotec, the following five principles are the basis for implementing cybersecurity in products: Hardened software architecture to minimise the attack surface of the cameras Constant updates and availability of new features, even on old products Removal of predefined credentials in the products, to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements Contribution to the ONVIF Security Service specification, to push the industry shifting from usernames and password to X.509 certificates Clear communication to customers, by avoiding fake marketing claims Security service specifications Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Videotec is proposing extensions to the ONVIF Security Service specifications Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF Security Service specifications that will include the widespread the adoption of X.509 certificates to replace the usage of credentials. Video surveillance market Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical of environmental safety. IP-based device In the last ten years, the video surveillance industry has vigorously shifted from analogue to IP products These instructions are meant to teach customers and stimulate their attention to aspects related to cyber security. As such, instructions will never be turned into unreliable market claims, such as claims for conformance to the GPDR or any other rule. Cyber threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analogue to IP products and, at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Risk assessment analytics Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase - maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimise expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected.
Videotec is strongly focused on the Indian market and the needs of their customers. For this reason, Videotec is pleased to announce that they have obtained the BIS and the CcoE/PESO certificates for the most requested products in the Indian video surveillance market. The BIS certificate, issued by the Bureau of Indian Standards (BIS), is mandatory for certain IT products which are imported in India and provides a guarantee of quality, safety and reliability to the customers. Potentially explosive atmospheres The BIS certificate is now available for the following cameras of range: MPXHD21VW0Z00B, MPXHD2FVW0Z00A, MMX2D0ZA, UCHD21TAZ00B, UCHD21UAZ00B, UCHD21WAZ00B, UCHD2FWAZ00A. The CcoE/PESO certificate, issued by the Petroleum and Explosives Safety Organisation (PESO), is also mandatory for all electrical components installed in potentially explosive atmospheres within the Indian country. The CCOE/PESO certificate is now available for the following Videotec range of explosion-proof PTZ cameras: MAXIMUS MPX - MAXIMUS MPXHD - MAXIMUS MPXT.
Camden is showing how SureWave™ touchless switches provides the market with exclusive models, features, and quality with the release of six new product videos. Touchless switch line Presented by David Price, Camden’s VP of Communications and Glenn Woodworth, Camden’s Product Specialist, this video series provides an introduction to Camden’s touchless switch line, highlights the new 6” round stainless steel faceplate option, as well as each of the SureWave™ models. SureWave™ touchless switch videos include episodes on CM-330 battery powered wireless model, CM-331 line powered one relay model, CM-332 line powered two relay model, and CM-333 Hybrid battery powered model with one relay.
Videotec has always been committed to researching and developing optimum solutions for outdoor surveillance and protection of critical infrastructures and other complex environments. The company proposes a new integrated solution that responds to issues relating to the monitoring of poorly illuminated large perimeter areas, as it is in the airport external zones. The combined system consists of the ULISSE2 IP PTZ with the SONY SNC-VB770 ultra-high sensitivity IP camera with Full Frame 35mm CMOS sensor and SELP28135G motorised zoom lens. ONVIF profile-S protocol The camera and lens can be easily installed in the PTZ thanks to the adaptor that has been specially designed by Videotec (UPTBKITVB770). The implementation of the communication protocol between ULISSE2 and SNC-VB770 allows the easy remote control of all the functions of the camera and lens via the ONVIF Profile-S protocol. The resulting integrated system provides exceptionally detailed 4K/30fps colour video, even at night The resulting integrated system provides exceptionally detailed 4K/30fps colour video, even at night or in extreme lighting environments (less than 0.004 lux). The operator can get highly detailed colour images of specific areas, as well as an overview of the whole environment being monitored, even with a poor lighting source when it is a challenge for the human eye to see the object. PTS solution for monitoring perimeters The images, full of useful information, are sharp and perfectly in focus thanks to the high-speed electronic shutter that means the operator can clearly distinguish letters, numbers and facial expressions in almost pitch-black conditions. The thermoregulation and forced-air demisting functions mean the camera is always running at optimum temperature and that no condensation forms. Bringing together Videotec’s robust ULISSE2 PTZ and Sony’s ultra low-light colour camera is quick and simple and represents the most powerful and high-performing 4K/30fps PTS solution for monitoring perimeters and large outdoor areas on the market. Some high-profile critical infrastructures have already implemented this solution.
Technology has played a vital role in how businesses have enabled their employees to work productively from home during the COVID-19 pandemic. For those of us who can do our jobs from home you only have to look at the ‘Zoom Boom’ to see how much our working lives have changed compared to the beginning of the year. Despite the fact that those companies that can are now productively and efficiently operating remotely, the country is now facing the next challenge in this crisis: how to safely reopen workplaces for those who can’t. There is no argument that the economy hasn’t taken a hit during this unpredictable time. Shops, restaurants and entertainment facilities have been forced to close, and 23% of the country’s workforce (6.3 million people) has been furloughed. It’s no surprise that the Bank of England has warned that the UK is heading towards its sharpest recession on record. To counter this economic risk, the government is taking steps to slowly and cautiously reopen the economy by easing lockdown measures, sending people back to work and allowing businesses to reopen. With non-essential retail outlets now able to open from the 15th June, the question business owners face is how to operate safely and maintain social distancing practices, which are set to remain in place until such time as a vaccine is widely available. With lockdown easing and a ‘new normal’ on the horizon, the health of the country’s workforce mustn’t be forgotten in a bid to save the economy. This is why technology that can allow for a controlled return to work, while mitigating any risks to the health of consumers and employees, must play a part in the easing of lockdown. Temperature screening in the new normal Elevated temperature screening is one technology that should play a key part in return to work strategies and the safe reopening of businesses. This valuable solution uses a thermal and optical camera to analyse body temperature, which is a key indicator of the presence of a potential illness, and discreetly alerts the operator when the set temperature threshold is exceeded by someone screened by the tool. With temperature screening technology in place, the exposure of potentially infected individuals to others can be dramatically decreased and the risk of a localised outbreak minimised. Furthermore, for businesses such as retailers whose success is dependent on customers feeling safe to visit the premises, it has the added benefit of giving them additional assurances that visible measures for their protection are in place. In combination with other solutions, such as vigorous testing and screens to protect employees and customers, returning to work can be safe and controlled. With temperature screening technology in place, the exposure of potentially infected individuals to others can be dramatically decreased The reality of a ‘new normal’ may already be visible in some industries, such as grocery retail where one-way systems, plastic screens and constant cleaning are already in place. However, elevated temperature screening has countless applications for both essential and non-essential industries, ranging from offices and train stations, to hospitals and pharmacies. This screening technology allows businesses to take preventative steps to minimise the chances of the wider workforce and customers coming into contact with someone exhibiting symptoms of a potential illness. A number of businesses are already deploying this technology, such as Vodafone, which has deployed heat detection cameras at key UK sites to protect its employees. The camera used by the telco can screen up to eight people at once and 100 people per minute, while judging body temperature in less than half a second – all of which makes it ideal for congested and high traffic areas. Not all solutions are created equal Over the past few months, we have been inundated with images and videos of temperature screening taking place within key industries, which have continued to operate through the pandemic. However, the hand-held thermometers commonly being used require the device to be within an extremely short range of the subject and are only able to screen one person at a time. This is why remote elevated temperature screening solutions are so valuable – especially given that social distancing guidelines are unlikely to be relaxed in the near future. Stand-off solutions can enable temperature screening to take place without the need for close human interaction, further safeguarding employees and reducing the risk of contact with potentially infected individuals. Elevated temperature screening has countless applications for both essential and non-essential industries, ranging from offices and train stations, to hospitals and pharmacies Along with remote capabilities, there are a number of other crucial factors to take into account. The solution must be quick and easy to implement, as well as being highly accurate. When paired with a blackbody, the accuracy of temperature screening solutions can be within 0.3°C. Connectivity is also key and adopting an end-to-end solution linked to a centralised command and control location is invaluable. With holistic connectivity, these solutions can encompass cameras installed in multiple locations, and alarms can be viewed locally, remotely or on a smartphone app. This means that staff don’t need to provide direct supervision to the device on-site. With the guidelines regarding which industries and sectors can reopen changing on an almost daily basis, it’s important that these protective solutions can be installed without overhauling the surveillance infrastructure already in place. Looking ahead, adopting a solution with an upgrade path to other enhancements, such a facial recognition, is favourable as they can be used in conjunction with future and existing security measures. Shop local Stand-off solutions can enable temperature screening to take place without the need for close human interaction Businesses have plenty on their minds as they prepare for the uncertainty that is sure to continue throughout the rest of the year and beyond. However, due diligence can’t be left to the wayside when looking to adopt an elevated temperature screening solution. There are high-risk vendors present in the market, many of which have been blacklisted in the US, and they must be given a wide berth. Buying British-made technology can alleviate these security concerns, as well as avoiding any logistical issues caused by the breakdown of global supply chains. As the economy cautiously reopens, the country will have to adapt to a ‘new normal’ over the coming months. Elevated temperature screening solutions should be implemented by businesses to protect the health of the workforce and customers alike – ultimately paving the way to a safe and controlled return to work.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalisation. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analysing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralised authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognising people on watchlist and not recognising those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognises faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimise incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimise false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximise productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
Security managers, installers and integrators look into a wide variety of factors when selecting a remote video monitoring receiving centre to provide continued real-time surveillance of their sites. But there’s one factor which isn’t often taken into consideration, when it really should be. That’s the welfare of the CCTV operators who are tasked with responding to alarms and ensuring on-site incidents are dealt with appropriately. The fact is, in most UK monitoring centres those operators are working extremely long hours: typically 12-hour shifts, often four days in a row. The cumulative effect of that regular extreme shift pattern can be a level of fatigue which is detrimental to the performance of the operators, as well as to their own physical health and mental wellbeing. The result is a reduction in effectiveness of client video security systems. If the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffers. The central aspects of concentration and alertness I’ve worked in monitoring centres for most of my adult life, starting just out of school. When I had the opportunity to begin my own CCTV and security alarm most In UK monitoring centres, those operators are working extremely long hours: typically 12-hour shifts, often four days in a rowmonitoring centre with my business partner Andy Saile, we were clear that operator welfare was a priority. After all, the operator’s job is literally to be alert and responsive, so why would we want to do anything to detract from that? That’s certainly not the case at all remote monitoring centres, though. The vast majority follow the 12-hour shift template, usually in four days on, four off patterns. Anyone who has done any job knows that at the end of a 12-hour shift, fatigue kicks in, and the ability to focus diminishes. That’s particularly the case in roles where concentration and alertness are central to the job. For a CCTV operator in a monitoring centre, fatigue starts to affect the ability to work effectively during the stretch between 9 and 12 hours. That’s the danger period. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working. The operator is the link between the technology and the police. They are a key component of the whole system. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working Government guidance After working in remote video monitoring centres and experiencing what we considered both good and bad practice, when Andy and I established our business, we were clear that our operators would work in shifts that were no longer than nine hours at most. This delivers the best results for our customers and our staff. Our feeling was backed up by UK government guidance on designing CCTV control rooms. The Centre for the Protection of National Infrastructure has produced a detailed publication called 'Human factors in CCTV control rooms: A best practice guide'. This publication says: “12-hour shifts, although common in many settings, rIf the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffersepresent a greater risk to health and performance than 8 hour shifts in terms of higher perceptions of workload, fatigue and stress, risk of more errors and accidents, and higher health risks.” Negative impacts on health and wellbeing It further says: “Research confirms that the interruption of circadian rhythms (the 24 hour natural bodily cycle) by shift work can have a negative impact on both general wellbeing and physical health (short and long term), as well as on performance due to general fatigue (i.e. an increased likelihood of errors). Shift-patterns are often designed to meet commercial and operational requirements, but serious consideration should be given to minimising negative