As part of the ongoing expansion of its banking and payments security and consultancy offering, FIME has confirmed the appointments of Arnaud Crouzet and Edouard Baroin. “Banking and retail are experiencing unprecedented change and, while the digitalisation of payments represents significant opportunities, each stakeholder must overcome a range of challenges,” comments Lionel Grosclaude, CEO at FIME. “Banks must balance the need to transform their strategies and infrastructure...
The recent incident at London Gatwick airport caused major travel disruption for more than a day after drones were spotted flying over this sensitive area. This incident once again highlighted the need for anti-drone technologies to address this evolving threat and secure the safety of airplanes. Following the episode, the US Federal Aviation Administration was instructed to develop a strategy to allow wider use of counter drone technologies across airports. Detecting drones, and any UAV threat...
Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity...
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces the launch of a new Community Edition of its powerful software-based virtual Application Delivery Controller (vADC) to help application developers create innovative application solutions with dramatically lower costs and time to market. Pulse vADC Community Edition integrates easily with common DevOps tools for automated provisioning and orchestration, such as Kubernetes, Terraform, Puppet...
CDVI, an access control manufacturer worldwide, announced its participation in The Security Event, a focussed security exhibition for the professional security installer. This three-day event at the NEC Birmingham will be held on April 9-11, 2019. Many of CDVI’s team of industry professionals are attending the event, including Paul Ramsay, General Manager, and Daniel Phillips, Pre-Sales Consultant. “Our attendance at The Security Event highlights our dedication in providing modern...
Bold Communications, a developer of alarm communications and management systems, has announced a new technology partnership with Openview Security Solutions, the UK’S largest privately-owned independent security company and provider of integrated control room systems. The two companies already have a proven track record of working together on a number of high-profile public sector projects including Loughborough University, Stockport Homes and the City of Cardiff. This new partnership wil...
The rugged build quality of the new Invictus PTZ camera from UK CCTV manufacturing company, 360 Vision Technology, has been proven in the field during a recent road traffic incident in north London, which provided a real-world test for the camera and its ‘Attack Detect’ response feature. Built into each Invictus camera, 360 Vision’s ‘Attack Detect’ automatically responds to a detected increase in camera load (such as the camera being hit by an object). On detection, the camera’s direct-drive Pan & Tilt mechanism is instantaneously disengaged to prevent damage to the motor drive. Expanded surveillance coverage A self-check routine then establishes if the camera has altered its direction of view during the attack, and an automatic re-initialisation is triggered - returning the camera to its last known position prior to the impact. Installation company DSSL Group selected the Invictus camera to facilitate expanded surveillance coverage across the north London borough The benefits of Invictus’ Attack Detect response to system operators is that post-attack, the camera will always return to its correct field of view, prior to being forcibly moved. This means that vital evidential footage will continue to be captured, and without the need for operator intervention. The feature also ensures that all camera-preset positions remain intact, vital to avoid disruption to the daily running of the system due to inaccurate preset positions. Installation company DSSL Group selected the Invictus camera to facilitate expanded surveillance coverage across the north London borough. Public space installation “360 Vision’s Invictus has many key features that benefit Town Centre CCTV operators, however Attack Detect is a uniquely beneficial attribute that competitor cameras just don’t offer,” explains Aaron Stephens, Director at DSSL Group. “This can be crucial when specifying a successful long-term public space installation, where CCTV cameras have been known to be vandalised using objects such as footballs, basket balls and rocks.” Talking about the crash incident, Aaron explains: “The Invictus camera’s Attack Detect response proved itself invaluable in the ultimate impact test, when a speeding vehicle hit the camera’s column at high-speed, after leaving the road and mounting the pavement. Due to the quality of DSSL installation and 360 Vision’s Invictus, the camera not only stayed attached to the column mount, but also remained fully functioning.” Evidential incident footage “The camera column was hit so hard that the camera head turned over 180 degrees. The anti-attack system released the camera’s drive mechanism as soon as the impact was detected, allowing the camera to move freely." With the Invictus camera also producing second to none night-time video footage amongst the well lit streets of the town centre" "After a few seconds, the Invictus completed a self-test to return to its original position and continued to record evidential incident footage of the aftermath of the crash. With the Invictus camera also producing second to none night-time video footage amongst the well lit streets of the town centre, the pre and post-crash evidential incident footage was captured in unsurpassed high-definition colour-mode.” Attack detect feature Aaron concludes: “Not only has this recent incident proven the effectiveness of the Attack Detect feature but our continued experience of the Invictus camera has demonstrated that a UK manufacturer can provide the latest technology in a highly robust and ruggedised PTZ, with exceptional HD imaging, colour at night capability and whilst competing on cost with other global camera manufacturers.” “Public space CCTV and cameras securing perimeters typically operate adjacent to roads, with an ever present risk of impact from vehicles, either accidentally or maliciously,” says Adrian Kirk, Director at 360 Vision Technology. “Installing Invictus ruggedised cameras into these locations provides customers with a ‘fit for purpose’ roadside solution that ensures continued performance, even under attack. For peace of mind, this is all backed by 360 Vision’s UK based design and manufacturing resource, and a comprehensive 3-year warranty.”
ADT Inc., a provider of monitored security and interactive home and business automation solutions in the United States and Canada, announced the acquisition of Advanced Cabling Systems, one of the leading technology integration companies in the mid-south. Advanced Cabling Systems will join forces with Red Hawk Fire & Security. Headquartered in North Little Rock, Arkansas, and founded in 1997, Advanced has regional offices in Lowell, Arkansas, Tulsa and Oklahoma City, Oklahoma and Ozark, Missouri specialising in the installation and service of integrated systems including structured cabling, fire alarm systems, audio/video, CCTV, access control, intrusion detection, intercom/paging systems, nurse call and infant protection systems. Delivering superior customer service Advanced Cabling Systems offers a full range of integrated systems and has earned exceptional customer loyalty as a fire and security integrator“The addition of Advanced is part of our focus on commercial growth and underscores both ADT’s and Red Hawk’s focus on leveraging technology to deliver superior customer service and support to commercial and enterprise-level organisations, particularly those with multiple U.S. locations,” said Dan Bresingham, ADT Commercial Executive Vice President. Starting as a structured cabling company and evolving with technology, Advanced Cabling Systems now offers a full range of integrated systems and has earned exceptional customer loyalty as a fire and security integrator. Increasing Red Hawk’s geographic footprint “The move is a positive proof that aligning with ADT elevates Red Hawk’s ability to showcase its products and services to a wider range of clients while increasing our overall geographic footprint and dedicated technician workforce, which is to be the premier single point of contact for all our customers’ fire, life safety and security needs,” said Michael McWilliams, Senior Vice President, Red Hawk Fire & Security, ADT Commercial. “At Advanced, our focus on technology and customer service is why we know that aligning with the most recognisable brands in the fire and security industry will allow us to better serve existing and new commercial customers,” said Michael Kennedy, President of Advanced Cabling Systems.
BQT Solutions, a provider of high security card and biometric readers and locks, has launched its new Orca weatherproof lock which provides industry-leading strength, unparalleled environmental durability and seamless access control integration for securing gates, roller doors, shipping containers, and any other large door or entryway. Matthew Nye-Hingston, CTO of BQT Solutions Locking division commented, “Orca is the ultimate weatherproof lock, providing the complete combination of strength, security and convenience in one solution. It encompasses the features found in premium electronic locks, with the physical strength and function required to secure doors of any shape, whatever size.” Integration into access control system Key features such as an IP67 rated design and built-in heater enable the Orca to withstand extreme weather environments including hot and cold climatesOrca lock is the latest generation of roller lock from BQT Solutions, building on an impressive portfolio that includes the YG10 – winner of the SIA New Product Showcase Award in the Lock Systems and Secure Storage Containers category presented at ISC West 2018. Along with its highly impressive physical attributes, Orca’s ability to integrate into an access control system is what elevates its abilities well beyond anything else on the market. Orca is fully monitored and user-configurable, whilst being impervious to weather or environmental challenges making it perfect for deployment indoors or outdoors. Orca’s standout features include: High Security Performance - With a holding force in excess of 50,000N, 18mm diameter stainless steel bolt pin and reinforced strike design, the Orca lock ensures the most sensitive sites remain protected from even the most vigorous methods of attack. Fully Weatherproof - Key features such as an IP67 rated design and built-in heater enable the Orca to withstand extreme weather environments including hot and cold climates, marine and desert conditions. Highly Configurable - Orca can be adapted to suit a wide range of application requirements, with user selectable fail safe/fail secure modes and three user selectable control methods. Complete Monitoring - Orca can truly become a part of the access control system, with a range of output signals including: bolt locked and unlocked position, door position, and tamper detection. Versatile Installation - A symmetrical design means Orca can be installed both horizontally and vertically, giving greater flexibility to installers looking for optimum positioning. Low Cost Running - With the heater disabled, Orca offers low current consumption, drawing as little as 30mA in standby and only 300mA in operation at 12VDC. Long-term Reliability - A high quality low voltage motor is the key to the Orca’s reliability while stainless steel and wear resistant plastic components ensure complete peace of mind for any security operator. Optimal heavy-duty monitored lock BQT Solutions is a specialist in the development, manufacture and supply of high quality, high security card and biometric readersMatthew added, “Orca is the perfect heavy-duty monitored lock for any integrated security solution. Our highly-skilled team in New Zealand has worked hard to ensure we bring a product to the market that we truly believe is the best of its kind. With several exhibitions lined up in the new year, we are looking forward to showing more customers how Orca can secure their installations.” An Ava Group company, BQT Solutions is a specialist in the development, manufacture and supply of high quality, high security card and biometric readers, electromechanical locks and related electronic security products. The company provides a wide range of both off-the-shelf solutions and purpose tailored solutions. Working with major system integrators, security consultants and end users, BQT Solutions develops tailored access control solutions to fulfil a range of access control requirements. From standalone units to fully integrated enterprise solutions, BQT access control systems are designed to provide maximum security, maximum value – and a migration path to meet present and future needs.
Trillium Secure, Inc. has appointed Mahbubul Alam as Chief Marketing Officer and Senior Vice President of Global Engineering. This move further deepensTrillium's experienced management team while the company launches an end-to-end trusted and secured data services platform for vehicles. Alam's expertise in platform as a service offerings and over-the-air update technology for connected vehicles is a perfect fit for driving Trillium's recently launched Trusted Mobility Platform and Services. Creating transformative technologies "Mahbubul's dual strengths to clearly define branding while taking a no-nonsense approach to developing PaaS and SaaS solutions are a great addition to the Trillium team," said David Uze, CEO and founder of Trillium. "His leadership and vision are integral to our significant CES 2019 efforts and will be part of Trillium's long-term mission of making connected cars safe." Alam's previous experiences as chief technology officer and chief marketing officer of Movimento, an Aptiv company, as well as more than 14 years as Cisco's Head of Internet-of-Things and Machine-to-Machine Platform, ideally position him to have an immense impact on Trillium's mission. "It's an honor to join Trillium's great team and contribute to creating transformative technologies at a critical juncture in the transportation industry's history," said Mahbubul Alam, new CMO and SVP of Global Engineering. "I'm excited to accelerate our innovative technologies to further strengthen Trillium's award-winning trusted mobility services."
The DC700G-FT Security Door Closer from the ASSA ABLOY Door Hardware and Access Control Group has been shortlisted for the Architectural Ironmongery (AI) Specification Awards. Organised by the Guild of Architectural Ironmongers (GAI) and the Royal Institute of British Architects (RIBA), the AI Specification Awards identify and reward excellence in the specification of architectural ironmongery in the construction industry. The DC700G-FT has been shortlisted in the category of ‘Product design and innovation’, which is a new award for 2019. Featuring a distinctive and stylish appearance that was launched earlier this year, the DC700G-FT allows any fire or non-fire rated door to be retrofitted with an electrical locking mechanism. Closing force requirements With no morticing or rebating required because the door closer, lock and wiring is all surface mounted, sites do not need to be concerned that the installation will risk a fire door’s certification, or create a lot of mess and disruption. In addition, the locking mechanism releases under its full rated load, so it is safe to use on escape ways, stair cores or final escape doors. The door closer also features Cam-Motion technology, ensuring the door is light to open while retaining its closing power The door closer also features Cam-Motion technology, ensuring the door is light to open while retaining its closing power. This ensures it meets both the opening force detailed in BS 8300-2:2018, as well as the necessary fire closing force requirements. This is in line with the Equality Act 2010 and Approved Document M and B. Additionally the DC700G-FT is CE Marked in all three mounting positions and independently tested for use on fire doors. Maintaining security The winners of the AI Specification Awards will be announced on Thursday 21 March at the OXO2 in the OXO Tower building in London. Paul Johnson, Commercial Director at ASSA ABLOY Door Hardware and Access Control Group, said: “Buildings evolve and change over time, and nowadays the challenge is balancing any new requirements while maintaining security, escape routes and fire door safety. Our unique and innovative DC700G-FT door closer helps overcome these challenges, by combining Cam-Motion technology and an escape door strike all in one. This offers both smooth operation and reliable closing, with secure locking, whilst being fully certified.” “We are thrilled that our class leading innovation has been recognised by the AI Specification Awards. These awards truly represent the best that architectural ironmongery has to offer, providing a celebration of the finest work in the industry.”
Viking Electronics Inc. announces the release of its brand new 2019 Product Catalogue which celebrates Viking’s 50 year legacy. The catalogue features hundreds of products and introduces many new innovations, as well as Viking’s core products – such as emergency phones, door entry systems, paging amplifiers, mass notification systems, hot line phones, and more. The catalogue is not just a simple product guide; it offers countless ideas and custom solutions for ‘Access Control’ to ‘Zone Paging’ and everything in between. “So many people rely on the Viking catalog every day because there’s an economical solution on every page.” – Mike Busby, Marketing and Sales Manager for Viking Electronics Inc. Unique features For 50 years Viking has been bringing you the industry technology of today and the ‘tough as nails’ craftsmanship of the past. Viking products are made in the USA and they stand behind their products with a 2 year limited warranty, as well as free lifetime product support. Viking Electronics designs and manufactures over 500 communication and security products, including VoIP and analogue emergency phones, entry systems, paging interfaces, paging amplifiers, mass notification systems, hot line products, and enclosures. Many Viking products are designed to fix or add unique features to telephone or security applications, keeping costs down while maintaining ease of use. All Viking products are designed, manufactured, and supported in the USA, and are backed by a two year limited warranty.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
The basic principles of access control are well established: only authorised people should have access to secure areas, only at times that can be defined in advance, and only within a system that can identify exactly who went where, and when. Traditional mechanical lock-and-key systems cannot accomplish this — at least, not without loading a huge admin burden onto security staff. But modern, electronic wireless access control has the flexibility to achieve it. What criteria determine the right sort of access control for your organisation? It makes sense to assess what is desirable against what is affordable or available in the electronic access control market today. Asking yourself these 5 questions will lead to a wise investment in the right technology: Wireless locks like Aperio work seamlessly with existing systems from over 100 different access control providersDo you want to extend your existing system, or begin from scratch? You are not stuck with locks chosen by a previous management team. Security needs change. Wireless locks like Aperio, for example, work seamlessly with existing systems from over 100 different access control providers, integrated online or offline. You will save time and money extending your current system with a technology like Aperio and users can continue with their existing credentials. Going forward, it makes sense to choose locks built using open architecture, for added flexibility and to future-proof your next investment. Who are the site users and what kind of credentials suit their needs? In many industries, access to premises is required by permanent staff and short-term contractors: your access system needs to be flexible. Different systems offer credentials stored on cards and fobs, or on programmable, battery-powered keys. For example, the new Openow app for SMARTair wireless locking converts a user’s smartphone into a virtual key. You issue and revoke user keys using the intuitive software, an efficient, flexible mobile management solution. What is the structure of the site (or sites) you protect? You will need different locks for high-traffic and low-traffic doors, indoor and outdoor use. Almost everywhere, wireless locks are much easier to install and to maintain than traditional wired magnetic locks — and more cost-effective to run. Certified wireless security locks provide extra protection for sensitive areas needing stringent standards. If you have a mobile workforce or manage dispersed sites, consider the credential management practicalities. For example, programmable keys that are easy to update with a Bluetooth-enabled smartphone app — like ASSA ABLOY’s CLIQ Connect solution — will save your staff time and money. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions Do you want to secure more than just doors? Some wireless systems have locks for cabinets, machines, windows and even server racks (handy if you want an extra layer of control over co-located servers). There will be workflow advantages in monitoring these ‘non-doors’ — medicine stores, for example, or car parks or lifts — from the same admin interface as your doors. Site users will appreciate the convenience of carrying one credential for every access need. For outdoor access points, you will need gate locks or padlocks certified for operation in extreme conditions. For example, CLIQ mechatronic padlocks are currently deployed outdoors at utility sites in Scandinavia and supermarkets in East Africa. Do you need real-time capabilities? Choose an Online system and you can manage and amend access control doors at any time and from anywhere, using the admin software. You can monitor sensitive areas like medicine stores remotely and in real time, and can revoke access rights if a user credential gets lost. In an emergency, remote locking or unlocking of an entrance could be critical. Aperio wireless locks, for example, are integrated with online electronic access and real-time monitoring systems in hospitals, manufacturing plants and student halls of residence. With some systems, including SMARTair, you can combine ‘Update on Card’ and Online updating for different doors within the same installation. The CLIQ Connect app and programmable keys make real-time control over remote sites or teams possible. Wireless access control offers a compelling mix of audit compliance, easy installation, cost efficiency, and seamless integration. It makes life easier for security managers, and is deployed in premises as diverse as power plants and co-working spaces; museums and care homes; banks, schools and skyscrapers.
Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understanding BIM construct BIM is neither a product nor software but rather is a “cache of building information” to which graphic data (such as drawings) and certain technical attributes (such as technical data sheets and associated characteristics) that are also related to the foreseen life cycle can be added. BIM represents a collaborative planning method as it allows for the integration of useful information for every phase of planning in a single model What BIM represents therefore is a collaborative planning method as it allows for the integration of useful information for every phase of planning – architectural, structural, plant design and installation, energy, management – into a single model. Project functionality and performance While CAD allows a project to be designed with 2D or 3D drawings, BIM also specifies the functionality and performance of each BIM object in the project or in the entire building process. A BIM object can hold any information pertaining to the building as a whole, or its parts. The most common information collected in a BIM is geographic location, structure, the properties of the materials/components/systems and technical elements, construction phases and maintenance procedures. Fields of application Building Information Modelling is used both in the construction sector, for design and installation (architecture, engineering, technical installations…) as well as in facility management. BIM supports the general improvement of a project along the entire life cycle of the construction process The role of BIM within the construction industry (by means of participants such as architects, engineers, surveyors, experts, builders, consultants and clients) is to support communication, cooperation, simulation and the general improvement of a project along the entire life cycle of the construction process. Advantages of BIM technology BIM technology offers a great number of advantages, such as greater efficiency and productivity, fewer errors, less downtime, reduced costs, greater interoperability, maximum information sharing, and more accurate and consistent control over a project. Generally, a BIM object is saved in .ifc (Industry Foundation Class) format. These IFC files are classed as 3D image files that also contain other technical information and are compatible with any software that works with BIM technology. Standard process and regulation BIM will become the standard process for all buildings and is currently being integrated into public contracts legislation across Europe. With Directive 2014/24/EU, the European Union has introduced a few guidelines to member countries on using the BIM system in the design and construction of public works. The BIM system is therefore strongly supported as a means of increasing the effectiveness and transparency of procurement procedures. Comparable BIM tools are necessary in order to allow the various softwares to ‘read’ the relevant data to manage all different parts of the construction sector Mandatory use of BIM process in public works In terms of the BIM process spreading to European operators (planners and companies), the leading nations are the Netherlands followed by the United Kingdom, whose government is bringing in a plan to make the use of BIM mandatory for public works. Even in Northern Europe and the United States, BIM technology has been used since 2000. Since the construction sector varies so widely (plants, structures, energy), it has become evident that no software exists that can manage all these different parts. Instead, comparable BIM tools are necessary in order to allow the various softwares to “read” the relevant data. BIM technology makes it possible to ascertain exactly how the cameras will fit into a building’s layout, reducing the risk of unexpected blind spots BIM and video surveillance Security has now become an integral part of the design process of any new large building. To provide the highest levels of security and avoid any blind spots that might constitute a security breach, the video surveillance system has to be planned in conjunction with other essential services, such as the electrics and hydraulics. BIM allows security system designers to interactively understand camera coverage, making it easier to identify the required models and to optimise the system layout. Reducing camera installation risks In actual fact, the technology makes it possible to ascertain exactly how the cameras will fit into a building’s layout (both internally and externally) and to determine whether the view of any camera is blocked by columns, lighting posts, trees, etc. This reduces the risk of unexpected blind spots. It is therefore possible to see how the cameras will be configured before they are installed, and which areas will be covered by the surveillance system after installation.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified user operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless cloud integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National system integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration with existing systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access credentials compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterised by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability issues of event security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organisers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic approach and technology integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behaviour analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged security and smart cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defence force. Wireless technology for cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need for more security in K-12 schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging the gap between IT and physical security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT and cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training courses for integrators and partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instil added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new centre in Barcelona (in addition to current R&D centres in Copenhagen and Sofia, Bulgaria). Making camera installation easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the colour of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras with sound detection technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analysing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralise systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine learning engine for crime prevention In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focussed on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyse shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition of IP door intercom company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analogue components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
Police in the Belgian city of Lokeren can now respond more effectively to criminal incidents – thanks to an upgraded video surveillance solution that features 120 Sony security cameras, including the rugged SNC-VM772R 4K minidome camera. Lokeren video security system Like all urban centers, Lokeren faces the challenges of crime, vandalism and antisocial behavior in its streets, public buildings and open areas. Until recently, the municipal police force relied on analog security cameras to assist with detecting and responding promptly to incidents. However, these cameras’ limited resolution and image quality often prevented efforts to prosecute individuals as they could not be successfully identified. In response to requests from citizens to maximise their safety, Lokeren police chiefs and city politicians pledged to upgrade their video surveillance capabilities. In particular, the urgent need was identified to improve the accurate recognition of suspects caught on camera – an even greater challenge at night or on dull, poorly-lit days. Full HD and 4K network surveillance cameras Security specialists DS-Consulting therefore recommended upgrading Lokeren’s video security to a combination of Full HD and 4K network surveillance cameras. A competitive comparison by DS-Consulting saw Sony’s outdoor minidome and fixed box-type cameras compare favorably with other brands. The rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions “There was only one choice when we compared the image quality of Sony’s security cameras against other market-leading brands” states Emiel De Smet of security specialist DS-Consulting. “They offer so much more detail and clarity – and that makes all the difference in critical surveillance applications.” SNC-VM772R 4K minidome camera In particular, the rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions. The camera’s large-sized Exmor R CMOS image sensor allows it to capture more light than ordinary sensors. This allows it to ‘see’ suspicious activity clearly in conditions of almost complete darkness, where less sensitive cameras struggle. Installed by Belgian integrator Seris Technology, the complete surveillance solution features a video management platform by Genetec Security Center plus 120 strategically located Sony cameras, providing 24/7 coverage of city center streets as well as public buildings, including Lokeren’s police station, central library and city hall. Crime prevention and 24/7 video monitoring The new cameras give police a clearer picture of criminal activity in the city streets, assisting with the positive identification of suspicious persons even at night and in low light conditions. Round-the-clock video footage is routed via an optical fiber network, where images are monitored in the central dispatch office at police headquarters. Since the cameras’ installation, city police have seen a reduction in crime levels, accompanied by greater peace of mind for residents and visitors.
Interphone, the security systems and building technology integrator, completes an advanced project for Ardmore Construction at the high-profile Sutton Point development, a vibrant new community at the heart of the London Borough of Sutton. The company was appointed to design and install the integrated security systems, which includes fibre infrastructure, BPT door entry, PAC access control, IP-networked CCTV and an IRS communal aerial system with SKY Q. The installation has been recognised by the UK Outstanding Security Performance Awards (OSPAs) with Interphone nominated as a 2019 finalist in the Outstanding Security Installer category. Fibre backbone network The Interphone project team took the decision to move to fibre infrastructure to improve performance “Through the effort and commitment of our team the project was successfully completed on-time, within budget, and to the highest possible standards notwithstanding design changes in the building along the way, which required modification to our own design and approach to aspects of the installation,” explained Albert Dwek, Sales Manager at Interphone Limited. In particular, the Interphone project team took the decision to move to fibre infrastructure to improve performance and ensure it could deliver a high-specification security system. As a result, the company created a fibre backbone network, which allows CCTV images to be viewed in true 1080p/4k without compromising any other components of the system. Responsive working relationships Interphone worked closely with services engineers QuinnRoss Consultants Limited throughout the project. Michael Keenleyside, Electrical Engineer at Quinn Ross commented: “We pride ourselves on our ability to deliver the best possible service and solution for each of our clients, so it is essential to have highly responsive working relationships in place with key technology partners.” “Interphone was flexible and adaptive throughout the design and installation phases of the development, which ensure that any changes to system requirements were handled quickly and efficiently. Their team’s knowledge, understanding and commitment was essential to the success of the project.” The sophisticated CCTV solution incorporates a site-wide, IP-networked camera system and full-perimeter PTZ (Pan Tilt and zoom) camera system from HIKvision. Greater compression The full-perimeter system runs in real-time over three towers, three remote stations and two virtual concierge points with interlock ability The full-perimeter system runs in real-time over three towers, three remote stations and two virtual concierge points with interlock ability. The external PTZ camera images, recorded onsite, are also shared with the local police. This means the management company can keep the site secure for its residents, while allowing the police to protect the area in and around the development against crime. The PAC access control system enables all management tasks related to the tenants and staff to be administered from the central computer as and when required, ensuring the highest level of security around the site and added peace of mind. Meanwhile, BPT’s XIP door entry system offers significantly greater compression, providing the clearest and highest quality AV currently available, even with the significant background noise. Building communications The added PCS concierge facility also has improved switchboard software performance, delivering full control of building communications at two desks, so the system will never be engaged and never miss a visitor call. The primary focus when designing this project was the delivery of a system that could expand to meet changing requirements" “The primary focus when designing this project was the delivery of a system that could expand to meet changing requirements. As a result, we have implemented a system that not only uses the most up-to-date technology, but by its design, has been future proofed with the ability to grow. Therefore, the developer can meet all its internal requirements and ensure high levels of security for residents, visitors and members of the public,” commented Dwek. Technical capabilities David Dobouny, Operations Director at Interphone Limited added: “We are committed to the highest levels of service delivery. This project was selected to demonstrate our technical capabilities covering access control and CCTV systems for our NSI accreditation. We achieved a grade A rating, with zero faults and no negative comments regarding on-and off-site documentation, design and installation. This is a fantastic achievement for everyone involved, especially considering the size of the project.” Sutton Point is a large-scale mixed-use scheme located close to the town centre. The high-profile development included the full demolition of an existing tower, and the design and construction of 332 one-and two-bedroom apartments, prime three-bedroom penthouses, 21,000 square feet of retail space, 18,000 square feet of office space and an 80-bedroom hotel.
March Networks, a global provider of video security and video-based business intelligence, is pleased to announce that one of Qatar’s top banks is deploying the company’s business intelligence software and integrated analytics to improve customer service and operations. The customer is one of six Qatari financial institutions currently using March Networks systems for advanced video surveillance and fraud prevention. The bank is already using an end-to-end March Networks video recording and management solution in all of its Qatari retail banking branches, hundreds of ATMs, and multiple corporate facilities. It is expanding that solution with Searchlight for Banking software to deliver an enhanced customer experience and strengthen its fraud investigation capabilities. Detecting suspicious transactions The software helps banks evaluate and improve customer service using dwell time, queue length and people counting analyticsMarch Networks Searchlight for Banking combines surveillance video with ATM/teller transaction data and analytics to deliver powerful fraud-fighting tools, such as the ability to rapidly detect suspicious transactions and potential cases of ATM skimming. The software also helps banks evaluate and improve customer service using dwell time, queue length and people counting analytics. The bank started using March Networks several years ago to ensure compliance with CCTV legislation first introduced by the Qatari Ministry of Interior (MOI) in 2011. The law mandates that all banks equip their locations with IP video surveillance, record at a minimum 3-megapixel resolution and 20 frames per second, and ensure 120 days of video storage. The bank, which was using an analogue video surveillance system at the time, needed an enterprise-class video solution that could meet the MOI regulation. It was also looking for a solution that offered remote video management, system health monitoring, and the ability to scale easily to accommodate future growth. Command Enterprise video management software March Networks products have proven highly reliable and are able to meet the parameters set by the Qatar Ministry of Interior regulations"When the project went to tender, only the March Networks solution performed to all of the bank’s criteria, said its group safety and security manager. “With the March Networks system, we are able to fully comply with the law. The usability and health monitoring features of the Command Enterprise video management software are also excellent, enabling us to investigate and resolve potential system issues before they become critical.” According to ISC Group Gulf, a systems integrator in Qatar with a specialised focus and expertise in the banking sector, the March Networks solution is the best choice for banks in the region. “March Networks products have proven highly reliable and are able to meet – and often exceed – the parameters set by the Qatar Ministry of Interior regulations, as our organisation has seen in our work with most of the country’s major financial brands,” said Cristian Ivan Nicolae, Project Manager, ISC Group Gulf. CCTV products for banking environments We are fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks"“In addition, March Networks offers the sole CCTV products in Qatar purpose-built for banking environments, which means you are getting a secure, highly-professional solution that is easy to scale in complexity.” “We are proud of our long-standing partnership with this Qatari bank. It is a leader in the use of innovative video technologies, and clearly understands the value intelligent video offers to its organisation,” said Trevor Sinden, Director, Middle East and Africa Sales, March Networks. “We are also fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks.” March Networks will showcase its security and business intelligence solution for banks, as well as its complete enterprise video portfolio, in Stand S1-J42 at Intersec 2019, January 20-22 in Dubai, UAE.
Access control system specialist Nortech has recently seen a luxury hotel in Bath update its car park by replacing its existing Nortech FeeMaster system with the latest specification. Nortech’s FeeMaster range was installed by access control system experts APT Security Systems, which is currently updating its past application of the FeeMaster system, so that staff can continue to monitor use of the hotel’s car park. APT Security Systems is the provider of vehicle access control and traffic management systems in the UK. Using its experience in designing and delivering practical and cost-effective solutions, APT installed the updated system which includes the FeeMaster Smart Entry Station, FeeMaster Smart Exit Station, and a FeeMaster Smart Console inside the building. The console allows the staff to control any misuse of the car park and ensures that there are enough parking spaces for its guests. Upgrading car parking system to latest version Nortech’s FeeMaster Smart parking management system is a flexible, simple and cost-effective way of managing car parking accessMary Lynskey, Operations Manager at APT Security Systems commented, “Nortech’s systems have been used on our projects for a number of years and as with this hotel we are currently updating the equipment at these sites to the latest versions. We have worked with Nortech for more than 20 years and are very pleased with its equipment.” She continued, “The FeeMaster range has always worked well for the hotel and they were happy to renew the system as it’s the right fit for their business. The client likes how the products work and we will always recommend Nortech to others looking to upgrade their car parking systems.” Nortech’s FeeMaster Smart parking management system is a flexible, simple and cost-effective way of managing car parking access and controlling validity periods using Mifare smart cards. This avoids the need for expensive cabling between components and minimises disruption. Functioning of the FeeMaster system The FeeMaster Smart exit station prevents unauthorised vehicles leaving a car park or entering restricted areasThe FeeMaster entry station is designed to be used to record the date and time that a vehicle enters a car park. Located at the entrance of the car park, it issues tickets to visitors as they arrive, with each ticket containing a barcode, serial number and the date and time. Dispensing the ticket triggers an ‘open’ signal to the entry barrier. The ticket is then taken to the hotel’s reception desk where the date and time is used in conjunction with the FeeMaster Smart Console. The FeeMaster Smart exit station prevents unauthorised vehicles leaving a car park or entering restricted areas. Located at the exit of the car park or the entrance to a restricted area, it validates the Mifare smart cards and exit tokens. The exit station is equipped with a barcode scanner to read exit tokens issued by the FeeMaster Smart console, as well as entry tickets issued at the entry station. Each ticket is valid for single use at the exit station during the validity period assigned to it. The exit station controller checks the details on the barcode ticket and sends an ‘open’ signal to the barrier. Encoding reusable Mifare access control cards The FeeMaster Smart Console is a compact and easy-to-install device that reads barcode tickets issued at the entry stationThe FeeMaster Smart Console is a compact and easy-to-install device that reads barcode tickets issued at the entry station, calculates the fees based on pre-programmed tariff details, and encodes reusable Mifare access control cards with validity data. If necessary, the console can print customer receipts and/or barcode exit tokens. It can also control a till drawer and can optionally provide a relay output signal which can be used by third equipment i.e. barrier control whenever a card has been encoded or an exit ticket printed. The console may also be connected to a PC so that transactions can be analysed and additional tariff management features may be used. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
A video surveillance system installed by Daemon Fire & Security, based on an AMG Systems-supplied Ethernet switch network, is helping to protect the UK’s first new inland rail freight hub for over a decade: iPort Rail. The iPort project near Doncaster, South Yorkshire, offers 6 million square feet of space across 337 acres. The massive park is already home to enormous distribution facilities for companies like Amazon, CEVA, Fellowes and Lidl, and its occupancy is set to expand in the coming years. The newly developed iPort Rail terminal, located on its own 30-acre site within iPort, is connected to the electrified East Coast Main Line via the South Yorkshire Joint Line. It offers integrated access to iPort, meaning occupiers can directly approach the rail terminal using their own specialist vehicles on the facility’s private roads. Implementing video surveillance system The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System"The terminal can handle up to six trains a day, operating 24-hours, six days a week. Each train can be the maximum UK length of 775m. iPort Rail has an 800m reception siding and two 400m handling sidings, with storage capacity for 1,500 shipping containers. With iPort Rail playing such a crucial role in developer Verdion’s iPort transportation strategy, there was a pressing need to ensure that the terminal has effective ongoing video monitoring. Buckingham Group Contracting Ltd was responsible for the work on iPort Rail, and they worked with CCTV specialist Daemon Fire & Security to implement the video surveillance system for the perimeter of the terminal. Chris Tattersall, Technical Director at Daemon, said the system runs on a redundant fibre optic network. “AMG Systems assisted us with the fibre optic network design.” Tattersall said. “The cameras we are using are from Bosch, and they are monitored and recorded using the Bosch Video Management System. The cameras are on towers from Altron, and the networking is from AMG.” Cameras for intrusion detection The cameras utilise Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through"There are 32 cameras mounted on 18 towers around the rail terminal site perimeter. Tattersall explained that the cameras are primarily used as detectors to monitor for trespass or intrusion. “The cameras utilise Bosch analytics, monitoring the perimeter fence for people approaching and trying to climb over or cut through,” he said. “The cameras are monitored live by the 24-hour security team in the site gatehouse. The system is networked using equipment and expertise from AMG Systems. Daemon and AMG designed a failsafe fibre optic ring system together,” Tattersall said. “From the gatehouse there’s a fibre optic cable which goes and loops around every camera tower and goes back to the gatehouse,” he said. “It’s a redundant ring, so if they get a fault or deliberate cut, everything will carry on working. We’re using industrial PoE Ethernet switches in the towers so they can withstand low temperatures, which is particularly important during cold winters in a relatively open site like this.” Operative in extreme temperatures The industrial managed switches are able to operate in temperatures ranging from -40 deg C to 75 deg CThe industrial managed switches, 20 of which were used in this project, are able to operate in temperatures ranging from -40 deg C to 75 deg C and are designed for medium to large network environments to strengthen network connections. AMG Business Development Director Sara Fisher said AMG was thrilled to be involved in this project. “We were delighted to be asked by Daemon to contribute our design and product expertise to help protect this important and growing freight hub,” she said. Daemon’s video surveillance project took around 10 weeks in total, including implementation and commissioning. It was handed over on time and installed on target. Tattersall said the smooth running of the project could be put down to Daemon’s good working relationship with contractor Buckingham, distributor Pro-Vision, networking and transmission expert AMG Systems, and product suppliers Bosch and Altron.
The Eurofighter will be equipped with a new generation of radar which will enhance the aircraft’s capabilities and survivability. In the Euroradar consortium, the sensor solutions provider HENSOLDT is pressing ahead with the development of the Eurofighter’s new Captor-E radar system. Following the successful acceptance test, HENSOLDT has now delivered the second antenna ready for series production to Leonardo UK in Edinburgh. This means that the production of the so-called e-scan antenna can commence at the HENSOLDT site in Ulm/Germany according to plan. This paves the way for the delivery of the first radar systems as of mid-2019. Resource management As early as spring 2018, the radar has successfully completed two flight campaigns at British Aerospace Systems (BAES) in Warton and at Airbus Defence and Space in Manching and met the requirements of the Critical Design Review (CDR) exactly on schedule. The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter. Electronic beam scanning combined with flexible radar resource management provide outstanding detection performance and ensure simultaneous multi-target tracking, missile guidance and perception of the situation. The Eurofighter’s nose is larger than that of all the comparable fighters, which means that the antenna is much larger and consequently more powerful than that of competing aircraft. Radio-frequency components This, together with the ability to mechanically rotate the antenna with a larger angle of view, increases both the detection area and the field of regard in comparison with the AESA radar systems used by the competitors. The further development of radar technology is one of the main focal points of the sensor specialist HENSOLDT. For this reason, HENSOLDT operates one of the largest cleanroom production lines for radio-frequency components in Europe. HENSOLDT’s radar systems are deployed worldwide by armed forces, including the US and German Navy, as well as at the bases of the Canadian, Australian and German Air Force. The Eurofighter radar is being developed by the Euroradar consortium comprising Leonardo (Great Britain, Italy), Indra (Spain) and HENSOLDT (Germany). The consortium has already developed and produced more than 400 Captor radars.