Global video wall and visual display experts Ultimate Visual Solutions (UVS) has responded to client requests for additional features and functionality by launching an updated version of its Lucidity video wall controller and control software. The Lucidity brand is aimed at security and control room clients who don’t necessarily require a full enterprise functionality video wall solution. The range is available from UVS to AV system integrators for resale to their end clients. Additional...
FLIR Systems, Inc. announces modified thermal cameras for fast and safe non-contact elevated skin temperature screening. The FLIR EST™ thermal screening solutions provide frontline screening at building entries and in high traffic areas to improve safety and help curb the spread of COVID-19. The FLIR Axxx-EST, FLIR T5xx-EST, and FLIR Exx-EST series cameras are designed to simplify the screening process, reducing the burden on screening operators and adhering to recommended social distanci...
Automation plays a major role in Industry 4.0. Cost reduction, increased productivity and zero-defect quality are factors that are increasingly prompting companies to digitise their processes. But often full automation also means high investments. At the same time, the focus will continue to be on the human being in the interaction between man and machine. Given the prevailing shortage of skilled workers and high standards of industrial safety, this is no easy task for companies. Additional cha...
Sensor system supplier HENSOLDT has been awarded a contract by Airbus Defence and Space to develop and produce a new AESA (Active Electronic Scanning Array) radar for the German and Spanish Eurofighter fleets. The project is jointly financed by the Eurofighter partner nations Spain and Germany, who will also be the first users of the radar in their fleets. Following budget approval by the Spanish government and most recently by the German Bundestag in mid-June, the contracts worth over 1.5 bill...
The DoorBird app has been awarded the ‘Software Made in Germany’ and ‘Software Hosted in Germany’ quality seals. The German Association of Medium-Sized Enterprises in the IT Industry (Bundesverband IT-Mittelstand e.V.) awards the seals to German companies whose software meets particularly strict data security and quality criteria. The app is the central control tool for DoorBird IP video intercoms developed and manufactured by Bird Home Automation in Berlin. With the Doo...
Videotec is expanding its range of explosion-proof products with the new MBA communication box, which has been designed for optimal installation of Maximus, IP or analogue cameras in potentially explosive environments. Much more than a simple junction box, this communication box provides low voltage local power and allows a fast Ethernet connection, thanks to the integrated Ethernet switch that has three RJ45 ports and an SFP port for fibre optic connection. The type of SFP module can be chosen...
SMART SHOOTER, a designer, developer, and manufacturer of innovative fire control systems that significantly increase the accuracy and lethality of small arms, is honoured to announce that the company has been selected by the U.S. Army and endorsed by the U.S. Department of Defense (DoD) as one of a handful of approved Counter-small Unmanned Aircraft Systems (C-sUAS) solution providers. The designation of SMART SHOOTER as one of only three DoD-approved dismounted/ handheld systems by the Army – the DoD’s Executive Agent for the C-UAS mission area – follows an extended Army-led assessment of more than three dozen competing C-UAS systems. Multi-layer defence solution The Army notes that this assessment identified current systems for future investment based on criteria such as effectiveness, usability, sustainment, and integration. SMART SHOOTER's SMASH family of Fire Control solutions – capable of leveraging targeting data from a wide range of EO, RF and radar sensors – can be integrated onto any assault rifle, as well as combined with other C-UAS systems, to provide an effective multi-layer defence solution suitable for the modern battlefield. SMASH enables the creation of a micro-tactical network between deployed SMASH units Bringing precision-missile targeting algorithms and advanced electro-optical processing capabilities into standard infantry, SMASH enables the creation of a micro-tactical network between deployed SMASH units, allowing the entire platoon to be smart, precise, and connected. With a unique ‘One Shot – One Hit’ capability, SMART SHOOTER's Fire Control technology allows the operator to quickly and effectively neutralise any ground or airborne, manned or unmanned threat through automatic detection, tracking, and effective engagement. Gathering critical tactical intelligence Michal Mor, SMART SHOOTER CEO noted: "In recent years, drones and UAS have become a persistent threat over the battlefield, enabling opposing forces to gather critical tactical intelligence and even make direct attacks. The SMASH family of Fire Control Solutions offers precise, swift, and simple hard-kill elimination of this threat. We are thrilled that the DoD has down-selected and designated SMART SHOOTER's exclusive technology for C-UAS application across the U.S.” “Armed Forces, and see it as validation of the operational value that our solutions provide. The selection is a result of SMART SHOOTER's ongoing work with the Countering Terrorism Tactical Support Office (CTTSO), during which our technology was integrated with radar solutions to provide the warfighter with an unrivalled detection and hit system."
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of Infrared Cameras Inc. (ICI) to its network. Infrared Cameras Inc. is an innovator in the infrared products space with a line of thermal cameras as well as multi-spectral infrared cameras and complete package systems. “The COVID-19 pandemic forced an unprecedented acceleration in demand for thermal monitoring devices,” said Bill Bozeman, Chief Executive Officer (CEO) at PSA Security Network, adding “PSA has been diligent in ensuring it selects top notch partners and products for our integrators to consider.” ICI cameras ICI cameras can be set up at entry points in all types of businesses to screen temperatures in less than two seconds ICI cameras can be set up at entry points in all types of businesses to screen temperatures in less than two seconds. These temperature screenings are important as they allow users to identify anyone with an elevated temperature who might be potentially ill. This can prevent an illness like COVID-19 from spreading in workplaces and public spaces. “ICI is looking forward to a long and prosperous partnership with PSA,” said Carl Schultz, Director of Channel Sales for Infrared Cameras Inc., adding “We’re thrilled to have the opportunity to help system integrators incorporate thermal imaging cameras into their platforms for safe, accurate, and immediate elevated body temperature screening." Thermal imaging technology He further said, “This is a critical aspect of the world’s new normal, and we’re proud to help businesses worldwide reopen in one of the safest and most health-conscious manners possible.” The technology provided by ICI is currently being used in businesses such as airports, casinos, sports arenas, hospitals, factories and more. Its cameras are highly accurate to within a fraction (0.1 to 0.3 Celsius) of one degree Celsius and have had FDA clearance on temperature screeners since 2008.
The world has changed with the COVID-19 pandemic. There are many new challenges and regulations. MOBOTIX’s intelligent video technology can support companies, institutions, public as well as private facilities during the crisis and in the restart after the lockdown. MOBOTIX has bundled the available "back-on-track video technology solutions" for its partners and customers to help get them up and running quickly and effectively. This makes it easier for industries and sectors such as retail, restaurants, airports, train stations, municipalities, industrial, service companies and educational institutions to "get back on track." MOBOTIX automates the "back-to-business restart" with professional analysis and thermal imaging technology, with an array of optional apps in the latest MOBOTIX 7 generation cameras and specially-developed add-on solutions from MOBOTIX’s global Partner Community. Highest cyber security Only the consistent adherence to rules and regulations will drive further improvements in this pandemic" The hardware and software of MOBOTIX can be adapted and converted at any time for numerous alternative industry-specific tasks, always with the highest cyber security. "Only the consistent adherence to rules and regulations will drive further improvements in this pandemic. By doing so we will hopefully move together successfully towards ‘normal life and work.’ It is a good feeling when we can support and accelerate this with our technology," says MOBOTIX CEO, Thomas Lausten. Entrance control system In many shops, schools and public buildings there are updated capacity limits for the number of visitors, customers or employees. To determine the current numbers, all entrances and exits must be checked. MOBOTIX video technology can do this reliably, automatically, and effectively - without the need for additional personnel. An entrance control system can be installed indoors or outdoors, for example, using a traffic light system or an automatic door control system. The MOBOTIX video analysis technology also allows the cumulative recording of the current number of people in complex and multi-story buildings using all cameras installed at the entrances and exits. Supporting Social Distancing "Social Distancing" is a widely used term. It describes the observance of minimum distances and is intended to reduce the risk of infection. MOBOTIX technology can also provide support here. Face mask detection In addition, sensitive zones, such as sterile zones in hospitals and nursing homes, can be better monitored and protected It does not monitor whether the minimum distance is maintained in all areas, but rather checks whether it could be maintained in general within heavily frequented areas. For example, video technology can detect overcrowding - e.g. in waiting areas or at checkouts - and resolve it by means of visual and acoustic warnings. The capacity and crowding of people are not the only concerns, of course. In many public areas, face masks are also required. It must be ensured that proper protection is worn. Partner solutions that rely on MOBOTIX technology can detect when face masks are worn and trigger alarms or warnings if violations occur. In addition, sensitive zones, such as sterile zones in hospitals and nursing homes, can be better monitored and protected. Recognising temperature abnormalities MOBOTIX TR (Thermal Radiometry) technology makes it possible to measure thermal radiation - even from people. Although MOBOTIX thermal technology does not replace medical devices, they can help analyse critical situations in order to escalate to further measures. It allows anomalies to be detected and reported. Identified persons can then be subjected to further examination and referred to medical personnel. "Our technology helps customers not only in times of crisis. MOBOTIX video security systems are valuable to our customers well beyond the crisis," says Lausten. “The high-end video systems can be used, adapted or converted at any time for numerous additional and new industry specific tasks. Our intelligent solutions cover much more than just security applications. For example, they offer outstanding potential in process optimisation or improving a service organisation. The investment in MOBOTIX video technology is and remains future-proof," says the MOBOTIX CEO.
The fast-paced growth of Milestone Systems has resulted in a new regional headquarters in Dubai Media City. The move means double the office space for employees. The premises include a state-of-the-art Experience Centre equipped with new technology capable of simulating and demonstrating a wide range of innovative solutions. This includes solutions for mitigating the COVID-19 pandemic using physical distancing, heatmapping, people counting, and temperature measurement. Video management technology Milestone Systems has been present in the UAE since 2007. Milestone’s video management technology helps major cities, companies, and people in the region staying safe, efficient, and protected. “We are excited to be settling into the new, spacious office in Dubai Media City,” says Regional Sales Manager Amine Sadi. The company recently released its annual report for 2019, which shows strong, sustainable long-term growth and another record-breaking year for the company. Through collaboration and innovation, Milestone’s software has been added to more than 500,000 installations worldwide. In the past five years, Milestone also nearly doubled its number of employees to more than 900 people internationally. Fast-growing community We are investing in new employees and need more space to enable this growth" The new office site in Dubai will serve as the regional headquarter covering Turkey, North Africa, and the Middle East (MENAT). The office is used by 28 employees, with six additional employees based in Turkey and Lebanon. “We are committed to serving our fast-growing community of partners and customers,” says Sadi. “We are investing in new employees and need more space to enable this growth. Focusing on long-term sustainable expansion requires the best people, who can identify the right opportunities for our company.” The new premises also include fully equipped classrooms for customer and partner training. Essential for protecting businesses Openness and flexibility are two of Milestone’s core values. These values will continue to be essential for protecting businesses and allowing the integration of innovative technology like AI, analytics, and heat-mapping to video systems. These systems play a key role in protecting societies and people worldwide. The Milestone Marketplace, launched in 2019, is an open business platform that connects buyers and sellers, who can work together to co-create innovative solutions using current technology. In 2020, Milestone will launch version 2.0 of the Milestone Marketplace, enabling customers to easily find resellers and integrators who deliver video solutions to their individual needs. “Video surveillance solutions are increasingly being recognised not only for security purposes but also to optimise businesses and tackle societal challenges,” says Sadi. “With our competitive portfolio of products, we are enhancing our joint solution-selling to the benefit of our clients. I look forward to continuing our expansion in the region.”
PSA, the consortium of professional systems integrators, announces the addition of Tyco Cloud to its Managed Security Service Provider Program (MSSP). Tyco Cloud is a cloud-based physical security management suite from Johnson Controls developed for video surveillance, access control, intelligence, and integration services on an open and modern micro services architecture. “Tyco Cloud has more than 20 years of experience providing cloud-based security services,” said Tim Brooks, PSA’s vice president of sales and vendor management. “As our industry moves more and more towards cloud-based offerings, Tyco Cloud is an important addition to our lineup of products.” Digital revenue streams Tyco Cloud provides the cost efficiency of software as a service (SaaS) with the simplicity of secure cloud connected hardware. Since its inception, Tyco Cloud has helped customers store and manage over 25 billion minutes of video surveillance in the cloud and is available in 140 countries. "PSA is a leading distributor with a powerful history of delivering best in class physical security technologies as well as the training and support their members need to take advantage of the digital transformation happening in our industry," said Martin Renkis, General Manager of Global Cloud Solutions for Physical Security at Johnson Controls. "We are focused on providing the best solutions to create new digital revenue streams for the PSA members and cost-effective value for their customers." On-premise security infrastructure Cloud computing improves efficiency, reduces IT costs, and streamlines application management, while increasing scalability, availability, security, and convenience compared to traditional on-premise security infrastructure. Integrators in the PSA Network can leverage the power of IoT, big data, and artificial intelligence for security with Tyco Cloud. PSA’s MSSP program hinges on uniting partners in cybersecurity and cloud-based security solutions, offering training and certification opportunities and financing options with assistance from PSA.
Cyber security is a trending topic in the video surveillance market. As a result of international regulations, companies are assessing the potential security risks of video surveillance systems, deploying crisis management policies and developing mitigation plans for events related to a data breach. Customers desire trustworthy products and vendors are rushing to fill this gap to satisfy the market demand. Multiple vendors are offering a great number of solutions; however the choice and diversification perplexes customers, who often have difficulty identifying the best solution for their needs. In this paper, Videotec puts forward its vision with regard to developing safe products and describes its strategy for cyber security. Explosion-proof rated cameras Customers are currently overwhelmed by the perpetual advertisement of products related to cyber security. At tradeshows and in sector magazines, multiple products are being promoted as key elements for cyber security. Unfortunately, cyber-safe products cannot be marketed with the same strategy as other devices, for example, explosion-proof rated cameras. For software, similar requirements exist but there is less clarity than with their counterparts The key difference is that for threats that do not concern software a set of well-defined and well-documented requirements exist: in general, it is possible to universally define safety requirements for installation in special environments, such as a drilling rig, a marine vessel or along a railway. For software, similar requirements exist but there is less clarity than with their counterparts when it comes to security. Video management software Furthermore, a device's firmware and video management software (VMS) are updated by each vendor to introduce new features or to fix bugs. Every update may have an impact on the complete video surveillance system reliability. Finally, security researchers continuously identify new issues that may reduce the safety of the system, even if no change is applied to the facilities. Deploying a cyber-secure system is a challenging task under these ever-changing conditions. Other aspects of security, such as mechanical, electrical or environmental are not subject to similar uncertainty. As an example, designing an explosion-proof system is a well-known process, involving classifying zones, identifying the nature of the explosive elements, such as gases or dusts, and deducting the product requirements. Video surveillance equipment During the lifespan of the system, the identified risk sources do not change. Similarly, during installation on a marine vessel, the video surveillance equipment is commissioned and will not change until the entire ship is refurbished. Several certification options are currently available on the market, and these can be placed in two main groups The result of the lack of certainty that characterises software and the existence of complex standards that have a restricted competent audience is a professional market that is trying to incoherently fill this gap, by pursuing certifications and stamps or by adopting aggressive advertisement strategies, based on over-optimistic promises on product features. Cyber security certification Several certification options are currently available on the market, and these can be placed in two main groups: System certification Product certification As the name suggests, system certification addresses cyber security at a system level. This group includes ISO27001, NIST SP 800-53° ISA/IEC62443-3 for example. In these frameworks, risks related to information management are evaluated across every aspect of the organisation: information generated by the devices, storage, access control to the information and physical security to protect data from being stolen from data centers. Video surveillance system Since these certifications must be flexible to adapt to a heterogeneity of systems, they define frameworks to perform the system analysis and the assessment of the risks of such systems, but they do not punctually mandate explicit requirements. System certifications delegate the definition of such requirements to the organisation willing to achieve the certification. In contrast, product certifications are narrow in scope, targeting a single component subject to certification. A single component can be a camera, a networking switch or video management software A single component can be a camera, a networking switch or video management software. In this category are the EMV standard for credit and debit cards, the UL2900 series and ISO/IEC 15408, also known as Common Criteria. It is clear that pursuing a system-level certification involves the customer and the integrator installing the video surveillance system. Cyber secure surveillance Manufacturers should target product certifications and drive efforts to ease the integration of their products into the frameworks of system-level certification that is being pursued by their customers. Videotec started developing its DeLux technology several years ago. At that time, Videotec had a clear vision for its products: developing safe products for all possible tasks - mechanical, electrical, electromagnetic and software - according to current and future security requirements. The mission of the DeLux technology was, and still is, to provide a reliable, safe and future-proof platform that integrates with all products. Sharing a common platform between multiple products is challenging. It requires deep planning of product design to ensure the platform will function perfectly within any product. It also implies that new software releases are compatible with any previously released camera. New security feature Software architecture must be flexible enough to guarantee integration into very different products Thus, every time a new product is released the effort to validate the software increases. Due to this decision, Videotec guarantees that any new security feature and any bug fix will be available to its customers regardless of product age and whether it is still present in the current product catalogue. From the beginning of the DeLux project, two key points were immediately clear. The first point is that software architecture must be flexible enough to guarantee integration into very different products, and at the same time it needs dedicated components that guarantee the un-exploitability of the device. Accomplish video acquisition For this reason, the code executed by the device is partitioned into different security domains, making sure that processes that implement the protocol interfaces towards the video management software cannot harm the internal components that accomplish video acquisition, perform compression and constantly monitor the correct function of the unit. The second point that Videotec immediately understood is that ensuring the correct functioning of the software in every device is as important as the software running in just the cameras. For this reason, Videotec started developing internal tools that perform automated testing on the entire set of devices that incorporate the DeLux technology. Secure video surveillance Every night, the validation tools embedded into the continuous integration process automatically test each product to verify that no regression was unconsciously added while the company proceed with software development. Every time Videotec adds a new feature in response to a suggestion for improvement by the company's customers or identification of an issue, it also updates the testing tools to increase the reliability of the company's products. Videotec has yet to definitively choose a certification scheme for the DeLux technology Videotec believes that its products, and the continual updating of these, actively contribute to maintaining the safe operation of secure video surveillance system, helping IT departments and system administrators by keeping their systems balanced and by not requiring excessive mitigating actions or protections due to future issues. At Videotec, they call this cyber-sustainability. System-level security requirements At the time of writing this white paper, Videotec has yet to definitively choose a certification scheme for the DeLux technology. Several options are being evaluated, as the company search for a solution that will create value for the company’s customers without sacrificing the addition of new features on all products that make up the DeLux technology range. Although Videotec is still exploring the best certification scheme for its software, this does not prevent the company from having a clear and active development path for the cyber security in their products. At Videotec, the following five principles are the basis for implementing cybersecurity in products: Hardened software architecture to minimise the attack surface of the cameras Constant updates and availability of new features, even on old products Removal of predefined credentials in the products, to strongly indicate to customers that, as a minimum, a new username and password combination must be defined by the user during installation according to the system-level security requirements Contribution to the ONVIF Security Service specification, to push the industry shifting from usernames and password to X.509 certificates Clear communication to customers, by avoiding fake marketing claims Security service specifications Videotec had an active role in the development of the ONVIF Profile Q specifications. Among other activities, it contributed to driving the standard towards the removal of predefined credentials. The security market must teach installers and users that using pre-defined usernames and passwords is equivalent to not having credentials at all. Videotec is proposing extensions to the ONVIF Security Service specifications Defining the factory-default state of Profile Q compliant devices, where no authentication is required, is the strongest reminder a vendor can provide to its customers. Similarly, with regard to the commitment for the ONVIF Profile Q, Videotec is proposing extensions to the ONVIF Security Service specifications that will include the widespread the adoption of X.509 certificates to replace the usage of credentials. Video surveillance market Moving towards this new way of handling authentication between devices and VMSs will not only impact devices, but it will require a leap forward for the whole video surveillance market. Beyond implementing the functionality in its devices, Videotec is already planning the actions that will be necessary to make its customers effective at selling, installing and maintaining video surveillance systems based on this technology. Last, but not least, trustworthy communication to customers is a key value for Videotec. For this reason, Videotec will never exploit the unintuitive requirements of system certifications of international privacy rules to send wrong messages to the market. As an example, Videotec added to all its IP products an instruction about performing a safe installation according to the General Data Protection Regulation (GDPR), similarly to the instructions given for mechanical, electrical of environmental safety. IP-based device In the last ten years, the video surveillance industry has vigorously shifted from analogue to IP products These instructions are meant to teach customers and stimulate their attention to aspects related to cyber security. As such, instructions will never be turned into unreliable market claims, such as claims for conformance to the GPDR or any other rule. Cyber threats started menacing video surveillance systems from the day the first IP-based device was put into the market. At that time, the number of digital systems was low and video surveillance was not as pervasive as it is today. In the last ten years, the video surveillance industry has vigorously shifted from analogue to IP products and, at the same time, it has witnessed a constant growth in market demand. As a result, digital video surveillance systems are everywhere nowadays and attract attention not only from professionals but also from malicious users. Risk assessment analytics Keeping these systems safe from cyber-threats is an activity that cannot be performed just by performing a risk assessment analytics during the commissioning phase - maintenance and recovery plans must be operative during the whole lifespan of the systems. These activities have a cost; also managing the effects of a system violation has a cost. Integrators and users must find the correct balance, to minimise expenses while keeping video surveillance systems updated and secure. In order to make reduction of expenses related to maintenance and recovery plans easier, Videotec bases the development of its products on the concept of cyber-sustainability, where support, updates and training about the products span an interval that is larger than each single product lifecycle and assist integrators and customers keeping their systems protected.
When we popped the champagne to celebrate the start of a new year in January, not many could predict that less than three months later, we’d be facing a global pandemic and the economic challenges that a worldwide lockdown would bring. In conversations over the last several weeks, reports from integrators have vacillated between being flush with work or fearful that projects were drying up — without a whole lot in the middle. But in these conversations, a central theme has emerged: diversification. My background was heavily rooted in security integration but in the last 10 years shifted to risk — both management and mitigation practices — and this emerged long before I began my career in security. It isn’t a new phenomenon for companies to be looking at the risk management strategies they had in place and rethinking their direction. This global pandemic, and the effects it has had on the workforce, has significantly altered what many organisations deem “normal” day-to-day operations, meaning that many organisations are asking one key question: “can my business withstand this?” The challenge exists in ensuring asset security For many end users, the challenge exists in ensuring asset security in locations that are experiencing low occupancy as a result of work-from-home policies or in vacant facilities altogether. For integrators, there is a balance between continuing to install projects while keeping the health and well-being of technicians and employees top-of-mind. Considering these factors, business resiliency in times of crisis can be built by integrators implementing the following strategies: Diversify the portfolio As an industry, it’s safe to say that the winds of change are beginning to shift away from solely “per project” to more recurring monthly revenue (RMR) business models — and today’s crisis may be the catalyst for more of this change. Integrators that embraced this model in the early days, despite the hurdles that a transition like this brings, are seeing the benefits of this move. In economic downturns, RMR allows an organisation to map out incoming revenue streams and ensures money will continue to come in despite restrictions on new products and investments from customers. Offer more service-based products Part of diversifying a portfolio involves engaging in a more service-based approach to business. Establishing a monitoring services department, integrating a cloud-based video and/or access control service into the mix, or bringing more system monitoring services in play can go a long way in offering more than hardware-driven sales. We’ve talked a lot in the last several years about so many organisations transitioning from large capital expenditures (CAPEX) to more operational expenditures (OPEX) and the opportunities this presents to integrators; now is the time for providers to harness this trend for the health of their business. Emphasise the management Through managed services, the value for the customer is that integrators take on the diagnostics, testing, remote monitoring and more — all via the cloud or hosted models, which means fewer “truck rolls” and costs associated. In the current environment, saving a visit to a site can help protect technicians. For new customers, the external management of a system can mean all the difference as there are a number of end users that don’t need a headache that legacy systems create as it relates to maintenance, updates and manpower oversight. Securing an integrator’s business can mean being able to serve customers by diagnosing and triaging issues quickly and highlighting the value provided in day-to-day management. Look at new vertical markets From a resilience perspective, critical infrastructure and government-related markets, such as water and energy, and local and municipal customers rarely see a reduction in spending amidst a downturn, which can make these markets a solid investment for integrators. While some of the regulatory requirements in place, such as adherence to the National Defense Authorization Act (NDAA) and GSA contract guidelines, may be daunting, the ability for firms to weather the storm by serving these markets can help integrators see continued success. Understand your books One of the first things that integrators must do before a crisis hits is to understand their balance sheet. So many integrator firms are built on the premise of being really exceptional at highly technical and complicated installations, which is why they are good at what they do. But the real challenge is the balance of this ability with the skills needed to grasp business continuity from a bookkeeping and planning perspective. Act as a consultant One of the biggest challenges for customers during a crisis is making quick decisions that can impact the rest of the organisation both in the short- and long-term. In the security environment and the status of where the world is currently, the needs customers had a month ago are far different than now, so acting as a consultant and working with them to address their concerns through existing technology — or recommending new solutions — can mean all the difference in building a relationship with existing customers or in working with new ones. Offer services that leverage existing investments So many customers out there today have invested heavily in video surveillance equipment and hardware that they want to ensure will be around for the long haul. Investing in new equipment can be a real hindrance in normal circumstances, much less those we’re currently facing, so it’s critical that more open solutions are offered to customers. For example, cloud-based video offerings that leverage existing cameras and allow end users to configure them with the touch of a button are a value-added benefit that can favour integrators in the long run. Continue training your staff Right now, while many integrators see a slow down taking place, it’s critical that those with the means to do so offer more value to end users by incorporating continued education and training for technicians. This can go a long way in making the services offered more appealing to customers. Integrators who set aside resources to train staff and encourage certifications are building a foundation for success. There’s no way that integrators can address the demands placed on them without investing in the people within their organisation. Integrators and security leaders are tasked now with the added complexity of navigating a worldwide crisis. While so many see the challenges ahead, there is opportunity within these challenges to take forward-thinking business practices and implement them on a broader scale. Doing so can have the potential to change the face of the industry as we know it.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experienceOne of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialise in “transformational culture and how to diffuse best practices in an organisation.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organisation to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarise the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
In addition to providing the Northeast’s largest security trade show, ISC East will include free conference sessions and keynote speeches right on the show floor and several paid workshops. The Nov. 20-21 event at New York’s Javits Center will also include vendor solution sessions from Axis Communications, Hikvision and NAPCO. Wide variety of paid workshops An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees, and location of the sessions on the show floor means attendees don’t have to leave the exhibition to take in a session. The paid workshops include technology sessions about cyber terminology for physical security integratorsThe paid workshops include an Active Shooter Workshop and technology sessions about cyber terminology for physical security integrators; and basic installation and configuration of video surveillance solutions. An OSDP (Open Supervised Device Protocol) Boot Camp Short Course will also be offered. As a smaller show, the topics of ISC East conference sessions are broader and of more general interest, rather than organised into focused “tracks” as at ISC West. Attendance at sessions can provide continuing education (CE) credits with organisations that partner with ISC East – one credit for each hour-long session. Attendees can use their Certificate of Attendance from any session to self-report their education hours to relevant industry bodies: ALOA (AEU education credits), ASIS (CPE continuing professional education credits) and NICET (CPD Continuing Professional Development points). An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees Keynote sessions at the Main Stage The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management (on Day 1 – Nov. 20); and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration (FAA) (on Day 2 – Nov. 21). The two SIA Education@ISC East educational theaters on the show floor will be booked up both days with a variety of interesting topics. A new session covers penetration testing for physical security, presented by Michael Glasser of Glasser Security Group. A session on LiDAR (Light Detection and Ranging) sensors will be presented by Frank Bertini, UAV and Robotics Business Manager, Velodyne LiDAR. Another popular topic is Safe Cities, and FLIR will present a session on moving from secured to smart cities with intelligent, connected systems. New addition is Active Shooter Workshop The Active Shooter Workshop is a new addition to the ISC East programme. It has been a popular session at ISC West for three years now. At ISC East, presenters of the workshop will be David LaRose, System Director Public Health, Lee Health; and Ben Scaglione, Director of Healthcare and Security Programming, Lowers and Associates. At the end of the workshop, an additional hour of programming will be the “Stop the Bleed/Save a Life” session presented by Jerry Wilkins, Co-Owner of Active Risk Survival. The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management, and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration Woman in Security event A Women in Security Forum breakfast event will be held on Nov. 21 (Thursday). It’s the second annual event and this year will focus on diversity and inclusiveness in the workplace of the future. Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”Moderator Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”. Panelists are Lisa Terry of Allied Universal, Andrew Lanning of Integrated Security Technologies, Elaine Palome of Axis Communications and Dawne Hanks of Milestone. The Women in Security event is likely to attract up to 100 attendees. SIA’s Women in Security is an active organisation, with monthly meetings and a newsletter that recognises prominent women in the security industry. “It’s really a group for both men and women,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. “There are many programmes, recruiting efforts, and professional and networking opportunities. They are a robust group of people who are active in making a difference. It’s important to support women in the security industry, which is 95% male, and to develop a new generation of women to be a part of the industry’s future.” The keynote addresses at ISC East will also highlight two high-profile women.
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Centre (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations centre unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations centre not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data centre standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations centre, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
Optex installs intrusion detectors at a gated, luxury motor coach resort community in the desert area of Southern California. The property features a clubhouse, fitness room, community pool, and 141 "Casitas": 1200 sq ft. custom-built living spaces with waterfront motor coach pad. Because most owners were on site only a portion of the year, the property faced an increasing issue with trespassers in the off- season months. The increase in trespassing also lead to an increase in vandalism and theft cases. The large perimeter, combined with the desert heat, required a robust, long distance solution that would stand up to the elements. Detection range of 650 feet The integrator worked directly with OPTEX to plan out a perimeter system that would overcome the challenges faced on the site. Because power was readily available and a long distance solution was required, hardwired AX-650TF beams with a detection range of 650ft. were selected. After discussing possible mounting options with the OPTEX sales representative, the integrator decided on the AX-TW200 photobeam tower. Because the customer provided a site plan, OPTEX was able to pre-build the towers and mount the beams in them at no additional charge. Once installed, the tower and beam solution provided full perimeter protection by activating strobes and notifying an on-site guard to the location of an intrusion. The result was a huge decrease in the amount of unknown trespassers, thus greatly reducing reports of theft and vandalism.
From simple thefts of copper wire from light fixtures, to substantial damage to rooftop HVAC systems, copper continues to be stolen from everywhere that it is readily available. When a church in Georgia began feeling the effects of copper theft, the integrator associated with the property's interior security once again turned to OPTEX for help. The church utilised both rooftop and ground level HVAC systems, with easy access to each. Changing security needs Because of labour and cost associated with wiring, along with the difficulty bringing power to the rooftops, the Regional Sales Director for OPTEX recommended the iSeries line of battery-powered, wireless PIR's. The iSeries detectors offered spot and curtain protection for all HVAC units while also securing all access points to each. For future consideration, the addition of the wireless feature also allows the integrator to relocate and easily adjust the detectors based on changing security needs. With the system in place, copper and other related thefts have been eliminated and the end user can now respond quickly before any damage is done. All of the battery-powered, wireless detectors from OPTEX come with an empty backbox and work with most manufacturers wireless transmitters. Narrow detection areas OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter When one selects the iSeries version, OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter. One less time consuming step to do for the installer! The iSeries HX-80NRAMi is an 80' x 6' high mount, battery-powered, outdoor passive infrared detector with Anti-Masking. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. The iSeries BX-80NRi is a 3' x 80' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. With it's long, narrow detection areas that extend from both sides, the battery-powered BX-80NRi is specifically designed to be wall-mounted centrally on a building or HVAC unit. Passive infrared detector The iSeries VX-402Ri is a 40' x 40' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed, and the dual PIR's create two detection areas (upper and lower) that must be compromised simultaneously in order to go into alarm. OPTEX has addressed and met the need for a line of easy to install, stable outdoor detectors that will deter and ultimately prevent copper theft.
Gated aviation fuel farm adjacent to operation building. Client wanted to create a multi-purpose IP solution to detect intrusion from asset theft activating CCTV cameras and create an access control system for a 24-hour operation. Following a thorough site survey, the integrator was able to create a solution that achieved all of its client’s goals. Using 4 Redscan laser detectors in horizontal mode, the integrator was able to secure the fenced perimeter using CCTV surveillance into an IP network that is monitored by the end user. Using unique rules available through VMS, the integrator used a vertically mounted Redscan laser detector to activate/deactivate the intrusion system when a fuel truck would enter and leave the gated fuel farm.
Siqura and TKH Security realised a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast. The hospital consists of 11 specialised departments, a 32-bed emergency ward, a 3-storey rehabilitation building and more than 700 parking spots. Integration of multiple systems This hospital required a complete surveillance solution integrated with healthcare applications. The project combined access control and video management from TKH Security with cameras from Siqura. "We worked closely with our partners to comply with the solution which conforms to the new guidelines in Fujairah” says Tariq Anwer, Sales Director – Middle East & West Asia with Siqura. “The video surveillance component consists of around 700 different Siqura cameras, working with VDG Sense video management software and storage from TKH Security. The iProtect access control system, also from TKH Security manages around 400 doors with card and pin authentication. iProtect security management system is able to flawlessly fulfil the set of complex requirements demanded by this client.” Security management system healthcare facility For Siqura Middle East & West Asia and TKH Security, Sheikh Khalifa Central Hospital in Fujairah is a prestigious project in the healthcare segment. The integration of multiple systems under one roof combined with the integration of healthcare applications provided an extra challenge. Tariq Anwer: “The scope of the project involved an integrated security management system consisting of Siqura cameras, VDG Sense VMS and iProtect access control." "These are all managed at an upper level by iProtect security management system. Among others, some of the following features are implemented: managing visitors on-site and mustering system for emergency evacuation. This is in addition to the integration option with third party systems, for example baby-monitoring.”
Lombardy is one of the regions most affected by the COVID-19 epidemic. Due to the emergency, hospitals remain overcapacity, surgeries postponed, and staff continue to work fatigued because of what they’ve had to sustain over the past few months. In addition to this already critical situation, the Milanese capital suffers from a major blood scarcity. Decrease in blood donation collection In recent months, the Ministry of Health has intervened several times with recommendations to prevent possible interruption or decrease in blood donation collections within the region. This was targeted to improve processes at the donation centre in order to aide in the management of blood components and raise awareness of transfusion needs. Many donations made were due to the appeals launched by AVIS Milano. Due to the responses of citizens, even non-periodic donors, who went to the Lambrate headquarters in recent weeks was of generous help. Donors' security The donation candidate with a potentially higher temperature is then escorted to another location To ensure donors’ security and to avoid crowding in the waiting rooms, regulating access and managing the flow became extremely important. AVIS Milano has immediately taken necessary measures. Thanks to MOBOTIX’s donation and the completely free installation by Bergamo-based company, Ideologica, the association is now able to provide a high level of protection before a potential donor is accepted. A MOBOTIX Thermal TR imaging camera has been installed in the room where donors are processed and wait for access to donor acceptance protocols. Radiometric thermal sensor The camera, which is equipped with a radiometric thermal sensor, is able to detect variations in temperature of those present in the access room. It was integrated into AVIS Milano’s existing system by Ideologica in just one afternoon, and was programmed to detect any temperature rise above 37.5 degrees Celsius (as required by law to allow the donation), with an accuracy level of 0.3 degree. We were able to identify the person potentially at risk of COVID-19 through the temperature symptom" If a donation candidate displays any change from this value, an immediate auditory alarm is triggered. The donation candidate with a potentially higher temperature is then escorted to another location and informed of the reasons for their donation refusal and is encouraged to visit his or her attending physician for further investigation. Medical staff immediately receives a report In respect of privacy, the system has not been set up to be viewed remotely with a video image on any external PC. The medical staff immediately receives a report that a person with a temperature above 37.5 degrees centigrade has appeared in the entrance hall. "Thanks to the contribution of MOBOTIX technology, we were able to identify the person potentially at risk of COVID-19 through the temperature symptom from the moment of entry, avoid contact with other donors present and advise the individual on an immediate follow-up with their doctor," commented Sergio Casartelli, General Manager of AVIS Milan. Facilitate solutions with MOBOTIX Technology "Technology should always be seen as positive improvement in any application regardless of how it is used, either to facilitate or to provide a final solution. We as MOBOTIX are committed to promoting and providing through our solutions and our partners as many benefits and opportunities as possible.” “We are extremely proud and humbled that we could collaborate with AVIS and that our technology could support the work AVIS has done to ensure availability of blood in Milan.” “This is one of the most important actions any organisation could have taken to provide support at this critical time," concluded Phillip Antoniou, Vice President Sales Europe South / West & MEAPAC.
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload