Trackforce, the security workforce management platform, announces the appointment of Christophe Kloussing as Vice President of Sales for North America. Kloussing brings 20 years of experience in senior positions in the U. S. and Europe to his new leadership of all Trackforce North America sales initiatives. He intends to identify and develop new business opportunities, implement fresh strategies for customer retention and growth, and uphold the company’s current position as market leader....
PPSS Group launched SlashPRO Cut Resistant Neck Guards in order to help further improve the personal safety of homeland security professionals worldwide. The latest addition to this widely respected brand of slash resistant clothing certainly makes sense, understanding that the side of the neck and throat contains both the Carotid Artery and Jugular Vein. If either is cut by an attacker one will most likely suffer from rapid blood loss, subsequent shock and most likely death. Demand from homel...
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a r...
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highligh...
ASIS International, the association of security management professionals, released the ASIS Private Security Officer Selection and Training (PSO) Guideline (ASIS PSO-2019) which provides recommendations for establishing and managing a program for the selection and training of private security officers. The new Guideline is critical as the private security industry employs millions of security officers across the nation to protect people, property, information, and other key assets. Applic...
UK based PPSS Group has recently seen record sales for their SlashPRO Slash Resistant Clothing brand, offering tested, certified and reliable levels of cut resistance. Poverty and social exclusion, religious and political extremism, drugs, social media as well as serious mental illnesses have all been blamed for the global rise of knife crime. SlashPRO Slash Resistant Clothing is made from 100% Cut-Tex PRO, a highly acclaimed, cut resistant fabric made in Great Britain The news of individuals...
It’s the first quarter of a New Year and businesses are already busy reviewing budgets for ways to save money. One line item that can impact business the most – loss. Employee theft alone is a crime that costs U.S. businesses $50 billion annually*, according to Statistic Brain. So if you aren’t sure who is keeping watch over your property and assets, and how they reduce preventable loss, it might be time for a security audit. According to GuardOne, the security patrol and remote video monitoring company, more than 400,000 businesses in the United States experience theft, robbery, vandalism, and criminal acts each year. The company advises that all businesses should consider the reality that thefts and other crimes can happen on their premises. They note that having the right systems in place can prevent these occurrences. Protecting employees, guests and property We are experts at using video monitoring in conjunction with security guards to maximise coverage while minimising security costs"“Some types of businesses – such as banks, convenience stores, and high-end retailers – are a natural target for theft. But if you have the right security partner, your employees, guests, and property will be protected,” said Robert Copeland, President and CEO of GuardOne. “We are experts at using video monitoring in conjunction with security guards to maximise coverage while minimising security costs.” It may be time to reassess your security needs “if” your company is: Experiencing retail shrinkage, equipment, or inventory loss. The National Retail Federation reported that retailers lost nearly $44 billion from theft in 2014, with 34 percent of these crimes committed by employees. Theft accounts for tremendous profit losses for retailers. A trained guard or surveillance camera will help reduce your losses, increase your profits, create a deterrent for would-be thieves, and help catch criminals in the act. Having issues with squatters, damage or vandalism. If your office, warehouses, parking lots or distribution centres are unattended at night, the risks of vandalism, squatters, and damage rises. Businesses – including car dealerships, warehouses, retail locations, and empty campuses – benefit from security monitoring that deters these crime risks. Experiencing issues with your parking lot, garage or business perimeter. Employees and customers may feel uncomfortable walking to their cars at night, particularly if the parking lot is not well lit or heavily trafficked. Unattended parking lots can attract vandalism, theft, muggings and other crimes to people. A patrolling security guard can reduce these risks, serve as a crime deterrent and ensure the safety of people and property. Located in a high crime location. “High crime” doesn’t necessarily mean a bad neighbourhood. It could include a location in a sparsely-populated area that attracts loiterers and vandals. Risk may be reduced through high tech surveillance. Keeping incomplete safety records. Company employees are often tasked with day-to-day record keeping regarding safety, personnel and property, and may not be trained for this task. F or example, if a door is repeatedly left open, a security guard will notice (and record) that pattern. Then, he or she will investigate causes like whether the door’s lock is faulty or if an employee is leaving the door open to sneak back in later. Because the guard works for the security company and not the business, he or she can provide objective third-party records (and testimony) for events like employee termination, liability issues, and workplace injuries. Experiencing heavy traffic. Businesses that have high-volume traffic will benefit from on-site security guards to manage security and liability concerns, check guests’ IDs, log people in and out, handle crowd control, search guests for contraband, and respond to incidents and alarms. Unprepared for emergencies. Security guards are equipped to manage a wide range of emergencies, medical emergencies, natural disasters, terroristic threats and more. They are trained to act quickly, responsibly and sensibly regardless of the circumstance. Experiencing the threat of a lawsuit. Has your company been targeted for frivolous lawsuits or false claims? You may encounter physical fights between employees or customers, harassment claims, or employees ‘faking’ an injury to spark a lawsuit against your business. Security guards and surveillance cameras can protect you from all of these unfortunate scenarios (and more). Assessed by employees as an environment where they don’t feel completely safe. Protect your employees and your property with a high-quality safety system. The right security company will safeguard your assets, protect your employees, and improve your day-to-day business operations by fixing observable problems and delegitimising false claims. Unreachable during off hours. If you have unreliable security detail that doesn’t always show up for work, won’t answer a call or text or you can’t ever reach loss prevention management, it’s time for a change. Security should be the one thing you don’t have to worry about. If it’s reliable, it just happens. Preventing crime and keeping people safe “Securing your business helps your staff and customers feel more comfortable, knowing that you’re taking concrete steps to prevent crime and keep them safe. Many companies have found that investing in on-site security was one of the best choices they ever made,” says Copeland.
STANLEY Security, a UK security provider, is delighted to have contributed to Formula Services winning Truck Stop of the Year, following the installation of a CCTV system. Located in Ellesmere Port, Formula Services Premier Truck Stop offers customers top class facilities, including a free fitness room along with superb lounge/relaxation areas with free massage chairs, Sky sports and Xbox usage, to shower, laundry and catering facilities and even the use of free bicycles to get out and about. 36 cameras CCTV system and ANPR A key part of its success has been its onsite security as Gerry Graham, General Manager of Formula Services, states: “Security is vital to our business and our clients/customers, who all carry materials/items of value. On our new website we heavily promote our site security (36 Cameras, Manned Security Guards, ANPR) as this is what customers require and, I personally believe, insurance companies also want this level of security. I believe that along with our superb facilities, the security measures that we have in place most definitely contributed towards our winning of the Truck Stop of the Year award and our accreditation with TAPA (LEVEL 3 PSR). I believe we will also start to see additional benefits as we enter 2019.” STANLEY Security designed and installed a 36 camera CCTV system with six monitors STANLEY Security designed and installed a 36 camera CCTV system with six monitors. A mostly external system to protect the site from unwanted visitors, static cameras were used for perimeter detection and Pan Tilt and Zoom cameras deployed in key locations. STANLEY Security – Dahua collaboration A key challenge involved utilising the existing onsite cabling, which meant thinking outside of the box. A solution was found by STANLEY, involving Dahua extenders to boost the signal to the furthest points then powering the cameras via switches at the bases of the camera towers. This enabled the cable to be used without compromising the quality of the CCTV system. Gerry based his decision to award this contract to STANLEY Security on his previous experiences when looking at site security. “I also looked at the site’s history with two to three previous security installers and basically went with what I believed to be the best option for Formula; this included back up support/maintenance etc.” Site security Formula Services is clearly pleased with the results as Gerry comments: “Having spoken with the security staff who operate the equipment they believe the clarity of the pictures, along with the easy to use controls, are the main benefits. Our site customers are also impressed with the system/cameras.” Advanced CCTV system STANLEY Assure removes the need to justify and raise significant capital outlay in a depreciating asset The new CCTV system was financed under STANLEY Assure, a finance solution for customers wishing to benefit from up-to-date security technology without the risks of ownership and with evenly spread, manageable payment terms with no hidden extra costs. STANLEY Assure removes the need to justify and raise significant capital outlay in a depreciating asset. Instead, STANLEY will buy back and take over an existing security system, upgrade it to incorporate the latest security technology, and then hire it back for usage. It provides customer such as Formula Services with an affordable means of upgrading a complete security system as Gerry comments: “Having the costs spread over the length of the deal was deemed the best option for the business at that time. We were also spending money upgrading other site facilities at this time so again this made total sense”. Formula Services is also benefitting from a STANLEY Security maintenance contract for the CCTV system for maximum effectiveness and peace of mind.
Securitas UK has been officially recognised as a Top Employer by the Top Employers Institute for its commitment to delivering exceptional people management and HR strategies. Top Employers are organisations of the highest calibre that have worked hard to create, implement and progress people strategies, through innovative and engaging programmes, which empower and develop their employees. In order to be certified as Top Employer, Securitas had to achieve the minimum standard as set out by the Top Employers Institute across ten key topics: Talent Strategy, Workforce Planning, Talent Acquisition, On-boarding, Learning & Development, Performance Management, Leadership Development, Career & Succession Management, Compensation & Benefits and Culture. Security and protective services expert Securitas UK is the only security and protective services company to be accredited by the Top Employer Institute Securitas UK is the only security and protective services company to be accredited by the Top Employer Institute. Brian Riis Nielsen, Country President, Securitas UK spoke about what it means to be a Top Employer: “Securitas is leading the transformation of the security industry from traditional guarding to a much broader spectrum of protective services delivered by better trained and engaged teams. Although technology is an increasingly important part of our operation, our on-site, mobile and remote security officers remain the backbone of our business." He added, "Our people, and how we look after them, lay at the heart of this transformation. Our talented, professional officers excel at keeping our clients’ people, property and assets safe. In return we have made a commitment to provide the very best employee experience, offering a rewarding career pathway which will help shape the next generation of security professionals.” Securitas employee excellence model We will continue to invest in our Securitas employee excellence model and offer our people the very best, industry leading, employee experience"Grainne Kelly, HR and Security Operations Centre Director explained, “We are delighted to be officially recognised as a Top Employer. From our online, end-end recruitment and selection processes, to our in-house City & Guilds accredited Learning and Development Academy, and our focus on talent and career succession planning, we are proud of the collaborative and innovative working practices we are delivering for the benefit of all our employees. "We will continue to invest in, and refine, our Securitas employee excellence model and offer our people the very best, industry leading, employee experience. Our Top Employer certification proves that we are well on our way to achieving this.” David Plink, CEO, Top Employer commented, “We believe that the 2019 Certified organisations demonstrate exceptional employee conditions and encourage the development of these practices by putting their people first. These companies help enrich the world of work with their outstanding dedication to HR excellence and because of this, they are recognised as an employer of choice.”
Kinesis vehicle telematics is giving Lincolnshire Security complete visibility of its mobile operation. The recently implemented tracking system gives the Boston-based company round the clock monitoring of mobile staff for resource planning, incident response, customer reporting and health and safety responsibilities. Manned guarding and mobile security Lincolnshire Security services include alarm response and key holding, mobile patrols, static guards and special event security Offering a wide range of guarding and mobile security, Lincolnshire Security services include alarm response and key holding, mobile patrols, static guards and special event security. Integration with fuel cards from UK Fuels, Kinesis also gives Lincolnshire Security additional intelligence including driver performance data and financial transactions with a single platform for all their fleet-related data. Other benefits of Kinesis include live traffic alerts and congestion reports, improved security and asset management and better financial management. Vehicle and asset tracking “We have used vehicle tracking now for some time now,” commented Lee Revell, Account Manager at Lincolnshire Security Ltd. “So, when the time came to review the in-situ system we looked around for alternatives. Kinesis was cost efficient, functionally rich and integrated with our existing fuel cards.” Kinesis is easy to use with live location reports, updated every 30 seconds, displayed against an easy to interpret map screen" “Kinesis is easy to use with live location reports, updated every 30 seconds, displayed against an easy to interpret map screen. It’s also easy to access – available on any Internet connected device,” continued Revell. “The peace of mind provided by Kinesis coupled with the additional evidence-based reporting is critical for staff safety and customer reporting and will help us control costs as we continue to grow the business.” Kinesis integrated fuel cards Kinesis integrated fuel cards will help Lincolnshire Security reduce paperwork associated with credit card or expenses claims and improve the management of fuel consumption with accurate MPG calculations potentially assisting in decreasing costs and environmental emissions. Kinesis can also deliver driver performance data, including speeding, harsh braking and accelerating and idling, which can be used to monitor and improve driver behaviour for additional health and safety monitoring and cost control.
A combination of uncertainty over Brexit negotiations and recent cut backs in other areas of police funding has highlighted an opportunity for the private security industry to support public services. “Brexit is putting an incredible strain on resources of all types across the UK, including the police force, who are preparing contingencies for a host of challenges ahead of March 29. When combined with the selling off of police assets and the reduction in officers on the street, it makes life very difficult when it comes to the prevention of criminal activity,” comments Abbey Petkar, managing director of Magenta Security. “I have incredible respect for the police. They are doing a tough job under difficult circumstances and deserve our support.” Partnership with the police to prevent crime The security industry is incredibly diverse and already working across a host of services to prevent crime"Abbey believes that via current contracts and private initiatives, security companies across the UK can deliver for clients whilst partnering the police to highlight and, where possible, stop criminal activity. “The security industry is incredibly diverse and already working across a host of services to prevent crime. We already support public services by filling gaps and spotting vulnerabilities that opportunists could exploit. A partnership-based relationship with the police will do nothing but improve this,” continues Abbey. “For those of us carrying the proper certification, there is even the opportunity to directly support public services, supplementing their workforce where needed.” Ultimately, Abbey believes there is a significant opportunity for the private sector to support public services and give back to the wider community. This is even truer as the SIA works to professionalise and improve the quality of output from across the sector. Public safety should, in Abbey’s opinion, be the responsibility of all, not just the few hardworking police officers.
SeeTec, provider of video management software solutions in Europe, launches the second release of its products in 2018. The recent version R13 of the video management software SeeTec Cayuga comes with a new interface to unleash the software’s full potential in integrated security ecosystems, generating significant added value for corporate and enterprise customers. SeeTec BVI, the customisable video solution to support business processes, undergoes a paradigm shift towards real-time operations. One of the key benefits of SeeTec Cayuga has always been its flexibility to hook up to security ecosystems via interfaces and integrations. With its latest release R13, SeeTec now unveils an innovative tool, which makes it even easier to create comprehensive environments consisting of multiple systems and applications communicating with each other. The extension of the SeeTec Analysis Interface supports the integration of any edge or server-based license plate recognition solutionThe SeeTec Event Interface (SEI) breaks new ground to connect the SeeTec Cayuga video management software to third-party security products using a flexible, driver-based approach. All events from third-party applications such as access control, burglar alarm and many more can now be visualised within the VMS, for example by displaying them in maps and floor plans or opening the relevant camera streams. Implementation of integrated security systems This gives system operators a much better overview, reducing the reaction time in case of critical incidents significantly. Andreas Conrad, Marketing Director at SeeTec, explains a further benefit of the new interface: “As the SEI is a well-documented and open interface, technology and solution partners are now able to easily develop plugins by themselves to connect SeeTec Cayuga with their product portfolios. “This facilitates the implementation of integrated security systems, providing added value especially for corporate and enterprise customers. Furthermore, it underlines the solution-based approach of SeeTec.” Another essential move into this direction is the extension of the SeeTec Analysis Interface, which now also supports the integration of any edge or server-based license plate recognition solution on the market. Improved video backup, failover and performance An improved notification system provides full transparency about the status of scheduled and ongoing backupsAmongst the usability features implemented in R13, the video backup functionality within SeeTec Cayuga received a major revamp. It allows the automatic backup of video recordings based on time schedules or – which is new – on event triggers. If a backup operation is interrupted (e.g. when using Wi-Fi connections to offload data from mobile units such as trains or trams), it can be resumed automatically. An improved notification system provides full transparency about the status of scheduled and ongoing backups. In addition, many smaller improvements and functionalities are part of the release, providing added value and improved usability. Especially in critical infrastructure projects, continuous recording even in case of a server breakdown is crucial. To keep recording gaps at an absolute minimum, SeeTec Cayuga R13 now supports mirrored recording, which means that the video streams coming from the cameras can be recorded simultaneously on two servers. Furthermore, the playback of archive footage has been optimised, now allowing a more precise timeline navigation as well as seamless and smooth reverse playback. Last but not least, the average CPU load on server side could be reduced by up to 50% through optimisations in communication between internal components. Live monitoring of scans and transactions Security guard can now at once monitor multiple cash desks and mark suspicious activities directly within SeeTec BVISeeTec BVI, the second SeeTec software product that will be published as R13, also sees various improvements. With especially the logistics and retail industry in mind, SeeTec BVI is shifting its paradigm, because the software can – for the very first time – be used for the live monitoring of scans, transactions or other events. For the application in retail that means, e.g., that a security guard can now at once monitor multiple cash desks and mark suspicious activities directly within SeeTec BVI, whereas for a logistics scenario this new functionality can be used for the surveillance of the picking process of an order. In addition, SeeTec BVI provides numerous further improvements, e.g. a more precise timeline handling in the video archive, which give users palpable advantages in everyday use. Customers with a valid Software Maintenance Agreement (SMA) can already download and install the update to SeeTec Cayuga R13, whereas SeeTec BVI R13 will become available in late January 2019. For both applications, the installation can be done either manually or if updated from an installed base via the built-in Auto Updater.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
The basic principles of access control are well established: only authorised people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organisation? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimise the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings. Scarce resources on preventative measures The dearth of knowledge on the subject leaves schools at risk of spending scarce resources on measures that don’t have any real impact, or worse, that have a negative effect on education environments. The natural impulse following a school shooting is to do something – anything – to prevent the tragedy from happening again at any school, but especially at my school. But how is money best spent?Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything Congress has passed the Stop School Violence Act of 2018 to provide $50 million per year to develop programs to train students, teachers and law enforcement to prevent violence, and to create anonymous reporting systems, such as hot lines, for school violence threats. The bill authorises another $25 million for improvements to school’s physical security infrastructures. Congress also provides $1.1 billion in Title IV block grants, which districts can use to pay for diverse needs such as security systems. Several states are providing additional funding for physical safety measures and campus police, and local districts are also stretching their budgets to address security concerns. But is that money being targeted to measures that will help the situation? What is the role of technology in preventing school violence, and are we as an industry at risk of over-selling our preventative capabilities and diverting money from other measures that might have more impact? Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything. More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process Studies on school safety and protection Researchers, advocates and educators gathered this fall at American University to consider the need for better research to inform decision-making on safety, reported Education Week.The field is in desperate need of more evidence on what works, and schools want this information presented to them" A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand. “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.” Jeremy Finn, a professor of education at the University of Buffalo, has pointed out the difficulty of assessing the effectiveness of measures designed to deter events that likely won’t occur anyway. “How do you know when you have deterred a school shooting?” he asks. “It didn’t happen.” The effects on our students Might technologies aimed at making schools more secure have an adverse effect on the learning environment? More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process. The physical security industry should freely acknowledge that the technologies we offer are only part of the solution to school violence Do security measures aimed at preventing active shooting incidents absorb resources that might better be used to address a more general and/or likely security threat such as vandalism or student discipline? Theoretically, security measures in general should help to prevent the probability of an active shooter at the same time they are addressing a wider range of concerns and threats. But do they? At the very least, we in the physical security market should be aware, and should freely acknowledge, that the technologies we offer are only part of the solution to school violence. Schools should take the broadest possible approach to the range of security challenges, and technology should be one tool among many. Furthermore, better data to measure what works is sorely needed to illuminate the best path forward.
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual devices and controls In effect, a security guard wearing a HoloLens headset can approach a door in his facility and see the real-time status of that door, provided by an access control system, projected as a hologram alongside his live view of the door. It’s the first implementation of a technology with many possibilities. Related to video surveillance, real-time facial recognition could provide the identity of a person walking past a security officer in a hallway, for example. Basically, the approach extends the interfaces and capabilities available in a control room to a security officer on patrol. The officer can place and interact with a variety of virtual devices and controls as holograms in the 3-D space he or she views through the headset. Augmented Reality for Integrated Electronic Security The security industry technology has been developed by CodeLynx, a software engineering and systems integration company headquartered in North Charleston, S.C. As a systems integrator, CodeLynx specialises in audio-visual and physical security design and installation for A/V, access control and video surveillance systems. A complementary business is software engineering; Darren Cumbie, Director of the Software Engineering Division, and his team provide custom integrations of various technologies. The approach extends the interfaces and capabilities available in a control room toa security officer on patrol CodeLynx has developed software to adapt Microsoft’s HoloLens product for use in the physical security field. They are bringing it to market as ARIES (Augmented Reality for Integrated Electronic Security). The software operates using Microsoft’s HoloLens, introduced in 2016, a powerful, self-contained holographic computer worn as a headset. Specialised components enable holographic computing in lockstep with advanced sensors, including five cameras. Users can move freely throughout an environment and interact with holograms that augment the reality they view through the HoloLens. Cumbie says HoloLens provides the best mixed reality headset currently available: “Nothing else has the power, usability and scalability across an organisation.” AMAG Symmetry access control integration In ARIES, CodeLynx has created a certified integration with AMAG’s Symmetry access control system to enable operators to view information from Symmetry as holograms in their field of view through the HoloLens. The integration extends the functioning of Symmetry to operators in the field, thus expanding the control room environment. Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry. Approaching a door, an operator can request a list of the last five people who came through the door, for example; he or she can see a photo ID related to each person who swipes through a turnstile. CodeLynx is looking to expand the market for ARIES using integrations with other OEMs in addition to AMAG. “Instead of being chained to their desk looking at monitors or a display wall, operators can work in the field using the full functionality of their systems as they walk throughout the property,” says Drew Weston, CodeLynx Director of Sales and Marketing. “Meanwhile, I am not sitting at a desk, I am out in public.” Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry At some point, the headsets will likely get lighter and more ergonomically appealing. Right now, all the computing power is inside the headset (which, even so, only weighs only 1.3 lbs). In the future, more of that computing will likely be “offloaded” to a nearby desktop or laptop computer, or even to the cloud, and wirelessly “tethered” to the headset. In addition to making the headsets lighter and more ergonomically appealing, tethering would bring down costs from the current $5,000 per headset (possibly into the “three digit” range). CodeLynx is poised to leverage any Microsoft enhancements to the HoloLens environment. Currently the software is priced at $1,500 per user. Benefits for systems integrators For systems integrators, ARIES could be used to simplify installations, given its ability to view camera frames through the headset hands-free rather than needing to view a separate laptop when focusing or positioning a camera. For maintenance or troubleshooting, an operations center could access the field user’s view and direct him or her to correct a problem. In this way it would be a training tool to help integrators, which is a separate value proposition from how the devices may be deployed by end users. The ARIES approach could also eventually change how we think of a control room. Instead of video screens and walls, operators might sit in comfortable chairs in rooms with white walls, viewing all the control room “screens” through their headsets as holograms. Less power consumption would be among the benefits. ARIES plans to offer a “virtual operations centre” in 2018, enabling command centre operation from anywhere, user-customisable layout views and the ability to push content to specific HoloLens users. This video demonstrates how interaction with holograms can drive security functions: https://www.youtube.com/watch?v=B82oAlxt5_s
I have been unpacking from last week’s ASIS show in Orlando. It was a good show, except if you compare it to last spring’s ISC West in Las Vegas, which was especially well attended and generated a lot of excitement in the market. ASIS was definitely smaller, lower key and less crowded. And there were no big product announcements. But there was still plenty of technology on display. In particular, I saw the show reflecting several ongoing trends in the market. Impact of M&As Mergers and acquisitions have been big news in the security market for the last year or two, and there was evidence at ASIS of how M&As are changing the market. For example, Axis Communications, now owned by Japanese giant Canon, is taking over the marketing of Canon’s small (by comparison) selection of video surveillance equipment. Thus ends (quietly) one of the big questions in the market: Why would a company like Canon want to compete against itself? Even more reflective of the changing Canon/Axis world is a new 20-megapixel camera highlighted at ASIS. It was developed through cooperation by the two companies, with Canon providing the lenses and Axis providing the rest of the camera, including image processing. It’s being positioned as an opportunity to combine the best capabilities of both companies. Mergers and acquisitions have been big news in the security market for the last year or two, and there was evidence at ASIS M&As changing the market Vanderbilt is expanding its cloud and video management offerings – in addition to access control – with acquisition of Access Control Technology (ACT) in Dublin. A company built on acquisitions, Vanderbilt will be looking to unify their product offerings in coming months – combining technologies from various acquisitions into a unified whole. It’s been a big year for FLIR, which has swallowed up DVTEL and now offers a complete range of video surveillance products. Reaching way beyond FLIR’s historic presence as a thermal imaging company, the new FLIR is looking to educate the market about its versatility. Meeting end user demands End users demand more integrated systems, and you heard it repeatedly at ASIS. For example, Tyco Security Products says their products are now more connected, reflecting further deterioration of the silos that used to exist. More effective user interfaces are getting attention. One I saw at ASIS was by Honeywell’s Connected Buildings business. A big screen at their booth showed a map with multiple locations in an enterprise; clicking on a location brings up a schematic showing where cameras are located. If you click on a camera icon, you see video from that camera. They also previewed a smart phone app that runs off the same database, which can be used by guards working in the field. Bosch also has a neat integration of their access control, intrusion and video systems, all tied together using their intrusion system to provide intuitive controls. Ameristar, an ASSA ABLOY subsidiary, offers Perimeter InSite software, providing a virtual view of any perimeter security construction project as it is planned and built – stage by stage – with no surprises. Mobile credentialing, wireless locks A leader in mobile credentialing, HID Global is emphasising how the technologies are being implemented in the market – more customer references and case studies are paving the way for broader adoption. Other companies are also onboard with mobile credentialing, including Brivo and Lenel. A leader in mobile credentialing, HID Global is emphasising how the technologies are being implemented in the market Wireless is continuing to evolve. Stanley Security offers the WiQ wireless product line, emphasising that installation of wireless locks is half the cost of wired, but there are downsides (such as slight access delays) compared to wired. Allegion continues to expand its Engage wireless portfolio, too. Paxton Access, a British company, has restructured and is investing in the U.S. market. Their Paxton BLU cloud-based access control system uses Amazon web services and is an opportunity for dealer/integrators to earn more recurring monthly revenue (RMR) Security in the headlines Violence in the headlines often screams out for security solutions, and there were some at ASIS. Stanley highlighted its Shelter product that enables a wireless lockdown in an active shooter situation in the education environment. It solves a high-profile challenge, but Stanley emphasises that it’s just part of a broader school security programme – that’s what’s really needed. A different approach on the active shooter scenario is offered by risk assessment and consultancy company Control Risks, which offers active shooter education programmes for enterprises, including an e-learning module to teach employees how to react in an active shooter situation. New video capabilities Video grabbed attention at ASIS. As Hikvision and Dahua continue their energetic push into the U.S. markets, they were among the largest (and most crowded) booths. Several companies – including Bosch and Tyco -- are adding video analytics to their cameras at the factory. Vicon previewed its new Valerus VMS system, based on ONVIF protocols and totally compatible with their legacy ViconNet VMS. They see open systems as a strong selling point, but they will also continue selling hardware and “total systems". "Suspect search" can search video to deliver additional examples of video involving a subject that has been identified by a single frame “Suspect search” is a new feature showing up on video surveillance systems. The feature can search captured video from throughout a system to deliver additional examples of video involving a subject that has been identified by a single frame of video – find the girl in the blue dress, or the man wearing a red shirt. Searching a whole system, rather than a single camera feed, expands an operator’s ability to investigate an incident. Avigilon introduced its version, called “Appearance Search” at ASIS, and Qognify also highlighted its version, called “Suspect Search,” which I first saw at IFSEC. I notice Exacq also has a flavour of this, and I am sure there are others. Perimeter security evolving Perimeter security is changing. Long considered a “low-tech” wing of the security market, there is a lot going on in the area of perimeter security. Visiting a couple of booths at ASIS opened my eyes. For example, Senstar has every kind of sensor, and their Tungsten product is a security appliance that offers cyber-security at the edge of the network, tying together the sensors and other devices. Protech offers solar-powered wireless sensors that don’t require trenching, another money-saver (more to come about them).
Three leading Australian universities are introducing SafeZone technology from CriticalArc in a drive to improve safety, increase their security teams’ capabilities and provide better care for students and staff. With 30% of Australian universities now using SafeZone, this latest wave of roll-outs confirms CriticalArc’s position as the most comprehensive safety and security management solution provider in the Australian market. Adding to CriticalArc’s growing network of customers, the University of Tasmania (UTAS), the University of Southern Queensland (USQ) and the University of the Sunshine Coast (USC) have more than 75,000 students and staff working in 33 campuses and associated facilities across four States, meaning that SafeZone now serves the needs of 1.5 million students and staff at more than 500 locations across the world. Ensuring best safety standards SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable"“UTAS, USQ and USC each have their own unique character and particular priorities but ensuring the best standards of care for students and staff is top of the list for all of them,” says Robert Christie, CriticalArc’s Customer Success Manager, Asia Pacific. “Preventing crime, managing public safety and handling emergencies are still the top concerns of university security teams, yet SafeZone is also enabling those teams do much more to address issues that are increasingly important. "From improving support around mental well-being to tackling sexual harassment and making campuses inclusive environments where everyone can feel safe and welcome, security and response teams are playing a much bigger role than they traditionally did. SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable.” Notifications in the event of emergencies SafeZone puts individuals directly in touch with response teams at universities, hospitals, government departments and similar large organisations, making it easy for them to use their mobile phones to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they areThe technology also lets students and staff share their situation with response team members by checking-in when working alone outside hours or in higher-risk environments such as laboratories and workshops. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they are – including those working out-of-hours on campus, those travelling between campuses locally or on field projects, or travelling overseas for study or research placements. Precise location of vulnerable individuals With its global reach combined with its ability to precisely locate vulnerable individuals, SafeZone is helping universities around the world to better meet their duty of care obligations, says Darren Chalmers-Stevens, CriticalArc, Managing Director. “SafeZone offers all the functions that university teams want, in one easy package. It is not only helping them to deliver better care, it is letting them demonstrate this fact in an accountable way.”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorised access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling access areas within hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single access card system Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the centre of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-down system Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional licence feature. Streamlined parking processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilising another Gallagher licence feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
It took six years to remodel the interior of the ‘Palace of Culture’, a monument to socialism built in the 1960s under East German communist rule. Now Bosch is contributing intelligent solutions to make sure that visitors feel safe there, without detracting from its historic charm. It takes the right setting for culture to flourish. Various things are essential: an ambience in which visitors feel at ease, excellent acoustics, and flawless organisation. Now that the Palace of Culture has been completely renovated to ensure all of this, the city of Dresden boasts a new, modern venue for promoting the arts. Sophisticated security solutions The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800 A completely new, state-of-the-art auditorium is the heart of the building. It meets international standards with its striking architecture and top-notch acoustics, providing ideal conditions for the Dresden Philharmonic Orchestra and all kinds of other musicians to give concerts. There is also a new municipal library branch, emphasising the Palace of Culture’s new, open character. Spacious lobbies containing a restaurant and ticket sales link all of the facilities and rooms with one another. Many of the events held here in central Dresden are sold out. The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800. Crowds like these call for sophisticated security solutions that can be smoothly integrated into the overall design. Cleverly integrated components “We wanted a cost-effective overall solution that would do justice to the Palace of Culture and its unique architecture,” says Steffen Meyer, the building’s manager. “We published an invitation to bid for the project and of all the applications we received, Bosch convinced us that they were right for the job.” The building experts from Bosch implemented a customised solution for the Palace of Culture with a host of cleverly integrated components for fire protection, evacuation, access control, video surveillance and building management. The result is a harmonious overall system that meets the entire range of security needs. “As a public facility where people gather, we have to comply with very strict fire protection rules,” explains Meyer. Invisible smoke detectors “We also had to meet some special requirements.” Since the Palace of Culture has protected status as a historic landmark, the appearance of the walls, ceilings and floors may not be noticeably altered. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it Now virtually invisible smoke detectors preserve the ambience of the concert hall. Special calculations were even carried out to avoid impairing its acoustics. Advanced video technology automatically counts visitors to prevent the building’s capacity from being exceeded. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it. Building integration system In critical situations, special speakers powerful enough to be heard over the orchestra or even a rock concert are lowered from the ceiling to make sure that everyone hears important announcements. All of the individual components are networked via the Building Integration System from Bosch. It makes it easy for the well-trained security guards to monitor and control everything. And to ensure that everything functions reliably in the long term, experts from the Bosch centre in Dresden will regularly check and service the system. Meyer stresses that “we don’t want our culture fans to run any risks.”
Unlike private sectors, the government-run offices or buildings are the places where people constantly visit for specific purposes, making these official institutions easily become a target for tempted malicious attack by people who might possess strong and negative emotions toward the governments. Despite the fact that these buildings are often guarded with more security staff with arms, it is even more than necessary to set up a solid surveillance system to proactively safeguard the public and its assets. Surveon provides government solutions with product lines including weatherproof cameras with excellent image quality, patent RAID NVRs with spare drive protection, and feature-rich VMS with post VA search. These powerful solutions enable the governments to protect people from most of the threats. Weatherproof cameras with smart WDR Surveon cameras secure the outer spaces of government building with IK10 vandal proof and IP66-rated weatherproof housingTo build a reliable security system for governments, SIs might encounter some challenges such as harsh outdoor conditions and data protection of recorded video. Under these circumstances, Surveon cameras secure the outer spaces of government building like parking lot with IK10 vandal proof and IP66-rated weatherproof housing, giving partners the most reliable outdoor-use option. Moreover, all of Surveon cameras provide excellent image quality with smart WDR, allowing the security guards to recognise crucial details such as license plates even under lighting contrast and prevent any suspicious vehicle from entering. Patent RAID NVR with data protection To avoid the loss of confidential data from surveillance system, the data protection of recorded video is particularly important in terms of planning for government security. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video loss. Featuring patent RAID function with spare drive data protection, Surveon NVRs provide reliable performance with zero video lossBesides, its client-server architecture can offer high I/O, large capacities, and overall system stability. To quickly identify useful information and relative footage from hundreds of hours of video recording, Surveon designs Post VA Search, an efficient management tool, reducing the time and efforts of management staff, making the surveillance system more efficient. Enhancing security system Surveon government solutions have been successfully safeguarded the customs building in Bolivia, the post offices in Cairo, and the border checkpoint in Turkey. “Surveon provides the best C/P value solutions for the customs and improves its whole security system with high-reliability products. We are satisfied with the result and I’m sure we will keep choosing Surveon’s solutions in the future projects,” said VisionLine, Surveon’s major partner in Bolivia. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behaviour, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favour traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defence Centre, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilising wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's property security solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behaviour and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
Government regulations continue to step up security demands at federal agencies, requiring identity cards to support multiple identity assurance factors and be validated at entries into a building or location. Because of the cost and infrastructure that goes along with many security upgrades, federal agencies must wait months or, in many cases, years to implement changes. The Federal Aviation Administration—an operating mode of the U.S. Department of Transportation—is no different. The FAA is tasked with the colossal mission of regulating and overseeing all aspects of civil aviation in the United States. With offices around the world, including its headquarters in Washington, D.C., the FAA has a large number of employees and buildings to oversee. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials Need of tools for validating employee credentials As part of its security requirements, the FAA must validate Personal Identity Verification (PIV) cards at checkpoints within its facilities. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials. As recently as a year ago, FAA security personnel were conducting visual inspection of PIV cards at the gates into facilities that did not have PIV card readers. They had no way of telling if the card was authentic, revoked, or if the employee had access rights to a checkpoint at a particular time. At the FAA headquarters, which employs just under 6,000 permanent employees, and another FAA facility, the Minneapolis Air Route Traffic Control Center, which is the organisation’s 11th busiest airport traffic control tower, visual verification just wasn’t enough. Automating the verification process In order to comply with HSPD-12 and the Office of Management and Budget (OMB) Memorandum 11-11, the FAA needed a process beyond visual verification that allowed security personnel to quickly check the authenticity and revocation status of a card, as well as access rights to a particular area of the facility. With as many as 5,000 people coming into the FAA headquarters facility daily, the organisation’s primary goal was to automate the verification process. “The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” said Craig Auguston, HSPD-12 Program Manager at the Federal Aviation Administration. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.” Codebench’s OMNICheck Plus software OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000 The FAA began looking at products that could not only meet its requirements for mobile validation, but also integrate seamlessly with its P2000 security management database from Johnson Controls (JCI), according to Auguston. “This upgrade was important to meet the FAA’s requirement to validate PIV cards at all check points,” Auguston said. The FAA’s former process of visual verification was not allowing security guards to check the status of a PIV card, such as revocation status and specific access rights, both of which the organisation needed to meet its security goals. After testing a couple of mobile software validation programs, the organisation chose OMNICheck Plus software from Codebench, a HID Global Company. OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000, and it is listed on the GSA’s FIPS 201 Approved Products List as a CAK authentication system when running on an ARM-based mobile device such as the DAP CE3240B, which both FAA facilities use. Giving mobile access to the security guards “They really needed something that was going to allow their security guards to be mobile in certain parts of a facility,” said Botio Mandov of Johnson Controls. Johnson Controls, the integrator for the project, helped the FAA implement a larger security upgrade, which included the security management database and mobile validation software. Together, the FAA’s mobile DAP devices and OMNICheck Plus software enabled roaming security guards to use the mobile handheld devices in FAA parking garages and other entry points that needed to be secured, but do not have stationary PIV card readers. One of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers Checking access rights on mobile card readers In addition to mobility, one of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers—something only their organisation’s P2000 physical access control system could do previously. With an OMNICheck module called Data Import, certain cardholder information housed in the FAA’s P2000 database, such as access rights, was pushed down into the DAP mobile devices used by security personnel. “Access rights allow FAA security guards to make sure employees’ cards are not only valid, but that they are allowed to be in a certain area at a certain time,” Mandov said. In addition, FAA security administrators can run audit reports that show which cards were checked and when. The implementation took about five months, including testing the interface with the access control system and coming up with a training guide for the security guards, according to Auguston. The FAA is currently using 31 DAP CE3240B mobile readers with OMNICheck Plus. Saving money by eliminating physical parking passes Prior to the OMNICheck Plus installation, FAA security personnel had an unreliable way of authenticating PIV cards and access rights. Now, security personnel are able to verify digital certificates, revocation status and access rights, all while having an audit trail of the cards checked in the system. An additional, unexpected benefit for the FAA has been the cost savings of eliminating physical parking passes at its two facilities. “We are able to positively identify cardholders’ status when they try to enter the facility. We were able to save money by eliminating the physical parking pass by using OMNICheck to validate cardholder’s status for parking in FAA-controlled facilities,” Auguston explained.
Round table discussion
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
The new year presents new opportunities for the physical security marketplace. In many ways, 2018 will undoubtedly see further development of trends we saw in 2017. In fact, some of the trends determining the future of the physical security industry have been in place for many years. However, not every event in 2018 can be foreseen or easily predicted. To be sure, it is sometimes the surprises that keep life interesting! We asked this week Expert Panel Roundtable: What will be the security market’s biggest surprise in 2018?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?