effects on health and well-being by the use of appropriate shift patterns.” The majority of our shifts cover seven or eight hours, and our operators never work more than four in a row. That allows for an average of three or four days between each batch of shifts. The idea is to avoid running staff into the ground, and that in turn makes our company more efficient and effective in the service of our clients. We’ve seen the results in practice: our operators only took four sick days in the past year. That’s four sick days in total, not per operator. It’s a CCTV operators have intense jobs, responsible for monitoring and responding to CCTV and intruder alarm events from commercial and domestic propertiesremarkably low figure in the remote video monitoring industry. Full readiness CCTV operators have intense jobs, responsible for monitoring and responding to CCTV and intruder alarm events from commercial and domestic properties. They liaise with the police, the customer keyholder, end users and any relevant authorities as required. Our customers are equipped with both cameras and motion sensors, which generate alarms on movement. When a movement in a specified zone occurs, the alarm is raised directly with the operator responsible for that site. The response differs from customer to customer depending on their own protocols. If there are dome cameras in place, for instance, they can be utilised to provide additional situational awareness. Escalating risks Traditional intruder alarm monitoring centres required the operator to react to an alarm by calling a keyholder, who would then respond to the incident. But remote monitoring requires concentration, focus, and deductive skills. The information required to make an informed decision isn’t immediately obvious – the The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiringoperator must work out what has moved and establish its cause. There’s no one to provide extra detail. The operator’s art is in working out for themselves what is relevant information in a scene and what isn’t. That requires their full attention. When operators work four days of 12-hour shifts in a row, risks escalate as a result. The risk that the wrong decision can be made. The risk that customers or police are not notified when they should be. There is a real-world cost associated with those decisions. The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiring, whether there’s an incident to respond to or whether the operator is simply prepared to act. Operator skills are diluted if their shift patterns are not considered. Why would you hire someone based on their skillset, and then work them into the ground until they’re too tired to execute those skills? Choosing a monitoring centre Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretation. A CCTV operator is an Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretationinvestigator and a conduit, bridging the divide between images, alarms and authorities, be they police, security guarding operations or keyholders. To run them into the ground is to diminish their ability to make intelligent decisions. It makes sense, then, to opt to work with a monitoring centre which puts the welfare of its operators at the forefront of its business. Start by asking your prospective RVRC about their shift patterns. A monitoring centre with respected and happy staff is a monitoring centre best able to provide a fully effective service, optimising your security systems and maximising your investment.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favour are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
Perusahaan Gas Negara (PGN) is a company in Indonesia for the transportation and distribution of natural gas. The total length of distribution pipelines of this company is 3,187 km, serving around 84 million customers. As the owner and operator of four transmission pipelines, PGN is responsible for guaranteeing security along the entire chain of conservation and distribution of gas and for delivering products and services in accordance with the needs of consumers. Securing gas supply lines During the transport phase, the gas is pushed through the pipelines at very high pressure. When it reaches the end-users, however, its delivery pressure must be adjusted so that it falls within an acceptable range (as detailed in the contractual delivery specifications). This is to prevent consumers from being exposed to the full transport pressure reached within the pipeline. A metre and regulator station is used to regulate the Natural Gas outlet pressure, and reduce it to an acceptable value. To this end, PGN has developed a meter and regulator station (the Master Control Station) that works via remote control, directed from the control room. This project plays an active role in the PGN's commitment to achieving Operational Excellence in process management, with the focus on optimising safety, improving efficiency and on maximising reliability throughout the gas supply chain operations. PTZ cameras and remote monitoring To guarantee reliability and security of the control function, it is necessary to monitor the process using specialised CCTV equipment for hazardous zones. 10 PTZ units from the MPXHD series have been chosen for the realisation of this surveillance system, because of their reliability in providing perfect video footage and their compliance with the security standards for operation in hazardous areas. The PTZ units are used to directly monitor the metreing and regulating operations remotely from the master control room.
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enrol and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Lombardy is one of the regions most affected by the COVID-19 epidemic. Due to the emergency, hospitals remain overcapacity, surgeries postponed, and staff continue to work fatigued because of what they’ve had to sustain over the past few months. In addition to this already critical situation, the Milanese capital suffers from a major blood scarcity. Decrease in blood donation collection In recent months, the Ministry of Health has intervened several times with recommendations to prevent possible interruption or decrease in blood donation collections within the region. This was targeted to improve processes at the donation centre in order to aide in the management of blood components and raise awareness of transfusion needs. Many donations made were due to the appeals launched by AVIS Milano. Due to the responses of citizens, even non-periodic donors, who went to the Lambrate headquarters in recent weeks was of generous help. Donors' security The donation candidate with a potentially higher temperature is then escorted to another location To ensure donors’ security and to avoid crowding in the waiting rooms, regulating access and managing the flow became extremely important. AVIS Milano has immediately taken necessary measures. Thanks to MOBOTIX’s donation and the completely free installation by Bergamo-based company, Ideologica, the association is now able to provide a high level of protection before a potential donor is accepted. A MOBOTIX Thermal TR imaging camera has been installed in the room where donors are processed and wait for access to donor acceptance protocols. Radiometric thermal sensor The camera, which is equipped with a radiometric thermal sensor, is able to detect variations in temperature of those present in the access room. It was integrated into AVIS Milano’s existing system by Ideologica in just one afternoon, and was programmed to detect any temperature rise above 37.5 degrees Celsius (as required by law to allow the donation), with an accuracy level of 0.3 degree. We were able to identify the person potentially at risk of COVID-19 through the temperature symptom" If a donation candidate displays any change from this value, an immediate auditory alarm is triggered. The donation candidate with a potentially higher temperature is then escorted to another location and informed of the reasons for their donation refusal and is encouraged to visit his or her attending physician for further investigation. Medical staff immediately receives a report In respect of privacy, the system has not been set up to be viewed remotely with a video image on any external PC. The medical staff immediately receives a report that a person with a temperature above 37.5 degrees centigrade has appeared in the entrance hall. "Thanks to the contribution of MOBOTIX technology, we were able to identify the person potentially at risk of COVID-19 through the temperature symptom from the moment of entry, avoid contact with other donors present and advise the individual on an immediate follow-up with their doctor," commented Sergio Casartelli, General Manager of AVIS Milan. Facilitate solutions with MOBOTIX Technology "Technology should always be seen as positive improvement in any application regardless of how it is used, either to facilitate or to provide a final solution. We as MOBOTIX are committed to promoting and providing through our solutions and our partners as many benefits and opportunities as possible.” “We are extremely proud and humbled that we could collaborate with AVIS and that our technology could support the work AVIS has done to ensure availability of blood in Milan.” “This is one of the most important actions any organisation could have taken to provide support at this critical time," concluded Phillip Antoniou, Vice President Sales Europe South / West & MEAPAC.
When Broome County, in the US State of New York, took the decision to upgrade its public safety radio network, it required the highest quality video surveillance system to safeguard its US$ 23 million investment in critical infrastructure. New radio network Working with Integrated Systems, a solution combining networked Axis cameras, illuminators and radar motion detectors, with Qognify’s Ocularis video management system (VMS) was installed, to deter, detect and respond to unauthorised activity, at each of its nine new radio towers. The new radio network replaces a system that was in place since the 1970’s and improves communications for police, fire, along with other emergency services and public works departments for the municipalities across the county. 24/7 security monitoring Each of the radio tower sites required a combination of networked PTZ and fixed cameras" Such mission critical infrastructure requires reliable round-the-clock security monitoring, so Integrated Systems was approached, for its reputation in the delivery of technology solutions to government and industry, to specify and install a new video surveillance system. President of Integrated Systems, Mark Hamilton, explains, “Each of the radio tower sites required a combination of networked PTZ and fixed cameras, as well as radar motion detection to provide comprehensive coverage that would ensure any unauthorised activity would be swiftly detected, automatically recorded and alerts triggered, to initiate a timely and appropriate response.” Axis camera and radar detection technology Axis camera and radar detection technology was chosen for interior and exterior use at each radio tower site and the award-winning Ocularis to provide the all-important integration. Hamilton adds, “Early in our engagement with Broome County we urged them to migrate from their disparate video surveillance architecture, whereby VMS, NVR and DVR systems were all being managed individually across the county.” He further said, “Our recommended solution was a single unified, IP-based system that was county-wide sanctioned. To achieve this, we specified the Ocularis VMS from Qognify.” Ocularis video management system Ocluaris is a VMS that is ideal for large-scale projects such as Broome County, with an emphasis on tactical real-time operations and live visualisation, it is supported by full system redundancy and 24/7 availability. Integrated Systems were impressed by Ocluaris’s rich feature set, intuitive user interface (including visually mapping of the entire camera estate) and impressive scalability. What’s more with Axis as a Qognify Technology Partner it instilled the confidence Broome County needed to switch to a more unified approach to video surveillance. PTZ and fixed cameras installed All surveillance camera footage is recorded and centrally archived at the County Data Centre Using Ocularis, authorised personnel at the Central Security Building and Emergency Management Services Centre have 24/7, 365-days access to live and archived footage from every camera at each of the nine sites. The PTZ cameras installed give a 360-degree view of each radio tower site, whilst fixed cameras monitor the tower yards main gates and shelter doors. Meanwhile, the radar motion detection system guards the perimeter. All surveillance camera footage is recorded and centrally archived at the County Data Centre via the county’s microwave data network. “If any suspicious activity is detected an operator can rapidly view, review and replay all relevant footage through Ocularis,” explains Hamilton. Use of video analytics and visual maps To aid the speed of response, the operator also benefits from the use of visual maps to rapidly determine what cameras are available across each site, as well as video analytics to minimise time required to trawl through footage to identify activities of interest. Broome County has been impressed with the Axis and Qognify solution, which has also been integrated with its existing county-wide video network that includes street cameras, buildings and mobile video command systems. The success of the project has been recognised with a prestigious Security Solutions Award. Hamilton concludes by saying, “Qognify’s Ocularis is now the lead VMS that Integrated Systems specifies whenever embarking on a new video surveillance project.”
Teleste Corporation and a renowned international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deliveries will take place in 2019–2021, continuing the cooperation between Teleste and Stadler that was started in 2009. The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems as well as TFT and LED information displays. The flexible and future-proof system works seamlessly together with the existing PIS systems, delivered during earlier stages of the cooperation, and includes upgrades such as enhanced cyber security. Rolling stock manufacturers We have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information" “Today, transport operators and rolling stock manufacturers need to stay at the cutting edge of on-board technologies to deliver an excellent travel experience for the growing number of public transport users who wish to be informed about their travel at every step of the journey." "We are pleased that we have been able to fulfil Stadler’s requirements for high-quality delivery of passenger information on their trains to Norway, and we are looking forward to continuing our cooperation,” stated Jörn Grasse, Vice President of Rail Information Solutions at Teleste. Effective transport system Teleste’s on-board passenger information system is based on modular software architecture, which makes it possible to use the system technology for different kinds of applications. The system provides a flexible option for the delivery of passenger information for rolling stock manufacturers and operators who wish to build and run an effective transport system that can carry large volumes of passengers smoothly and safely every day. Customers can visit the company’s website for more information about the solution and its benefits.
Rajant and Dejero’s Technology Springs into Action in the Battle Against a 420-Acre Wildfire on the Santa Barbara County Coast. A wind-driven brush fire triggered evacuations after breaking out along the Gaviota Coast in Santa Barbara County, California. On a sunny afternoon in mid-October 2019, the heat from the sun combined with winds gusting up to 40 mph through the quiet foothills of El Capitán Canyon, sparking a wind-whipped, vegetation brush fire in the overly dry desert hills. The blaze, dubbed the ‘Real Fire,’ quickly charred 420 acres while threatening more than 100 structures that sat along the Gaviota Coast before firefighters and emergency crews were aware of the fire and able to gain an upper hand on the wild blaze. Wind-driven bush fire Coincidentally, Rajant and Dejero had just arrived in Santa Barbara for a demonstration with the Santa Barbara County Fire Department. Shortly after the fire broke out, word reached the emergency services and crews from the Santa Barbara County Fire Department, Cal Fire, the U.S. Forest Service, and other agencies who immediately dispatched their teams to contain the blaze before it spread further. The climate in the canyon at the time of the blaze was considered ‘critical fire weather’ with its dangerously dry grass and wind gusts. These conditions only encouraged the wind-driven bush fire to spread swiftly through the foothills on the north side of Highway 101 near El Capitán State Beach, California and east over the ridge. A good stretch of the 101 Freeway had to be shut down immediately—in both directions—and Amtrak routes through the area were cancelled. Total communications solution At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops Visitors at nearby ranches, campgrounds, beaches, and resorts were evacuated, and a warning was given to residents living in the nearby Dos Pueblos, Refugio, and Winchester Canyons. At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops, while dozens of engines, along with bulldozers and hand-crews, fought it from the ground. At about that same time the fire broke out, teams from Rajant and Dejero, along with subject matter expert Bruce Arvizu from the Department Homeland Security, had arrived in Santa Barbara. Together, they were prepared to deliver a live safety demo to the Santa Barbara County fire chief on how the companies can together provide the total communications solution. Improved spectrum efficiency The planned public safety demo was also to show how the blending of Rajant’s technology with Dejero Smart Blending Technology (SBT) eliminates drops and gaps—a solution comprised of mesh radio communications, blended cellular, and satellite technologies to bridge the communication gap in remote locations where signals are often weak or lost. While LTE networks provide high bandwidth, lower latency, and improved spectrum efficiency, LTE can also become spotty and drop signals in remote locations and other areas. Dejero’s Smart Blending Technology (SBT) fills in these gaps in the Wide Area Network by seamlessly blending any available LTE with SAT comms to guarantee a connection for the responding teams. Signal continuity becomes even more challenging in valleys, around mountains, and along coastlines, which becomes mission critical when emergency services are responding. Continuous and reliable connection More than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters Rajant’s mesh radio technology bridges the gaps in these local areas. When the three technologies are used together, a continuous and reliable connection is provided, ensuring that communications between the responding agencies and their teams in the field are not lost. Meanwhile at the El Capitán canyon, more than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters and drones in the air and 30-ton bulldozers on the ground cutting out ‘catlines’ and uprooting vegetation, thus eliminating the fire’s fuel. By plowing through the flames, brush, and trees with the dozers, the emergency crews saved valuable manpower and shortened the fire’s reach and life. When fighting fires with bulldozers, it is critical for the commander in control to receive data from each dozer to manage fighting the fire collectively as a team and to track each dozer individually. Critical local data Rajant and Dejero quickly proposed to the fire chief the benefits of their combined technology at a time of crisis and asked to allow Rajant and Dejero to modify their presentation from a demo to a real life exercise. “Our county firefighters are willing to do whatever it takes to get that job done. When we do our after-action review, the successes and failures always come out. And we like to capitalise on our successes.” said Daniel Bertucelli, County Fire Captain Santa Barbara County Fire Department. Rajant BreadCrumbs® can be mounted to the bulldozers so the critical local data could be transmitted while other situational data and mapping could be revived in the field. Dejero SBT would power the Microsoft Tactical Truck and provide the bridge from the field to the command post over cellular and SAT networks, during this actual emergency situation. Combined firefighting attacks More than 400 acres had burned with no structures damaged and no reported injuries Notably, the SAT comms on the vehicle was to be powered by Kymeta’s flat-panel dish technology, enabling true ‘comms on the move’ to best leverage Rajant’s Kinetic Mesh®. The updated mission was green lighted. On Friday morning, Rajant and Dejero meet with the fire squad at the command control centre. Rajant BreadCrumbs and camera systems were mounted to dozers while the Microsoft mobile comms truck, with the Dejero GateWay on-board, maintained a close, but safe, proximity to the dozers to provide LTE. The firefighters manning the bulldozers were able to communicate in the valley when normally they could not. Data was sent from the bulldozers to the van to the internet where the command control centre could receive the video feed. The real-life demo was a success. The combined firefighting attacks on the blaze gained the upper hand and went from a 20-percent containment on Thursday evening to 50-percent by Friday afternoon. By Monday, the Real Fire was 100% contained. More than 400 acres had burned with no structures damaged and no reported injuries. Evacuations were lifted for all areas.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasising systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
Security cameras: Manufacturers & Suppliers
- Dahua Technology Security cameras
- Hikvision Security cameras
- Hanwha Techwin Security cameras
- LILIN Security cameras
- Visionhitech Security cameras
- Bosch Security cameras
- Arecont Vision Security cameras
- Pelco Security cameras
- Vicon Security cameras
- Messoa Security cameras
- eneo Security cameras
- Sony Security cameras
- Panasonic Security cameras
- FLIR Systems Security cameras
- VIVOTEK Security cameras
- Bolide Security cameras
- TruVision Security cameras
- Vanderbilt Security cameras
- Dedicated Micros Security cameras
- Honeywell Security Security cameras
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload