OfficerReports.com is excited to announce the launch of OfficerBilling: The world's first security guard company billing calculator software. OfficerBilling is a simple automated solution for security guard companies that seek to configure accurate data-driven billing rates. Founded by software industry professionals, OfficerBilling partnered with security guard industry thought leader Courtney Sparkman to build a platform that addresses the true needs of security guard company sales profession...
For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown,...
Supermarket employees have been the hidden key workers of the past year, keeping shelves stocked and queues under control as panic buying gripped the nation. As a result of being expected to enforce face covering and social distancing regulations, they also been asked to act as de-facto security guards alongside their existing duties. This is problematic as many employees have never had to deal with this kind of responsibility before, let alone received any conflict de-escalation training. In o...
Alcatraz, the developer of secure frictionless access control products, has added Three Factor Authentication (3FA) to the Rock facial authentication platform to deliver the ultimate in protection for high security areas and zero trust environments. “Three Factor Authentication using a biometric like facial authentication in the Alcatraz Rock platform is really one of the most secure ways to control access,” said Alcatraz Chief Revenue Officer Tina D’Agostin. “At Alcatra...
High-tech, Scottish-based site security company Safer Scotland has significantly enhanced its senior team as it continues to expand into the wider UK with the appointment of three security sector professionals. The Paisley-headquartered enterprise has secured the services of Peter Simpson as Head of Sales, Julian Free as Systems Specialist, and Paul McKenna as Business Development Executive. All three have chosen to join Safer Scotland from competitors within the industry. Head of sales Peter...
The role of physical security has expanded and grown rapidly over recent years. Below are some of our observations, particularly throughout the pandemic, and a look towards the changing times ahead. The new era of physical security The role of private security has shifted dramatically over the last decade and beyond. Historically, the focus was on protecting assets such as property and goods, but more frequently now the sector is being asked to play an even bigger role in protecting the...
Wilson James has announced the acquisition of The Security Group (TSG) as part of a long-term strategy to provide clients with holistic solutions to their security and guarding needs. The acquisition will allow Wilson James to meet increasing demand from customers for information-led solutions they require to address security challenges across a range of sectors. Customers will now benefit from advanced security technology through a new Technology Services business unit at Wilson James. Around 200 TSG employees will be welcomed into the larger Wilson James family, an organisation that has a proven track record in supporting and investing in its people. TSG's client base is primarily centred in the South East of England, includes both public and private sector organisations, and fits well with Wilson James' existing customers. Guarding operations TSG’s existing guarding operations will be managed by Barry Dawson, Managing Director for Security at Wilson James, while technology will fall under James Bauer-Mein, the new Head of Technology. James will report to Gemma Quirke, recently appointed Chief Operating Officer at Wilson James. Gemma Quirke noted: “The acquisition of TSG will allow Wilson James to provide greater value to its clients, through a combination of consultancy, technology and skilled people. We look forward to welcoming TSG clients and employees to Wilson James.” Latest security technologies Said James Bauer-Mein: “The strategic plans for the new Wilson James Technology Services department align perfectly with ours. This acquisition will enable the latest security technologies and design that TSG specialise in, to be unified with Wilson James’ exemplary standing in the security industry.” Wilson James and TSG customers will see no interruption to the high levels of service they currently experience. Longer-term, both stand to gain as TSG is integrated into the Wilson James organisation, synergies are identified, and sources of greater customer value created.
Aiphone, the renowned international manufacturer of intercom and security communication products, has added the IXG-MK IP Video Guard Station to its robust portfolio of solutions in its IXG Series Multi-Tenant Video Intercom System. The IXG-MK provides visitors a convenient way to call a building’s concierge, receptionist, or security guard directly from the entrance station. This is helpful when visitors are unsure how to reach a tenant or if they are simply trying to deliver a package to the front desk. Once safe intent has been determined, calls can then be transferred to the proper apartment or suite, or the door unlocked for deliveries. Clear video identification “Perimeter security is more important than ever, due to the COVID-19 pandemic and increased interest in occupancy management,” said Paul Hefty, Technical Sales & Support Engineer, for Aiphone Corp. “This additional layer of security will ensure only approved visitors will be allowed inside, keeping tenants and building assets safer.” Those screening visitors can choose either hands-free (VOX) or full duplex (handset) communication The IXG-MK offers flexibility and simplicity to end-users with a seven-inch touchscreen for clear video identification, video communication between guard stations, call recording, and the ability to forward calls directly to a tenant. Those screening visitors can choose either hands-free (VOX) or full duplex (handset) communication. Touching the key button will activate the door release associated with the connected entrance station or door station. Network-based communication platform An ideal solution for any multi-tenant housing or office facility, the IXG-MK can have up to 9,999 units in its address book and will maintain a history of calls received. The IXG Series Multi-Tenant Video Intercom solution is a sophisticated, streamlined way to connect a variety of mixed-use buildings. This series is a complete network-based communication platform offering a variety of options for any multi-tenant security application. Throughout 2020, Aiphone will be celebrating its 50th Anniversary in North America by thanking customers, dealers, integrators, and employees for providing the opportunity to develop and improve better security and communication solutions.
Motorola Solutions, announced the newest addition to its video security and analytics portfolio, the Avigilon H5A Explosion-Protected camera line. The H5A Explosion-Protected cameras bring the functionality of Avigilon’s industry video analytics to the explosion-protected camera form factor suitable for hazardous environments such as oil and gas, mining and industrial sites. This includes enhanced object detection and tracking, along with support for Avigilon Appearance Search™ technology, an AI-powered search engine that can sort through hours of video to improve incident response times. Unusual Activity Detection The camera line also features new Unusual Activity Detection to provide site-wide intelligenceThe camera line also features new Unusual Activity Detection to provide site-wide intelligence with the ability to highlight abnormal activity such as the unusual location or the abnormal speed of a person’s movement. This edge-based intelligence distinguishes between typical and atypical events by continuously learning what constitutes normal activity for a scene over time. For example, if there is an individual running through a highly restricted area on an industrial site, a security guard will be notified in the Focus of Attention interface to locate where the person is and take measures to address the situation. Electronic equipment such as network cameras that are installed in hazardous environments may be at risk of igniting vapors, gases, dust or fibers in the air surrounding them. The H5A Explosion-Protected camera is certified for hazardous locations according to applicable international standards, making it an efficient video security solution for markets such as oil and gas, mining, industrial and food production sites. H5A Explosion-Protected camera “We are providing our customers with a durable, powerful solution that is built to address their specific security and business needs when overseeing sites that face the risk of an explosion” says John Kedzierski, senior vice president, Video Security & Analytics at Motorola Solutions. “Through the incorporation of AI-powered analytics in this camera, we are making it easier for our industrial customers to gain greater situational awareness while supporting the safety of their teams”. The H5A Explosion-Protected camera is offered in three models that include the 6MP Compact Bullet, 2MP Bullet and 2MP PTZ, and is now available for order across the globe.
Alcatraz, developer of secure touchless access control products, has released the Rock 3D facial authentication with new features including tailgating notification and mask detection (to help companies comply with increasing statewide mask mandates). In conjunction with the new product release, Alcatraz has unveiled a new website that offers the latest information on Alcatraz’s security solutions. “The latest features we’ve added to the Alcatraz Rock make it possible for businesses to replace badging as an access point identification method with facial authentication while at the same time elevate their overall security solution to address the ever-increasing demands of not only access control but compliance in the post-COVID era,” said Alcatraz Chief Executive Officer and Founder Vince Gaydarzhiev. Facemask detection With the latest version, Alcatraz has enhanced the Rock to combat one of the biggest problems in access control: tailgating. The Rock distinguishes an authorised user from an unauthorised user as they approach an access point or door together and can be set to immediately alert upon the attempt at unauthorised access. This expands the security that the Rock provides to ensure that only those who are authorised, and not tailgaters, gain access. The Rock detects whether a user who is seeking access is wearing a facemask Another feature – facemask detection – was added in response to increasing mandates in more than 32 states all over the country calling for businesses to require all occupants to wear masks. Mask requirements could present a safety issue for building operators as security systems that rely on security guards or video verification might currently require a bare face to authenticate entry. The Rock detects whether a user who is seeking access is wearing a facemask. If the individual is not wearing a facemask, the system sends a notification to put on a mask and does not allow access. Facemask detection is just one way in which the Rock is helping businesses adjust to post-COVID practices. The Rock also facilitates a touchless environment which reduces the spread of germs and viruses. Combating tailgating “By delivering options that combat tailgating and that use both one- and two-factor authentication, the Rock provides the most secure and accurate access control solution in the physical security industry,” said Gaydarzhiev. “And because the Rock operates on a robust platform, we are also able to quickly provide solutions to needs that arise in the market like facemask detection.” The Rock replaces badging by leveraging facial authentication, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock works with any access control solution and can be used alone, using one-factor authentication, for environments to deliver a completely frictionless face-only access control experience. The Rock is easy to deploy in businesses of any size because users self-enroll using their current access control badges Or, users can combine the Rock’s 3D facial authentication with badge use to deliver the ultimate in secure, two-factor authentication for environments that desire more security without the increased friction of other biometrics or the expense of added security guards or turnstiles. The Rock platform respects privacy and relies on facial authentication that is transactional in nature. The Rock is not used for surveillance and does not covertly or non-cooperatively collect or store images of individuals who have not enroled in the system. AI-based continuous learning The Rock is easy to deploy in businesses of any size because users self-enroll using their current access control badges. Via AI-based continuous learning and improvement, the Rock “learns” the user and typically fully enrols a user within just two or three encounters. After users are enroled, they no longer need to use a badge unless it is desired as part of a 2FA solution. Technologically speaking, the Rock is a powerhouse. The smart facial authentication platform delivers incredibly fast, edge-based serverless processing; is as easy to set up as a badge reader; uses existing Wiegand/OSDP wiring; uses PoE+ connectivity; and has on-premise and cloud options. The Rock has been successfully deployed in some of the Fortune 50 enterprise companies.
The recently-launch Axis body worn camera solution is now available in the Axis Camera Station video management software, allowing customers to integrate body worn cameras into their full video surveillance solution. Alongside the full portfolio of Axis cameras, the integration of body worn cameras adds value to surveillance solutions by making it possible to easily collect video and audio evidence from security guards and law enforcement officers, as well as traditional surveillance cameras. Capture, storage and analysis The system consists of a robust body worn camera with excellent image quality and dual microphones, a system controller for intermediate storage and management of recorded material and a docking station for quick data offloading and easy charging of cameras. The system controller is connected to the Axis Camera Station video management software server making it possible to easily view and analyse video recordings from the body worn cameras. Enhancing safety for officers and citizens Dock the camera and automatically the recordings and data are offloaded and the camera is charged A typical scenario for body-worn cameras would be patrolling guards collecting video and audio evidence in case of an incident, but the use of body worn cameras has also been proven to be very effective to deter incidents before they even take place. When the guards start their working day, they collect the fully charged personal body worn camera from the docking station. At the end of the shift, they simply dock it and automatically the recordings and data are offloaded and the camera is charged. Benefits of integration The Axis body worn solution is a great compliment in building evidence-based cases. When connected to Axis Camera Station video management software all body worn cameras will show up in the replay navigation with their specific usernames like any other IP cameras in the system. Playback can be synchronised with other cameras in the system, and all standard functions in Axis Camera Station are available to build the evidence case. The incident report includes both relevant recordings and comments, and if there is a need to pixelate objects and people this is also possible using video redaction. The case is easily exported in a compressed and password-protected file if to be shared with authorities.
Allied Universal®, a security and facility services company in North America, received a letter of appreciation from the U.S. Department of Justice’s United States Marshals Service. The letter of appreciation was regarding the apprehension of Gerald Hunter, who was #1 on the Most Wanted list of the Drug Enforcement Administration’s (DEA) St. Louis Strike Force’s West Central Region. Crucial security intelligence This is due to his suspected role in the illegal trafficking of Fentanyl. Allied Universal’s security team provided crucial intelligence to the U.S. Marshals which led to the successful capture of the fugitive. With information provided by Allied Universal, Gerald Hunter was recently apprehended by the U.S. Marshalls An arrest warrant had been issued for Gerald Hunter, charging him with “conspiracy to distribute and possession with intent to distribute Fentanyl” in 2017. Hunters evaded DEA agents for several years, being described by the DEA and his con-conspirators as a ‘ghost” who was proficient in separating his name from everything he touched, often being three levels removed. Provided U.S. Marshals with the tactical advantage In concert with information provided by Allied Universal, Gerald Hunter was recently apprehended by the U.S. Marshalls at an apartment building in Los Angeles, where Allied Universal is the security service provider. Allied Universal personnel provided the U.S. Marshals with the tactical advantage they needed, allowing them to execute their plan and successfully apprehend Hunter. “This team represents Allied Universal’s Be Phenomenal™ culture which strives for excellence and connects us closer the communities in which we serve,” said Steve Jones, Chairman & CEO of Allied Universal. “The team’s dedication and commitment to safeguarding our communities, as well as the people of our nation, is extremely honourable and courageous.”
In a multi-faith society, individuals should have the freedom to practice their faith in complete safety. It’s taken a long time for the right to freedom of belief in the UK to be enshrined in law – the Human Rights Act 1998 protects public worship – yet there are signs that religious intolerance is on the increase. Hate crime offences on the rise Home Office figures show that hate crime offences in England and Wales have been rising steadily over the past six years, with 7,446 religiously motivated incidents last year. Nearly half of those religious hate crimes recorded were Islamophobic, while crimes against the Jewish community more than doubled over a year. These faiths are not the only targets of increasing violence: an ‘epidemic of crime’ was reported last year with almost half of listed churches targeted by professional gangs. An ‘epidemic of crime’ was reported last year with almost half of listed churches targeted The situation has resulted in the government increasing their Places of Worship Protective Security Fund to £1.6 million – the largest since the scheme was set up. A ‘Ramadan package of support’ for mosques was also announced, along with extended police protection and a new £5 million fund devoted to security training for places of worship. Protection of synagogues, which aren’t covered by this fund, has been bolstered by a government grant increase via the Community Security Trust. Evolving threats Simply put, the right to freedom of religion is under attack, and many places of worship have become targets. Anticipating the evolving threats of a changing world is one of the prevailing priorities for the security industry. At times, certain events can prompt concern over a shift in risks; it was correctly predicted, for example, that hate crime would spike after the 2016 Brexit referendum. To truly get to grips with threats in the UK, however, we first need to understand the concerns of the people involved – and then start implementing strategies to protect them. Uncovering views across the nation With a view to understanding the key threats and security issues facing places of worship and how best to solve them, we commissioned original research that explored the opinions of the people with the most direct experience: congregations of religious institutions. 59% said their place of worship had been the target of an attack. We surveyed 2,000 people across the nation, seeking to uncover their views on safety at places of worship and their personal experience of religious hate crime. It was a far-reaching survey, with responses gathered from followers of Christianity, Islam, Hinduism, Sikhism, Judaism, Buddhism and other religions across all regions of the UK – a representative sample of the British population. The results were concerning. The scale of the problem was confirmed by the fact nearly two thirds of respondents (59%) said their place of worship had been the target of an attack. Just 13% said they felt ‘secure enough’ at their place of worship, pointing to the need to better understand the threats and consider viable security solutions. This is a conclusion strengthened by 90% of respondents backing different security measures to strengthen their feeling of safety. Restoring faith in security While our research exposes serious concerns over security at places of worship, there are other findings that should give us confidence in the well-being of their regular users. A quarter of respondents, for example, claimed to be unconcerned by threats at their place of worship – perhaps suggesting a natural feeling of comfort and protection that faith affords believers. 13% of respondents reported their place of worship was attacked on a daily basis From a closer look at the findings relating to personal experience of crimes, it’s clear that enhanced levels of security measures are required in our changing world; one of the most disheartening findings is that nearly 13% of respondents reported their place of worship was attacked on a daily basis. Along with ensuring places of worship have adequate funding in place, expert security guidance is also required to protect these buildings. While better security shouldn’t be needed for places of worship, having well designed physical fencing and access control can give worshippers peace of mind and deter those with nefarious intent.
The physical security industry is moving fast. Evolving risks, new technologies and business changes all converged and had a profound impact on the industry in 2019. Looking back at our top articles of the year – as measured by those that received the most “clicks” at our website – provides a decent summary of how the industry evolved this year. Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2019 that generated the most page views. They are listed in order here with a brief excerpt. 1. Schneider Electric to sell Pelco to private equity firm Schneider entered exclusive negotiations with Transom Capital Group, a U.S.-based private equity firm, to sell the Pelco business unit. Pelco is a security industry stalwart and global specialist in the design, development, and delivery of end-to-end video surveillance solutions and services including cameras, recording and management systems software. 2. High-tech drones, robots and counter-drone solutions on display From robots to drones to counter-drone solutions, a range of new technologies [was] displayed at ISC West 2019. The Unmanned Security Expo [included] a dedicated complimentary education theater for attendees offering sessions on a range of topics. Also included [were] demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. 3. Hikvision and Dahua banned from buying U.S. exports In effect, inclusion on the “entities” list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign of repression, mass arbitrary detention, and high-technology surveillance against minority groups. Hikvision and Dahua have contracts to sell equipment that provides video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China. 4. The many faces of today's facial recognition technology Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future. From street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. 5. Security industry trends to be led by focus on cyber security In 2019 With a more open, connected environment come cyber-risk and data privacy concerns – which is why, in the Security Industry Association’s 2019 Security Megatrends, cybersecurity’s impact on the physical security industry ranks number one on the list. Cybersecurity is affecting all areas of the industry landscape, from security implementation to attracting top talent to the workforce. 6. Open Supervised Data Protocol (OSDP): the gold standard for access control installations The Open Supervised Data Protocol (OSDP) is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging, de facto Wiegand wiring standard. OSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. 7. Honeywell embracing AI, reinvesting in video portfolio Although uses for artificial intelligence (AI) are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. 8. A secured entrance is the first defense against an active shooter What the majority of venues [of recent active shooter incidents] have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. 9. Debunking the myths of the security of access control systems One of the areas where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smart cards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. 10. At Chubb Fire and Security, ethics is a core concept with practical impact Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process.
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco acquired by private equity firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic spins of security business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy year for acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola continues video push with VaaS acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE acquires access control companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy expands capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter going private and selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com expands commercial offering with OpenEye acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimised for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT makes multiple acquisitions, sells Canadian operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specialises in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
The general public doesn’t give much thought to the important role of security officers in creating and promoting safer environments. The low-profile work of security officers is vital to protecting people, places and property. During the pandemic, newer aspects to that role have emerged. Security personnel have been called on to perform diverse tasks such as managing queues at the supermarket, safeguarding testing centres and hospitals, ensuring food deliveries, and supporting police patrols. The British Security Industry Association (BSIA) and two other organisations in the United Kingdom are joining forces to raise awareness of the work of security officers and to recognise the vital importance of the duties they perform. BSIA, a trade association, includes members who are responsible for 70% of privately provided UK security products and services, including security guarding, consultancy services, and distribution and installation of electronic and physical security equipment. BSIA, the Security Institute and the Security Commonwealth Joining BSIA in the awareness campaign are the Security Institute, a professional security membership body; and the Security Commonwealth, which is comprised of 40 organisations from across the security landscape with common objectives to build professionalism, raise standards and share best practices. “The recognition of security officers as key workers is the start of a re-appraisal of what service they provide to the community in keeping the public safe and secure,” says Mike Reddington, BSIA Chief Executive. “As we exit lockdown and have to navigate public spaces again, [security officers] will have a crucial role in supporting public confidence. We are working closely with the Police and all other public bodies to find the best way to achieve this.” Security officers acknowledged as key workers The campaign will showcase security professionals as a respected, valued, professional service provider and a key worker that is acknowledged and embedded in daily lives. The British Security Industry Association (BSIA) and two other organisations in the United Kingdom are joining forces to raise awareness of the work of security officers “Great effort has been invested in the professional standards and capabilities of frontline [security] officers, and they have proven their worth during the coronavirus crisis in the UK,” says Rick Mounfield, Chief Executive, the Security Institute. “They, along with the wider security sector, deserve to be recognized, respected and appreciated for the safety and security they provide across the United Kingdom.” “[We are working to] build professionalism, raise standards and share best practices, and I hope this campaign can make more people recognise the changes we have all made and continue to make,” says Guy Matthias, Chairman of the Security Commonwealth (SyCom). The industry will be reaching out to companies, professionals, and organisations in the sector to participate in the campaign. The hope is that, over the coming weeks as lockdown is eased, the industry can play its part to ensure that the country emerges with confidence to start to recover and build for the future. Private security more important than ever The campaign will showcase security professionals as a respected, valued, professional service provider Across the pond in the United States, law enforcement professionals are facing a crisis of confidence during a time of civil unrest as protestors call to “defund the police” and to otherwise undermine and/or recast law enforcement’s role in preserving the peace and ensuring public safety. If an upshot is that public policing is starved of resources, the role of private security to supplement their mission is likely to increase. In short, the role of private security is more important than ever on both sides of the Atlantic. Public recognition of that role is welcome, obviously. In any case, the importance of their role protecting people, places and property has never been greater.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimising physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specialising in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognise the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customised solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximise their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behaviour. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behaviour analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioural Analysis. Q: What are the elements of behaviour analysis? Torres: They include things like changes in appearance and behaviour, including social media behaviour, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training is critical regarding emergency situations in schoolsTraining should hold people responsible and set standards for acceptable behaviour. There should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioural change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioural indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviours or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organisation’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Security is the biggest concern for military facilities. Modern military facilities face a wide variety of risks, from cyber attacks to data theft to terrorist attacks. The Corpus Christi Naval Air Station in Corpus Christi, Texas for example, dealt with three separate attempted intrusions in a year and a half. In one incident, man driving a stolen SUV entered the base and attempted to exit through a separate entrance, but crashed his car and was then shot by security personnel. In another incident, just eight months later, the base went on lockdown again before an armed man was taken into custody. Then, in the third incident, seven months later, there was a third attempt to break into the base, this time by a man with known ties to terrorist groups. Protect sensitive facilities The man fired at the security guard at an entrance gate and struck her bulletproof vest before she raised the barrier to prevent the attacker from getting inside the base. The base’s security did a good job of preventing any serious damage during these attacks, but with the frequency of these incidents, more modern security may be needed to ensure that the next attack doesn’t end in catastrophe. Modern times call for modern security solutions, and Helios is the perfect option to protect sensitive facilities Modern times call for modern security solutions, and Helios by UVeye is the perfect option to protect sensitive facilities. Helios is safer, improves security, makes security officers’ jobs easier, works in extreme conditions, and can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. Improved safety for facilities It alerts the user on any irregularities or foreign objects hidden in the undercarriage. Inspecting the undercarriages of vehicles is very difficult for security personnel. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspect the undercarriage, they may not know what to look for. They may not recognise a threat and allow a vehicle with a weapon, bomb, or other illicit or dangerous item to enter the facility. Security officers put themselves at great risk by manually inspecting vehicles, as evidenced by the attempted terrorist attack in Corpus Christi in May. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images and checking for anything suspicious or unusual in the undercarriage. Detecting potential threats Scanning all vehicle types for undercarriage threats Automatic detection of illicit materials below the vehicle on the first pass Full integration to barriers, bollards and access control systems Driver and passenger fever detection capabilities No matter how well trained a security officer is, all humans make mistakes. However, with Helios, the chances of human error are greatly reduced. The system produces high-quality images of the undercarriages and alerts the security officer of any irregularities. It will even detect issues in the undercarriage of a vehicle passing through the system for the first time. Detecting potential threats is easy with UVIS. Works in extreme conditions The high-resolution images allow a security officer to see the entire undercarriage very clearly to determine whether there is anything suspicious. Instead of manually inspecting the vehicle and putting themselves at risk, security officers can inspect the vehicle from a more relaxed and safer environment and zoom in on the smallest details. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by massive vehicles Plus, Helios provides a side-by-side view of previous scans from the same vehicle if it has gone through the system before to make it easier for the officer to notice any differences. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain. Combat COVID-19 UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers, which can identify visitors with potential fevers, improving the safety of everyone on the base. UVeye fully supports 3rd party integration and provides a multiple layer of security for any facility Integrations made in the past: ALPR Face Detection / Recognition Arm Barriers / Bollards VMS (Video Management System) Integrating to the centralised server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralised management system enables the client to access the different systems deployed and manage the different users and historical data. Access control systems The undercarriage of a vehicle is one of the most important parts of the vehicle to inspect, but also one of the most difficult areas to inspect. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal and dangerous items from entering military facilities. It can make everyone in the facility safer, including security officers, who will no longer need to manually inspect vehicles and put themselves in harm’s way. Integrating with other security and access control systems can provide a multi layer approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
Kingfisher Sec, a West London-based security specialist, has adopted SmartTask to support the rapid growth of the business by streamlining and automating critical business processes. The company will use the cloud-based software to handle employee scheduling, proof of attendance and operational reporting across a team of up to 50 security guards. As a result, Kingfisher Sec has already reduced administration by around 17.5 hours a month, with further improvements expected moving forward. “We wanted an employee scheduling and workforce that would mitigate any growing pains we experience as the business continues to expand as well as helping us achieve our aim of creating a paperless operation,” explains Filipi Nascimento, Operations Manager at Kingfisher Sec. “SmartTask is allowing us to automate many of our manual processes in a phased approach to maximise benefit realisation, without losing focus on our core operational priorities.” Electronic communication tool SmartTask was selected following a tender process based on its feature-rich and easy-to-use functionality. Kingfisher Sec is using the software to provide a simple tool to the company’s team of security guards, via a smartphone app, so they can simply book on and off shifts, accept schedules and book holidays. Meanwhile, the advanced rostering system allows Kingfisher Sec to quickly create monthly work plans and communicate them direct to staff for electronic confirmation. Kingfisher Sec is also looking to replace a paper-based DOB system at around 40 customer sites with SmartTask’s Daily Occurrence Log (DOL). The electronic communication tool will enable security guards to quickly create entries and upload details regarding any on-site occurrence, providing online visibility of all incident data and supporting photo evidence. Capturing accurate data The software is capturing accurate data about the performance of our team and the business" As well as reducing the administrative burden, both on-site and centrally, the DOL will also remove the cost of providing, distributing and archiving a paper-based log. “SmartTask is streamlining our business and operational procedures, so we can save both time and money while providing a better service to our customers. The software is capturing accurate data about the performance of our team and the business, which we simply did not have access to previously. This is allowing us to better manage staff, eliminate human error and quickly respond to any issues,” adds Nascimento. Cloud-based software Paul Ridden, CEO of SmartTask commented: “Our cloud-based software is a highly-advanced and easy-to-use guard management, monitoring and reporting solution that typically reduces costs and improves efficiency by 30 per cent. As a result, a growing range of security businesses are using SmartTask to plan, manage, conduct and measure workforce activities more effectively.”
While HENSOLDT is a global pioneer of technologies that are designed for protecting armed forces, civilians, assets and borders, the company is also actively making a difference as a protector of endangered species. South Africa is known for its iconic wildlife and is also home to one of HENSOLDT’s largest industrial sites. As a result, it came as a natural progression to protect the country’s wildlife using state-of-the-art defence and security technologies. Rise in rhino poaching In recent years, animals such as rhinos have been under increased pressure due to rising poaching levels, threatening the future of these animals. South Africa holds nearly 80% of the world’s rhinos and has been hit the hardest by poaching, with more than 1 000 rhinos killed each year between 2013 and 2017. HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy HENSOLDT responded to this threat, and is now combining advanced intelligence, radar and optical surveillance systems with physical security for high-end wildlife protection. This week, HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy, where HENSOLDT’s technologies have been keeping a large number of rhino safe. HENSOLDT South Africa designed and installed a surveillance and security system on the farm and since then, not one animal has been lost to poaching. “Before that, we had poaching every month, sometimes every week,” says John Hume, owner of Buffalo Dream Ranch. Situational awareness In 2017, Buffalo Dream Ranch, the world’s largest rhino farm, started a partnership with HENSOLDT to secure 8000 hectares of land, where some 1800 rhinos now live peacefully, protected by state-of-the-art HENSOLDT technology. The specially developed system combines a number of advanced sensors, including optical and radar sensors, to monitor the rhinos, farm and surrounding area. Data from these sensors are fused using advanced analytics at a command and control centre to provide complete situational awareness and early-warning of potential poachers approaching the area. In combination with existing physical barriers and a team of security personnel, the system augments the total security approach to create a surveillance solution, with technology that is always on guard, never fatigues and which cannot be compromised. “We are for the first time in years feeling confident, with HENSOLDT, of perfecting the protection of our rhino,” says Hume. Wildlife protection The know-how acquired through these projects can be applied for protecting other wildlife “We are honoured to be part of important initiatives such as the conservation of our wildlife and we aim to expand our efforts,” says Hennie Venter, Chief Executive of the HENSOLDT South Africa GEW business unit. The know-how acquired through these projects can be applied for protecting other wildlife and national parks to safe-keep endangered species such as lions, elephants and even abalone. HENSOLDT prides itself on its relationship with its clients. “For us it’s not putting down the equipment and getting the business, for us it’s rather a journey,” says Werner Muller, GEW’s Chief Executive of Spectrum Monitoring and Security. Needs-based solutions Because of this philosophy, and because each wildlife scenario is different, with its own unique set of challenges, HENSOLDT’s experts collaborate with each client to develop a solution that addresses their specific needs. Through its business units, GEW and Optronics, HENSOLDT South Africa delivers solutions to clients across the world, and significantly contributes to South Africa’s export industry, while it is firmly grounded in its roots as a proudly South African company, operating in South Africa for South Africa. HENSOLDT is committed to continue innovating to protect the wildlife.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analogue video intercom system of BI-City Tokyo. Analogue intercom system The original analogue intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analogue intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualised and integrated in the Dahua DSS platform for centralised management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronise the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or travelling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognise moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognised. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing colour details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labour costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analogue system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Small cities and towns are increasingly growing every day mostly due to internal migration and the high prices of rent in Los Angeles county USA. Veteran Los Angeles security services company, Hillquest Security & Patrol plans to meet this growth head-on. For that reason, Hillquest has decided to expand their already wide range of action (which included more than 60 cities by 2018) to all the Orange and Riverside counties. Hillquest’s security mobile patrols Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019 Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019. What was initially a test venture that turned out to be really successful for the company has now became a full-service activity. Furthermore, Hillquest started to offer its full range of security options for businesses and individuals in those areas. Businesses and other entities in the OC and Riverside can now hire Hillquest’s security mobile patrols, bodyguards, security systems, loss prevention and other security services for banks, construction areas, healthcare facilities, hotels, apartment complexes, movie sets, parking lots, schools and event venues. Manned Guarding and security services "We provide security services that are perfectly tailored for our clientele," said John Bouzy, Hillquest Security owner. "Our trained, licensed expert security officers can handle any and all of our customers’ security needs. Moreover, we can do that any time of day as well." According to Hillquest Security & Patrol’s corporate website, the company is insured with a US$ 5 million policy and its officers "meet the standards set by the bureau of security and investigative services."
The Danish Superliga football club Brøndby IF were aware that family attendance had fallen at some of the more high-profile games, such as the local derby with F.C. Copenhagen, due to concerns over hooliganism and safety. With an average attendance of 14,000 people per game, and up to 100 registered persons on the stadium blacklist for causing trouble, the football club wanted to find a way to make genuine fans feel safer by preventing problems before they could occur. Improving security With the use of cameras and facial recognition, blacklisted offenders can now be automatically identified in the crowd before they attempt to enter the stadium. This system identifies any individuals registered on the offenders list and alerts security staff to prevent them from entering. The automated procedure at the stadium entrance also decreases congestion at the gates, so genuine fans can get into the stadium faster. As well as improving security outside, the system allows staff more time to focus their attention on creating a safe and entertaining environment for those inside the stadium. The technology can identify faces that are difficult to recognise with conventional techniques Facial recognition server The Panasonic facial recognition software ensures high levels of accuracy. The technology can identify faces that are difficult to recognise with conventional techniques, such as those taken from an acute angle and even when part of the face is concealed or hidden by sunglasses or scarves. In fact, the National Institute of Standards of Technology (NIST) in independent testing identified the system as the most accurate facial recognition server on the market. And the system is already working. One blacklisted offender was prevented from entering the stadium at the very first home game of the season in mid-July and he will receive a fine and extended ban. Protection of personal data However, some fans were initially sceptical about the scheme. They were worried about the Big Brother concerns of privacy and personal data protection. These fears quickly faded once the club explained the sensitive way that the scheme had been implemented. Security personnel remain in control of the process at every stage. The technology flags potential blacklisted offenders and the security advisers then take over and investigate further before taking action. People-led and technology supported The solution is people-led and technology supported. Personal data privacy is also protected because the facial recognition technology does not store the images or data of any supporters, other than those registered on the blacklist. In addition, all personal data is stored on an internal server, not connected to the internet or to any other system, significantly reducing any cyber risk of data breach. After seeing the results of the technology and receiving reassurances about data protection, both Brøndby management and fans alike have welcomed the new technology. Moving forward there is also the potential to utilise a national hooligan register with the system to help spot travelling troublemakers within Denmark.
Round table discussion
In tidying up after a year of Expert Panel Roundtable questions and answers, we came across some previously unpublished responses from our panel. These interesting responses address some of the hottest topics in the industry, from robots and deep learning to the “race to the bottom.” Taken together, the varied comments offer their own range of insights into the evolving physical security market. This week, we highlight some of these assorted Expert Panellist comments submitted over the last several months.
The new year presents new opportunities for the physical security marketplace. In many ways, 2018 will undoubtedly see further development of trends we saw in 2017. In fact, some of the trends determining the future of the physical security industry have been in place for many years. However, not every event in 2018 can be foreseen or easily predicted. To be sure, it is sometimes the surprises that keep life interesting! We asked this week Expert Panel Roundtable: What will be the security market’s biggest surprise in 2018?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
Security guards: Manufacturers & Suppliers
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download