Despite the challenges resulting from the COVID-19 pandemic, nearly four in five video security systems-related businesses reported growth in the past 12 months, according to a 23-nation survey conducted by Calipsa, the market renowned provider of Deep Learning-powered video analytics. Slightly less than half of the businesses reported growth in a 2020 report. Calipsa 2021 Video Monitoring Report The Calipsa 2021 Video Monitoring Report is a look inside the industry and its biggest trends. The...
With its major global Innovation Splash in November, MOBOTIX AG is placing 18 new hardware and software solutions on the market at once. New products The first hemispherical camera that combines infrared and LED white light in a single system is a major highlight. In addition, there is a new convenient dome camera, hemispherical modules, and Thermal CIF modules specially designed for perimeter protection for the MOBOTIX7 cameras with up to 105° wide angle of view (FoV). A fiber optic...
Metal theft is nothing new, but the impact of the pandemic has left many in financial uncertainty, couple this with the rising price of metal, and one result is an increase in the level of acquisitive crime. It seems there is no limit to the types of materials stolen. Just recently, lead stolen from church roofs has caught the media’s attention again, but this type of theft reaches to more commonplace materials too, including steel, cast iron, and aluminium, and even items like street sig...
Hikvision, a pioneer in delivering high-performance professional security solutions with tremendous value, announced it has elevated three sales engineers to expert level based on dedication in the field. These three professionals were designated from the company’s established team of engineers across the U.S. and reinforces Hikvision’s support for its extensive base of dealers and customers across North America. Possible security solutions “Our team of sales engineers help...
Ava Security has launched the ability to use third-party sensors with Ava Aware Cloud, the open data platform for building and facilities intelligence. By merging video security with sensor technology, organisations can unlock the enhanced situational awareness of security along with facility management, staff well-being, and productivity. Open Ava Aware data platform Siloed unconnected systems are a big challenge for organisations seeking greater insights and better building security....
HID Global, the pioneer in trusted identity and RFID tracking solutions announced the release of LinTRAK XS, its extra small RFID UHF RAIN transponders designed for discreet insertion into small textile items. HID Global is a pioneer in trusted identity and RFID tracking solutions. The company has extended its LinTRAK ultra-high frequency (UHF) radiofrequency identification (RFID) tags for linen management to include an extra small form factor option, ideal for discreet attachment onto small te...
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced they are demonstrating the new Speedlane Compact for the first time on the east coast in booth #1119 at the ISC East exhibition in New York City, NY. ISC East is the largest security trade show in the Northeast region of the US, bringing together thousands of security and public safety professionals with hundreds of leading security brands for the 2-day event. Boon Edam is also the official turnstile sponsor of the show, which runs from November 17-18. “We’re looking forward to connecting with the security community again at ISC East this year,” said Valerie Currin, President, Boon Edam. “The show is the ideal venue to introduce our Speedlane Compact to the East Coast.” Convenient security ideal for small spaces The Speedlane Compact is easy-to-use, easy-to-install, and agile in the manufacturing process, enabling faster delivery times to a customer’s location. The product designers have focused on ease and flexibility when it comes to integration: the cabinets are wide enough to allow for integration with many types of access technologies, including biometrics and facial recognition. The Speedlane Compact is fashioned to fit into small areas, making it ideal for high-value real estate properties. It does an effective job within a very small space – relieving security personnel and ensuring that only authorised people can enter the designated area. Its small footprint does not compromise in any way on design.
Amthal is celebrating its landmark 21st anniversary, and growth from a two-man residential security company to a 50 strong team, integrated fire, and security specialist. Launched in 2000, by close friends John Allam and Paul Rosenthal, Amthal now has over 50 members in the team and operates on a Europe-wide basis providing installation maintenance and monitoring services across all commercial, residential and public sectors. In 2008, Jamie Allam joined the management team to become Commercial Director and created the structure to drive an ambitious growth plan incorporating all aspects of the business, from operations, through sales and commercial targets. Fire and security services We have shifted our focus to a total solution provider for clients to deliver full fire and security services" Says Paul Rosenthal, Founder and Sales Director of Amthal Fire & Security, “Since we opened our doors at the turn of the century, we have grown with our clients, always taking a proactive approach to adaption, whatever the economy and even most recently, the pandemic has thrown at us!” “We have also undergone our evolution, shifting our focus to a total solution provider for clients to deliver full fire and security services. But underneath it all, we have remained independent and our mission, vision, and values reflect our status as a family business. It makes me so proud at 21 years, to see how far we have come and excited for the future as we continue our strong track record of success.” Amthal has had an impressive lead up to its 21st anniversary, most recently securing projects in Europe and being certified and approved as a Honeywell Gent system integrator. Fire Safety And Security Jamie Allam, CEO Amthal Fire & Security added, “Amthal has grown together – as people and as a company – and I am so proud of what we have become, and our place in the sector. Knowing as a team, we are being recognised for our complete approach from initial design to project completion, and focus on compliance and offering the latest technology is unsurpassable.” We look to the future with a focus on sustainably, creating collaborative ways to meet the huge demand" “That’s what has led us to be at the forefront of fire safety and security, where we are determined to stay for another 21 years and beyond. We look to the future with a continued focus on protecting what’s precious, sustainably, creating collaborative ways to meet the huge demand we have for our services at present. We have set the benchmark high, but you can always aim higher and we have so many exciting opportunities ahead of us.” End-user experience Independently owned, Amthal Fire & Security is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service, and remote monitoring of advanced electronic fire & security solutions, including intruder, fire, access, and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
The New DICE Corporation announces Calipsa’s false alarm filtering solution is integrated with Matrix Interactive. While the two companies both offer video analytics, the integration provides central stations and integrators that are already using Calipsa’s solution with the option to add advanced interactive and video services from Matrix Interactive. It will also allow DICE users to benefit from Calipsa’s pioneering AI technology. An open and generic platform With an open and generic platform developed by the New DICE, the integration works with any monitoring automation software and is an opportunity to add value for monitoring stations or command centres in a corporate, education, or healthcare venue. Calipsa’s analytics software for video surveillance uses deep learning algorithms to filter out false alarms Calipsa’s analytics software for video surveillance uses deep learning algorithms to filter out false alarms caused by anything from a change in lighting to a spider’s web across a lens, with a false alarm reduction rate of 95%. Central monitoring solution Matrix Interactive offers central stations and command centres a video event monitoring, surveillance, and alarm notification suite for any video system that is accessible from any location, at any time. The unified platform provides services such as video verification, remote guarding, virtual guard tours, and virtual doorman; all using advanced video analytics, artificial intelligence, and cloud recording of events. With an overabundance of cameras and recorded video, the security industry is seeing a greater rise in video monitoring. By integrating Matrix Interactive with Calipsa, monitoring stations and command centres will have the opportunity to add new levels of security into their monitoring operations. Real-time video streaming For instance, with Matrix Interactive’s verified automated scheduled video tours, the platform analyses understand and prioritises the video stream in real-time. If nothing is detected during the tour, there is no need for operator intervention. The priority level determines if the video is sent to an end-user, a central station operator, and/or is recorded. Matrix platform offers a multi-camera video quick search feature that can instantly search through multiple cameras The Matrix platform also offers a unique new multi-camera video quick search feature that can instantly search through multiple cameras for an event rather than camera by the camera. Central stations and command centers can begin with an entry-level package at a minimal investment that provides fast ROI, and then add more cameras, services, and modules when ready. Enhanced security standards "The New DICE is a fantastic partner and integrating Calipsa’s analytics into the Matrix platform offers us great potential in all the markets we serve,” said Brian Baker, Chief Revenue Officer at Calipsa. “Matrix Interactive will allow Calipsa users to not only benefit from our 95% false alarm reduction but will also add its additional features to further enhance security standards. This partnership is a significant step in defining our footprint in the central station and command center market.” “DICE is continuing to partner and integrate with the top industry solutions, and we are proud to partner with Calipsa,” said The New DICE Corporation Co-President Avi Lupo. “We spoke with many Calipsa customers who are very happy with Calipsa but were looking for a seamless integration with Matrix Interactive to take advantage of its advanced video features and services, in addition to the Calipsa analytics.”
The new Bosch Training and Experience Centre in Bentonville, Arkansas showcase immersive displays of the company’s latest offerings. Now open for private sessions, the centre offers demonstrations of how Bosch systems for video security, access control, intrusion and fire detection, and communications integrate seamlessly together to provide solutions that increase security and safety, facilitate more efficient monitoring and control, automate audio announcements, and provide data for business intelligence. Advanced security technology AIoT, which is the next-generation IoT combined with AI, is driving innovation in security technology" “AIoT, which is the next-generation Internet of Things (IoT) combined with artificial intelligence (AI), is driving innovation in security technology,” said Brian Wiser, President of Bosch Security and Safety Systems, North America. “Hands-on experience is vital to the adoption of these advanced technologies, and our new centre offers customers a private setting to explore solutions that can help them responds to possible risks before situations occur and gather business data for informed decision-making that goes beyond security.” Solution demonstrations Visitors to the centre will see how Bosch video cameras feature built-in AI to extend the devices beyond their traditional uses, including for improving health and safety in a facility. One demonstration simulates a blocked emergency exit door to show how Bosch AIoT cameras will trigger an alarm within the video management system, an event at a nearby intrusion system keypad, and a warning message to play in the area using a Bosch public address system. These actions triggered by the camera ensure the situation is resolved faster, improving safety. Tracking occupancy Bosch AIoT video systems installed in the centre also demonstrate how customers can track the occupancy of space for adhering to health and safety regulations, detecting crowds, or ensuring adequate staffing of a facility. Bosch Intelligent Insights software aggregates data, such as counts of people or vehicles, from multiple cameras to give users a complete view of a situation in real-time. This helps users react quickly to events that need to be addressed and make decisions based on the latest information. Video management system Demonstrations include solutions for securing high-risk areas, capturing data for business intelligence For retail stores, bank branches, and similar applications, visitors can see how pressing a cashier station panic button or pulling a bill from a bill trap sensor connected to the intrusion system will display an alarm and video in the Bosch video management system as well as trigger a Telex Radio Dispatch system to announce store or bank personnel’s two-way radios. This alerts security personnel that an issue is ongoing, so they can respond faster to help diffuse high-risk events. Other demonstrations include solutions for securing high-risk areas, capturing data for business intelligence, monitoring critical systems, including refrigerated cases and freezers in retail stores, and more. Technology training The new training and experience centre also includes a training facility, adding a central location for customers to attend technical training through the Bosch Academy. The Bosch team of trainers will provide customers with hands-on product education to enable integrators to install and run complex projects more efficiently and profitably. Open for visitors System integrators, end-users, consultants, and other industry professionals interested in a private demonstration session at the new Bosch Training and Experience Centre in Bentonville, Arkansas, can contact their local Bosch sales representative to schedule a visit.
Brivo, Inc., the global pioneer in cloud-based access control and smart building technologies, and Crown PropTech Acquisitions (“Crown”), a publicly-traded special purpose acquisition company, today announced that they have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” This strategic business combination will enable Brivo to leverage Crown’s experience and relationships as an owner and operator of commercial real estate to accelerate market expansion. Since its founding in 1999, Brivo has pioneered and defined the cloud-based access control category. Brivo’s leadership was instrumental in transforming the security industry, which at the time was dominated by on-premise client-server technology, and has achieved remarkable growth with the innovative cloud-based hardware and software solutions it began rolling out in 2002. Commercial real estate Brivo expects to benefit from the dramatic increase in smart space adoption driven by the PropTech boom Today, Brivo builds and sells Software-as-a-Service-based (SaaS) building access management services and innovative connected devices to enterprises and property owners through over 1,500 channel partners. These partners provide local sales, service and installation across all classes of commercial real estate including office, industrial, multifamily and retail properties. As it continues to scale, Brivo expects to benefit from the dramatic increase in smart space adoption driven by the PropTech boom, the growing customer preference for cloud-based services, the new normal in safety and health, and a shift in security integrator channel sentiment – which has swung from 20% to 75% in favor of the cloud over the last five years. Greystar Brivo has become the single largest access control system in the world, serving a large, diversified global customer base of more than 44,500 customer accounts comprising over 300 million square feet of commercial property, 330,000 doors and 23 million credentialed Brivo users across 42 countries, all 50 states and Puerto Rico. Corporations and owners and operators of commercial real estate that use Brivo’s technology and services include Greystar, Whole Foods, NTT, DocuSign and Realogy. Brivo’s foundational platform for smart spaces includes access management, sensor monitoring, visual awareness, visitor and delivery management, and AI-driven data analytics, providing customers with all the core functionality required to operate, glean valuable insights, and optimise the performance of their buildings. Brivo’s sustained double-digit annual growth has been driven by constant innovation Brivo’s sustained double-digit annual growth has been driven by constant innovation coupled with a focused land and expands strategy that has successfully increased annual recurring revenue over time by scaling customer adoption of products and services. Future financial performance The company’s extensive channel partner ecosystem is a key differentiator that allows Brivo to achieve attractive unit economics that drives highly productive and profitable customer relationships, with a compelling lifetime value (LTV) to customer acquisition cost (CAC) ratio of 6.1x. The company has significant organic growth opportunities with strong visibility into the future financial performance from its high-retention SaaS-based model. “Brivo is unique not only in that we created the category-defining smart spaces platform, but that our products and services are foundational systems within our customers’ buildings, ensuring the safety and security of their tenants, residents and employees,” said Steve Van Till, Founder and CEO of Brivo. “We have more experience executing on a cloud-based access control model and successfully creating innovative smart devices than any other company in the world.” Cloud-based access control platform Brivo has demonstrated its value through its strong subscription revenues" “This is demonstrated by our market position and channel penetration vs other cloud-based access control providers. We have a track record of innovation, a network of sales and service channel partners, and direct insights into the needs of customers across all classes of commercial real estate – including enterprise, which is a meaningful differentiator for Brivo." "We are entering our next phase of growth as a public company supported by favorable secular tailwinds driving a smart spaces revolution, and Brivo is uniquely positioned to continue to capture the growing opportunity as we realise exceptional customer buy-in, continued expansion and high levels of retention.” High-quality products Dean Drako, Chairman of Brivo, added, “Brivo is the most sophisticated and mature cloud-based access control platform on the market and enjoys a highly compelling growth trajectory. This transaction will provide us with a significant source of capital to continue to fuel innovation and introduce high-quality products and services that protect lives and assets. Brivo is truly first and best in class, with a significant head start on others that have more recently entered this rapidly growing space. We look forward to continuing to set the industry standard and expand our position as the category leader.” Golub Capital Credit Opportunities has agreed to lead $75 million Richard Chera, Chairman and CEO of Crown PropTech Acquisitions, commented, “As an owner and operator of a sizable portfolio of commercial properties, we recognise the significant value Brivo brings to the ecosystem, and we believe there is a compelling opportunity to leverage our experience and relationships to further establish the company as the pre-eminent provider of cloud-based access control and smart building technology." "Brivo has demonstrated its value through its strong subscription revenues, retention rates, network of channel partners, and successful land and expand strategy, creating a highly loyal customer base. We look forward to supporting Steve and the team as they advance their strategic priorities.” Transaction Overview Golub Capital Credit Opportunities has agreed to lead $75 million in a convertible note to the combined company that will close concurrently with the business combination subject to satisfaction of related conditions. Eagle Eye Networks is also a strategic investor in the PIPE. There is approximately $276 million currently held in Crown’s trust account, subject to any redemptions by Crown shareholders. Existing Brivo shareholders will roll over 100 percent of their equity, retaining 69 percent ownership in the pro forma company. Assuming no redemptions, Crown shareholders will own approximately 31 percent of the combined company. The business combination will provide Brivo with up to $304 million of capital to advance its mission “We are excited to provide a highly structured and flexible financing solution to support Brivo, the market-leading provider of cloud-based access control solutions in the enterprise and commercial segments,” said Marko Soldo, Head of Golub Capital Credit Opportunities. “We think Brivo’s strong management team, coupled with Crown’s deep experience in real estate and the leadership of a proven serial technology entrepreneur like Dean Drako make for a world-class combination.” SaaS service expansion The business combination will provide Brivo with up to $304 million of capital to advance its mission of delivering the highest quality products and services to protect its customers and to fuel growth via the expansion of sales and marketing, customer acquisition, SaaS service expansion and product development, with the actual amount of capital provided depending on the level of redemptions by Crown shareholders. The company has a substantial runway within its current user base and a focused commercial strategy to drive market penetration and upselling. Brivo expects to generate $417 million in revenue and an annualised $290 million in annual recurring revenue in 2025, representing 2021E to 2025E CAGRs of 55% and 70%, respectively. Brivo’s proven management team – including Van Till, COO John Szczygiel, CFO Mike Voslow and CTO Jeff Nielsen – will continue to operate and manage the combined company following the transaction. Dean Drako, the founding CEO of Barracuda Networks, will continue to serve Brivo’s chairman of the board. The boards of directors of Brivo and Crown have unanimously approved the business combination. The transaction will require the approval of the stockholders of Crown and is subject to other customary closing conditions, including the receipt of certain regulatory approvals. The transaction is expected to close in the first half of 2022.
Professionals in charge of delivering smart and safe city programs can now accelerate the review of camera footage, more rapidly identify risks to public safety and infrastructure, and easily derive valuable operational intelligence from video content. This is due to a new bi-directional analytics-driven integration between BriefCam and Synectics’ Synergy command and control platform. Decreased footage review time In addition to allowing control room teams to apply sophisticated video analytics filters – colour, face matching, the direction of travel for vehicles, clothing attributes, etc. – to surveillance footage, the integration enables rapid footage review by presenting objects and events of interest (that appeared throughout a filtered period) on-screen simultaneously. Authorities can dramatically reduce the amount of time and effort needed to investigate footage" “The advantage”, explained Synectics’ Product Manager, Sree Namelil, “is that authorities can dramatically reduce the amount of time and effort needed to investigate and interrogate footage - a huge benefit for teams tasked with monitoring and managing hundreds, if not thousands of cameras. These are the teams tasked with protecting the public.” Real-time alerts The solution also allows users to receive real-time alerts when specific, pre-defined analytics criteria are met; for example, the detection of certain matches for face images, vehicle license plates, or people counts. On receipt of the alert, users then can easily access the footage to quickly attain situational awareness, monitor events as they unfold, and make informed decisions about how to respond. Analytics-based alerts can also be used to trigger dynamic workflows to support effective management of the specific scenario in question, from dealing with potential COVID-related overcrowding risks to coordinating a multi-stakeholder response to a criminal event. Risk identification and response Any organisation that needs critical information when time is of the essence, can get what they need as quickly as possible" Commenting on the development, Meni Besso, Senior Product Manager, BriefCam said, “BriefCam is the industry-leading provider of powerful analytics. Synectics, with their Synergy platform, specialises in making risk identification and incident response easier.” “Integrating our respective technologies means that cities, law enforcement, and any organisation that needs critical information when time is of the essence, can get what they need as quickly as possible to take decisive action.” Applications of command and control platform Additionally, the integration has significant implications for intelligence-driven town and city planning as it supports the secure, data protection-compliant ‘mining’ of historical video footage for trends and insights vital to future ‘Safe City’ developments. Sree Namelil added, “What areas need more community support officers? Which access routes to bus and train stations need to be redeveloped to cope with changing foot traffic? Where might additional street lighting help to reduce crime rates? Thanks to this new development, the answers are just a few clicks away.”
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders. In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero. Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually. Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.” Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.” “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.” Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs. Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.” A simple but effective fraud Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes. A primary risk is SIM Box fraud. SIM Box fraud SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal. The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.” While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box. Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.” Is it illegal? If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service. For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.” “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.” Other telecommunications fraud Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market. While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion. The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.” “The call starts as a dialled telephone call, but the user receives it within an OTT app. If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.” Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.” According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”. This is defaulted to “on” when the app is downloaded. Only the most technologically savvy users would even know it was there. Combatting the fraud against networks Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud? The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.” “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible. This has led to a mindset where whatever the questions the answer is always more marketing promotions.” A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return. An opportunity for the future As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.”
Recently, the European Parliament called for a ban on police use of facial recognition. In the US, too, some cities have restricted police use of facial recognition. The first question that comes to mind is - why ban police from using technology that is allowed to private companies? Point of difference The key difference between the way police use facial recognition and the way commercial facial recognition products work is that: The police get a picture of a suspect from a crime scene and want to find out: "Who is the person in the picture?" That requires as wide a database as possible. Optimally - photos and identities of all the people in the world. Commercial facial recognition products such as those used by supermarkets, football stadiums, or casinos answer different questions: "Is the person in the picture on the employees' list? Is the person in the picture on a watch-list of known shoplifters?" To answer these questions doesn't require a broad database but rather a defined list of employees or a watch-list of specific people against whom there is an arrest warrant or a restraining order. Use of facial recognition AnyVision helps organisations leverage facial recognition ethically to identify known persons of interest "Facial Recognition Apps Should Be Provided to the Police with an Empty Database". This is exactly the subject of the open letter sent by AnyVision, to the British Biometrics and Surveillance Camera Commissioner, Prof. Fraser Sampson, titled: "Facial Recognition Apps Should Be Provided to the Police with an Empty Database". AnyVision recently raised $235M from Softbank and another leading VCs is a visual AI platform company that helps organisations across the globe leverage facial recognition ethically to identify known persons of interest, including shoplifters, felons, and security threats. Ethical use of facial recognition AnyVision CEO Avi Golan wrote, "The ethical use of facial recognition is a thorny one and requires a nuanced discussion. Part of that discussion has to explain how facial recognition works, but, just as important, the discussion must also involve how the technology is used by police departments and what checks and balances are built into their processes.” “We recommend building their watchlists from the ground up based on known felons, persons of interest, and missing persons. Some facial recognition solution providers have scrapped billions of photos and identities of people from social networks, usually without their consent." "Unfortunately, this method of facial recognition has justifiably angered privacy groups and data protection agencies around the globe and damaged the public trust in accuracy and reliability of facial recognition systems.” Preventing invasion of citizen’s privacy We believe an unjustified invasion of citizens' privacy can be prevented, false arrests can be reduced" “We believe that lists of suspects should be limited and justified. In this way, unjustified invasion of citizens' privacy can be prevented, false arrests can be reduced and public confidence in technology can be increased.” Golan added: "AnyVision is willing to share its industry insights and best practices from our vast research experience with leading global players, including name-brand retailers, global hospitality and entertainment companies, and law enforcement agencies from around the world.” Balancing public order and crime prevention “If the regulations set forth by Surveillance Camera Code of Practice are committed to the principles outlined above, then law enforcement agencies can strike the right balance between the need to maintain public order and prevent crime with the rights of every person to privacy and non-discrimination before the law." Recently Clearview AI CEO told Wired; the company has scraped 10 billion photos from the web - 3 times more than was previously known.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defence to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximise the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot programme is the 250,000-square-foot HID Global facility in Austin. For the pilot programme, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 white papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
In the beautiful marina in the Danish city of Vejle, Vanderbilt’s ACT365, a cloud-based access control and video management system, was recently installed. The brief The marina wanted an access control system that could integrate with their booking system, Harba. Solutions provided There are 750 members with boats in the Vejle marina, and through the Harba booking system, they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. This is done by simply typing their PIN into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Why choose Vanderbilt? Vanderbilt’s ACT365 readers are made of robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has: A modern and user-friendly design A limitless number of users The possibility for short-term access Both RFID tags and smartphone access availability. Main takeaway For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
Nestled on the Western shore of Lake Como, the Grand Hotel Victoria in Menaggio is one of the latest 5-star luxury properties in the Larian landscape. The magnificent resort in Art Nouveau style, which encompasses a late 19th-century palace and a former monastery, has been completely renovated to host 81 rooms, lush gardens with pool, more than 2,000 m2 spa, 2 restaurants, and 90 car places in the underground parking. End-to-end security solutions The Grand Hotel Victoria in Menaggio, wedged between the lakeside and the heights of the Lepontine Alps, promises its guests a unique experience. To make this happen, it is essential to improve the security level. Dahua Technology is a world-pioneering video-centric smart IoT solution and service provider. Based on technological innovations, it has offered end-to-end security solutions, systems, and services to create value and solve problems for clients. This is why the hotel management entrusted Dahua and MD Impianti – its system integrator partner – the realisation of the perimeter and indoor surveillance system. AI-based cameras and deep learning With deep learning, Dahua Perimeter Protection technology can recognise humans and vehicles accurately In the solution provided by Dahua Technology, 15 units of IPC-HFW5241E-ZE 2MP bullet cameras with 2.7~13.5 mm motorised varifocal lens of Dahua WizMind series – equipped with various AI functions such as perimeter protection and people counting – were installed to guard the outside of the building providing clear images even in the low-light environment due to IR LEDs (range up to 50 m), WDR (120 dB) and Starlight technology (till 0.0002 Lux before switching to B/W). With the deep learning algorithm, Dahua Perimeter Protection technology can recognise humans and vehicles accurately. In the restricted areas (such as pedestrian areas and vehicle areas), the false alarms are largely reduced. Dahua Lite series network camera After crossing the main entrance surmounted by a balcony that rests on four Doric columns, no less than 110 units of IPC-HDW2431T-AS-S2 4MP eyeball network cameras – featuring IR LEDs and Starlight themselves - discretely watch over the premises of the historical and new wings. With upgraded H.265 encoding technology, the Dahua Lite series network camera has efficient video encoding capacity, which saves bandwidth and storage space. This camera adopts the latest Starlight technology and displays better colour images in the condition of low illumination. Enterprise-level NVR NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage Two 128-channel NVR608R-128-4KS2 network video recorders with 8 hard disks and redundant power manage all streams, while the networking was implemented with ePoE, PoE, and aggregation switches, connected by CAT6 cables and optical fiber. For applications where details are critical for identification, this enterprise-level NVR provides a powerful Intel processor with up to 4K resolution. Additionally, the NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage, and backup storage. Remote monitoring All images collected by the whole system can be visualised both in the concierge and remotely. The latter is a feature that allows great flexibility to meet the needs of the end-user, who is already evaluating the integration of DSS centralisation software and a video wall. The system protecting the prestigious Gran Hotel Victoria in Menaggio demonstrates once again how Dahua Technology, along with its partners and supply chain, is capable of providing high-profile and tailor-made integrated security solutions, suitable for any scenario and compliant with current legislation.
Salient Systems, a pioneer in open architecture video management systems, has announced that its CompleteView VMS, an open platform video management system has been selected by Maine-based Brigid Farm for a multi-state video upgrade project for the company’s cannabis facilities. With headquarters in Saco, Maine, Brigid Farm is a vertically integrated cannabis firm that has been providing cannabis products for more than a decade. The company has recently expanded its operations to include multiple grow fields, an edible manufacturing facility, and two retail stores – a total of eight locations in Maine and one in Massachusetts. Remote and centralised monitoring As each location poses its security challenges, Brigid Farm chose the robust, open platform CompleteView VMS to enable remote access to and centralised management of video from all the company’s locations, including its retail operations, The Farm Stand, and The House of Hash. We were looking for a robust VMS that could help us easily monitor all of our operations from anywhere" “Given the heightened security concerns in the cannabis industry, and the unique security needs for our different locations, we were looking for a robust VMS that could help us easily monitor all of our operations from anywhere,” said Brett Messer, owner, and general manager of Brigid Farm. “It was vital for us to have an open system that can accommodate our future technology needs and expand as our company grows.” Integration software and LPR Brigid Farm also selected CompleteView for its ability to integrate with several other key operational technologies, including license plate recognition (LPR) to monitor daily incoming and outgoing deliveries, point of sale software for retail transactions, and the cannabis industry seed-to-sale tracking software, which cannabis businesses use for regulatory compliance. “Our CompleteView VMS is widely used in the cannabis market as it is uniquely positioned to solve pain points for cannabis operators,” said Sanjay Challa, chief product officer, Salient Systems. “We’re excited to work with Brigid Farm to fulfill their integrated video management needs and provide them with operational visibility across their enterprise.”
Real-time access control can enable facility managers to get ahead of security problems, rather than wait for them to get worse. Yet traditional wired access control can be expensive and disruptive to install. Wireless Aperio locks — installed cable-free and integrated online — add this real-time control to more doors at a much lower cost than equivalent wired door locks. Why do security managers increasingly prioritise online access control? Because real-time management of an online system enables them to solve a minor issue before it creates a problem. Online control keeps site users safer and ensures an organisation’s valuable equipment and data are protected. Maintaining site security When someone loses their credential, online integration enables facility managers to cancel its permissions and blacklist it right away. Nobody needs to visit a door or system updater. Online access control maintains an overview of site security in real-time, with the ability to create audit trails for any lock or user on demand. Security staff can always find out who went where, and when — now, not an hour ago or yesterday Security staff can always find out who went where, and when — now, not an hour ago or yesterday. With online access control, they can also gain remote control over entrances and exits, which could be critical in an emergency. Aperio battery-powered locks with integrated RFID-Readers are built on an open platform, online (and offline) integration with almost any new or existing security system is seamless. One sentence about the function of the hub. Online access control Aperio wireless locks already enhance security with real-time, online access control in healthcare, education, corporate, governmental and commercial premises all over Europe. As a provider of future-oriented business education, The Camp sought an access solution as forward-thinking as their courses. Aperio wireless locks integrated with a TIL Technologies system enable real-time management of the site, with profiles to segment individuals who need fine-grained access to specific areas. “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. A few clicks are all it takes to cancel a lost key-card and issue a replacement. Card-based locking technology Plexal offices are equipped with Aperio’s wireless, access card-based locking technology “Online mode is very important because [access] rights are very often updated for the constantly shifting campus population,” adds Ciotto. “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” At Plexal in East London, enterprise and academia work together, with technology companies, start-ups, universities and creative under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Plexal offices are equipped with Aperio’s wireless, access card-based locking technology. Plexal’s Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. Monitoring building information To date, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with the highest levels of physical protection and transmit door status to DoorFlow — all in real-time. The Centre Hospitalier Universitaire (CHU) de Grenoble occupies a site that’s open to the city The Centre Hospitalier Universitaire (CHU) de Grenoble occupies a site that’s open to the city. Quite literally: it has no enclosing walls. With so many people on the premises each day, property theft had become widespread. CHU’s 7,800 employees needed reassurance that their belongings, as well as those of visitors, were well protected. A modest outlay on 20 Aperio wireless cylinders and escutcheons, integrated online with a Castel access control system, transformed hospital security. Aperio’s immediate impact was to drastically reduce theft. Online integration ensures hospital managers monitor building information in real-time — even removing key-cards permissions remotely when required. Replacing mechanical locks Crous Montpellier fixed their recurring lost key problem by replacing mechanical locks with Aperio cylinders. Now 1,500 wireless Aperio cylinders are integrated online with their ARD security system, giving facility managers a live overview of accommodation security. When a student loses their key-card, it’s simple for a site manager to cancel the old credential and issue a new one. Because Aperio integration is online, managers block lost credentials quickly using the software, without visiting the door. It is just as easy to de-authorise credentials for students who leave, even if they forget to return their smart-card. An administrator simply removes them from the system database and they are locked out. Online integration saves Crous time and money. Access control solution The campus is now equipped with Aperio cylinders and electronic handles with built-in RFID readers Every day around 7,000 people pass through Aix-Marseille University’s suburban Luminy campus. As part of a modernisation project, managers sought a retrofit-ready access control solution to upgrade security for two buildings. The campus is now equipped with Aperio cylinders and electronic handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with an ARD access control system. Online Aperio integration gives staff a ‘live’ overview of the campus, so they can respond proactively. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” says Cédric Lopez, Maintenance Manager at Luminy. One key metric for new locking was to deter theft, which was becoming a problem in teaching areas with computers. “Since we installed Aperio, we have not had a break-in,” adds Lopez.
Australian systems integrators can now deliver a new generation of seamless, end-to-end security solutions powered by Quanika’s Enterprise and VisitorPoint software, following a distribution agreement between the two companies. Quanika Enterprise enables out-of-the-box integration with world-pioneering tech from Axis Communications including its full range of network cameras, door controllers, and audio devices as well as a choice of video management software. Users can connect, off-the-shelf a range of popular third-party systems from intruder and fire detection and site-specific applications and widely used databases, such as Microsoft Active Directory. Unified security management Quanika’s modular approach is more affordable and flexible than traditional enterprise-level integrated solutions and its access control and visitor management software works seamlessly with Axis Communications’ hardware, and a wide choice of video management software (VMS) including AXIS Camera Station, Milestone, and IPConfigure, to give users a unified security management platform. Quanika’s VisitorPoint visitor management software is also being used by organisations to combine increased security with improved access convenience for visitors, staff, contractors, and deliveries. Through access digitisation it is automating workflows, eliminating siloed systems, and helping organisations adapt to more flexible and hybrid working patterns. Integrated solutions Quanika’s integration model combines off-the-shelf affordability with bespoke tailoring is being deployed globally" The distribution agreement covering Australian markets positions SensaTek to deliver complete integrated solutions to meet the security, safety, and operational demands of businesses of any size including single facilities, campuses, and multi-site applications in the healthcare and logistics sectors. “Quanika’s integration model, which combines off-the-shelf affordability with bespoke tailoring whenever required, is being deployed in settings globally including hospitals, global logistics operations, retail, manufacturing, and leisure,” says James Robinson, Senior Business Development Manager, SensaTek. “It’s helping organisations improve security and drive up efficiency by moving away from stand-alone, siloed systems. We are looking forward to delivering the same benefits to Australian customers too.” Security and safety Quanika Enterprise offers an intuitive security and safety management platform that integrates advanced access control functionality with video and wider building management and popular databases, including Microsoft Active Directory, that gives organisations single and multi-site management and control and the flexibility to orchestrate change and adapt to the latest security, safety, and operational requirements. “As well as the advantages of affordable integration with off-the-shelf software, Quanika offers the ability to quickly add new integrations to meet site-specific challenges,” says Phil Campbell Sale Director, Quanika. “In line with our expansion in other markets we are delighted now to be working with SensaTek to deliver a new generation of affordable integrated solutions across Australia.”
Bird Home Automation, a Berlin-based manufacturer of ‘DoorBird’ IP access control devices, is expanding its product portfolio to include door intercoms with an integrated fingerprint sensor module, from Fingerprint Cards AB (Fingerprints), in its D21- series. With a DoorBird door station, homeowners and residents can see and speak to visitors like delivery services on the go via their smartphones and manage access by unlocking the door when needed. Features of door intercom Each door intercom features an HD wide-angle camera, motion sensor, and audio system with echo and noise cancellation. Existing keyless access control options via RFID or PIN code are expanded with biometrics by Fingerprints. The fingerprint module is fully integrated into the DoorBird software architecture and can be configured remotely, via app or web-based dashboard, at any time to grant and withdraw access permissions. Fingerprints' technology is characterised by superior biometric performance and security" Integrated biometric fingerprint sensor "Thanks to the cooperation with Fingerprints, we can fulfil many of our customers’ requests for high-quality IP access control devices with a fully integrated biometric fingerprint sensor," says Sascha Keller, CEO of Bird Home Automation. "When it comes to collaborations, we always try to work with the best in their class. Fingerprints' technology is characterised by superior biometric performance and security, and we are excited to have it integrated into our DoorBird IP video door stations." “We are excited about our collaboration with DoorBird, our first IP Door Station partner in EMEA, who now launched their D21x series with our fingerprint sensor, a solution that is suitable for smart homes, where biometrics bring convenience and security”, comments Michel Roig, SVP Business Line Payment & Access at Fingerprint Cards AB.
Round table discussion
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Assembling security solutions has long been considered the role of the integrator, whose role is to pick and choose the best technology tools and then to assemble the complete system. However, more manufacturers are offering pre-integrated end-to-end solutions that include multiple elements from the same manufacturer, designed to work seamlessly together. At the end of the day, end users want to know: Whose role is it to provide security ‘solutions’ – the manufacturer or the integrator? We asked our Expert Panel Roundtable.
“Deep learning” is recently among the more prevalent jargon in the physical security industry, and for good reason. The potential benefits of this subset of artificial intelligence (AI) are vast, and those benefits are only now beginning to be understood and realised. But how can we separate the marketing hype from reality? How can we differentiate between future potential and the current state of the art? To clarify the latest on this new technology, we asked this week’s Expert Panel Roundtable: What is “deep learning?” How well does the security industry understand its full potential?