Security monitoring system
The new Wisenet 5 megapixel Flateye IR dome cameras manufactured by Hanwha Techwin are designed for high humidity environments and for where condensation might occur because of temperature differences. A key feature of the Wisenet QNE-8011R and QNE-8021R domes is that they each have a flat surface cover which is applied to the front of the lens, instead of the dome cover. This reduces IR diffused reflection which is caused by moisture and in the absence of a normal transparent dome cover, also r...
Video wall and visual display experts Ultimate Visual Solutions (UVS) have developed a unique alarm system that alerts clients to on-screen colour changes. The system, which operates within UVS’ Lucidity video wall controller and control software, was developed following a request from a major financial institution based in New York. Once installed, it will be used to alert staff to major downturns in financial and shares markets, when stocks or currencies starts to be displayed as red rat...
Pyronix is delighted to provide even more value and capabilities to installers and users alike, with the addition of video verification to ProControl+. Now, using our Enforcer V10 control panel, Wi-Fi cameras and security and life safety peripherals, the system can be tailored to detect, notify and verify any activity. “We’re really pleased to add this latest feature to our ProControl+ app,” said Pyronix Marketing Manager, Laurence Kenny. "Video verification delivers fantastic...
Razberi Technologies has extended its Razberi Monitor™ solution with new video health monitoring features. Razberi leverages its patent-pending deep packet inspection technology to assure security professionals that their cameras are providing secure and reliable audio and video streams. Razberi’s latest software automatically reboots cameras and sends alerts when problems are detected. Razberi Monitor provides complete system health and cyber monitoring solutions for video surveill...
ABP Technology, a value-add specialty distributor for IP technology solutions, has obtained the exclusive rights to distribute AlarmReady™ in the United States. AlarmReady is the first universal alarm system video verification solution designed to frictionlessly attach to any IP video surveillance system. “AlarmReady is an exciting opportunity for system integrators to deliver a video verification solution – for any alarm system users may have – that enables higher situa...
VCA Technology, a UK video analytics provider, announces its global strategic partnership with camera manufacturer CPRO to integrate its unparalleled, AI-driven security surveillance and analytics solutions. This collaboration brings to market the widest range of analytics cameras currently available from one manufacturer, as well as providing customers with complementary servers, appliances and cloud-based analytics software. The agreement enables both organisations to offer pioneering solutio...
Transition Networks, Inc., a provider of edge connectivity solutions, announces it will showcase its Power-over-Ethernet Plus (PoE+) and Power-over-Ethernet Plus Plus (PoE++) switches for power and connectivity of smart city Internet of Things (IoT) and security and surveillance devices at the Global Security Exchange (GSX) show. GSX is the security industry’s flagship event, bringing together cyber, operational and physical security professionals from across the private and public sectors. The event takes place September 8-12, 2019, at McCormick Place in Chicago. Transition Networks will exhibit in booth 175. Smart city applications The embedded DMS feature includes simple and time-saving capabilities for test and turn-up of systems Transition Networks will display its wide assortment of PoE switches, including its Managed Hardened Gigabit PoE+ Switch (SISPM1040-384-LRT-C), which are ideal solutions for providing power and connectivity in intelligent transportation and other smart city applications. The switches simplify device and power management in outdoor environments through Transition Networks’ Device Management System (DMS) software. The embedded DMS feature includes simple and time-saving capabilities for test and turn-up of systems, such as automatic discovery of connected devices and the creation of interactive maps allowing installers or administrators to document baseline deployments or to monitor and conduct diagnostics on connected devices directly from the switch. The many management capabilities enable users to pinpoint issues and quickly take action remotely, either eliminating truck rolls or allowing technicians to be better prepared to resolve issues in a single service call. Remotely reboot devices Transition Networks will also demonstrate its Self-Enclosed Managed Hardened Gigabit Ethernet PoE++ Switch (SESPM1040-541-LT-xx Series), which recently earned a 2019 IoT Evolution Product of the Year Award. The all-in-one switch features everything needed—outdoor-rated cabinet, switch, power and surge protection—preconfigured and optimised for powering and connecting security cameras, wireless access points, and other IP-addressable devices mounted on street lights, buildings or in parking facilities. The switches allows users to remotely reboot devices that may have experienced a power failure The switch, equipped with near-field communications (NFC) and a Bluetooth Low Energy (BLE) radio, can be scanned to configure right in the box and remotely accessed for troubleshooting through its mobile app installed on a smart phone or tablet. As with most Transition Networks switches it includes auto power reset (APR) functionality, which allows users to remotely reboot devices that may have experienced a power failure, saving time and operational expenses. Smart building infrastructure The future of smart buildings will also be on display via Transition Networks’ coalition with Berk-Tek and Cree Lighting through the designation of a utility LAN (uLAN™) supporting smart building infrastructure. Transition Networks PoE++ switching plays a key role in delivering the connectivity, bandwidth and power required by intelligent lighting and other connected devices in smart building infrastructure. “Many cities and other organisations are beginning to implement smart city technology and IoT solutions to enable more efficient and safer operations,” said Anita Kumar, Director, Product Management and Software Engineering of Transition Networks. “Transition Networks is committed to developing solutions that meet these needs, and we look forward to engaging with the security community at GSX each year to learn more about how we can continue to support them.”
Vaion, just a few months out of stealth mode, today announces its launch into the North American market with comprehensive demonstrations at GSX 2019. Vaion will exhibit in booth #1819 with a rapidly expanding commercial team ready to provide custom demos. Visitors will examine real-world scenarios which showcase how machine learning delivers operator efficiency, provides a rich understanding of surroundings, and offers new operational benefits for improved ROI. Embedded machine learning Vaion quickly deployed Proof of Concepts (PoCs) across a range of verticals with immediate results Vaion seeks to answer a single question: what if companies could detect threats at their earliest stages, mitigating risk instead of merely responding to security threats when they occur? It’s the basis behind Vaion’s innovative end-to-end security system, which brings together video, hardware, and software with embedded machine learning for proactive, rather than reactive, security operations. Highlighting early customer and partner demands for new experiences, Vaion quickly deployed Proof of Concepts (PoCs) across a range of verticals with immediate results. Commercial building operators are taking advantage of intelligent maps with Vaion’s Smart Presence™. The operational insights are providing the opportunity for enhanced workplace productivity and energy management based on occupancy awareness. K-12 administrators are finding Vaion’s real-time anomaly detection to be vital for complete school security. Vaion’s real-time detection gives schools the opportunity to take immediate action in stopping imminent threats from escalating. Healthcare facility operators are using interactive maps powered by Smart Presence™ to safely monitor patients, visitors, and employees. Vaion’s Smart Search™ allows operators to quickly identify a situation and person of interest. Retailers are benefiting from the granular awareness of the people present in their store. Heat mapping customer behaviour provides multi-layered solutions beyond strengthening security, and understanding customer activity helps improve the customer experience and increase sales. Enabling surveillance solutions Vaion’s active PoC engagements are an essential step in the company’s continued growth, with real, on-the-ground opportunities to test these advanced solutions and guarantee that Vaion products deliver on what they promise. Ambarella, a chipset manufacturer specialising in intelligent security applications, can attest to the viability of Vaion’s PoC solutions. Machine learning and integrated analytics are set to transform conventional video surveillance systems" Vaion uses Ambarella’s SoC for its ability to deliver powerful deep neural network processing, image processing, and video encoding. “Machine learning and integrated analytics are set to transform conventional video surveillance systems. Vaion’s advanced neural network-based algorithms running on Ambarella’s CVflow AI processors enable surveillance solutions that detect threats in their earliest stages and perform fast and effective investigations,” said Chris Day, VP Marketing & Business Development at Ambarella. Integrated AI analytics At GSX 2019, Vaion’s North American market representatives will provide an up-close look at how integrated AI analytics are set to fundamentally disrupt traditional video surveillance systems. “We are excited to show how artificial intelligence differentiators can safeguard businesses, schools, and entire communities. The positive response received during our PoC engagements proves that our approach to video surveillance uniquely helps our customers react to threats before they escalate, delivers increased situational awareness, and helps reduce resolution time dramatically. Come get the whole picture at booth #1819,” said Tormod Ree, Vaion CEO.
Revader Security, manufacturers of the Galaxy Mobile CCTV Tower have received a new order from Scorpion Security. Finished in the firm’s house colour with custom designed signage, Scorpion have named their towers ‘Stingers’. Scorpion Security purchased their first ‘Stinger’ at the end of last year. Based in Northampton, Scorpion has seen a dramatic increase in demand for its Stinger surveillance tower since the beginning of this year. Scorpion is fast developing its rental fleet of Stingers to augment its existing business of CCTV and alarm installations, manned security and mobile patrols. Power management system For rapid autonomous deployment, Revader Security’s mobile CCTV towers are unmatched" Mark Bennet, Managing Director at Scorpion Security had undertaken a survey of surveillance towers and found that the Galaxy Tower from Revader ticked all his boxes. He commented: “for rapid autonomous deployment, Revader Security’s mobile CCTV towers are unmatched. With continuous recording and transmission of video from five cameras, we are able to monitor very large areas reliably and without blind spots”. The mobile power base includes a diesel generator, fuel tank and reservoir batteries that will power the surveillance tower unattended for up to 60 days (load dependant). This unit is remotely monitored and controlled by its own power management system which sends warning emails, low fuel and battery power to CCTV operators when it necessitates human intervention. Ideal rental product Bennet added: “The Stinger is our secret weapon. With single person deployment and 24/7 operation, it significantly reduces overheads and makes for an ideal rental product for our company”. Revader Security, based in North Wales, has been manufacturing a range of mobile and redeployable CCTV products for the past 12 years. Revader Security is a small design and manufacturing company and is able to design new products utilising its technology base or customise any of its existing products.
PetroCloud, a provider of security, monitoring and automation solutions for customers with remote operations, announced that it has changed its name from PetroCloud to Twenty20 Solutions. “We’ve studied how to best represent ourselves to our customers, and this name transition is the perfect solution,” said Peter Shaper, interim CEO, Twenty20 Solutions. “Our new name better reflects who we are today and how we serve customers across many different industries.” Integrating security, monitoring and automation Twenty20 delivers real-time vision, intelligence and control into the remote operations of its customers, who work in a range of industries including energy, utilities, agriculture, construction and critical infrastructure. As the company continues expanding into new industries, the name change enables Twenty20 to reflect its broader market appeal and the level of clarity it gives customers into their remote operations. Twenty20 will continue to integrate real-time security, monitoring and automation in one place While the company name has changed, its commitment to serving its customers has not. Twenty20 will continue to integrate real-time security, monitoring and automation in one place and provide customers with unprecedented control of their remote operations. Industrial Internet of Things platform Founded in 2012, the company specialises in delivering surveillance, threat detection, access control and monitoring and automation of operations to customers via its advanced Industrial Internet of Things (IIoT) platform. Whether it’s providing clients with the ability to control who enters and exits remote facilities, protecting in-field assets from theft or vandalism, remotely detecting other threats to the environment or operations, or presenting a dashboard that provides customers with one place where they can see and control everything on their remote sites, Twenty20 is committed to supplying customers with breakthrough solutions to protect and improve their operations, no matter how remote the environment may be.
VuWall, a provider of video wall control and AV network management solutions, will present an affordable and innovative approach to equipping command and control rooms with state-of-the-art technology in collaboration with Infragard and the FBI in Booth 1187 at Global Security Exchange (GSX) 2019, September 10-12, in Chicago. With the increased demand for video walls in the security market, especially within small- to medium-size control rooms, VuWall has simplified deployments, allowing security professionals to quickly and easily build a modular system that scales to their needs. At the show, the company will demonstrate its ecosystem along with partner solutions from TBC Consoles, AG Neovo, and Matrox Graphics Inc. Integrated software platform VuWall will demonstrate how it supports the security requirements of organisations "Creating a control room has traditionally been an expensive and complex project considered only for the largest and most mission-critical applications. But as the need to monitor and interact with multiple sources has become essential to more organisations, we found a way to extend our technology in order to address smaller security deployments," said Paul Vander Plaetse, CEO at VuWall. "Regardless of the room size or budget, security professionals can now leverage the same powerful features of VuWall that have been vital to these high-end installations but bundled in an easy-to-deploy kit." At GSX 2019, VuWall will demonstrate how it supports the security requirements of organisations through its high-performance technology and a fully integrated software platform. Attendees will see VuWall's video wall control and AV network management ecosystem, which is comprised of the VuStation KVM control workstation, the VuScape video wall controllers, and the TRx AV network management system. Control room kit Highly configurable, modular, and flexible, the platform allows operators to harness the capabilities they need to seamlessly monitor, analyse, and respond to incoming information from various sources across multiple sites and on multiple video walls. TBC Consoles offers world-class modular furniture designed for 24/7 control rooms The company will display its complete control room kit that integrates VuWall products with the TBC SmartTrac Console and AG Neovo PN-55H video wall displays. TBC Consoles offers world-class modular furniture designed for 24/7 control rooms. AG Neovo is an international LCD monitor manufacturer for various vertical applications including IT, security, healthcare, industrial, and digital signage. Engineered to simplify the design, quoting, purchasing, and installation process, the control room kit includes everything customers need to deploy a state-of-the-art control room, despite the size. Demonstrating integrated solutions VuWall has partnered with Matrox to demonstrate integrated solutions designed to deliver the highest quality visualisation experience with the most advanced technology on the market. VuWall will demonstrate its VuStation visualisation and control workstation with Matrox's Extio 3, a high-performance IP KVM extender, across four full HD displays. The KVM solution for personal video walls, VuStation, enables operators to interact seamlessly with multiple sources from a single KVM station, having all critical controls and information at their fingertips. Attendees will also have the opportunity to learn about VuWall's video wall control system integrations with the security surveillance and video management platforms, including Genetec, Milestone Systems, and ISS, also exhibiting at GSX 2019.
Allied Universal®, a security and facility services company in North America, with headquarters in Santa Ana, California and Conshohocken, Pennsylvania, announces the acquisition of Midstate Security – a fully integrated electronic security and monitoring systems company based in Wyoming, Michigan. Terms of the deal were not disclosed. “The addition of Midstate is the first of many steps we are taking to build-out our technology services business following our platform acquisition of Securadyne Systems earlier this year,” said Steve Jones, CEO of Allied Universal. “This acquisition is an important part of our broader strategy to leverage technology across our entire business footprint.” Innovative security solutions Allied Universal aligns perfectly with Midstate’s mission and overall customer service philosophy" Midstate Security, with revenues exceeding $20 million and 89 employees, is known for providing innovative security solutions and world-class customer service throughout Michigan and the Midwest. Founded in 1980, the company designs, installs, services and maintains security systems for a wide variety of customers. It also provides an array of remote services from its UL listed central station in Wyoming, Michigan. “Allied Universal aligns perfectly with Midstate’s mission and overall customer service philosophy,” said David Nemmers, CEO of Midstate Security. “I am extremely proud of our employees and what we have built, and I am excited about the future growth potential offered by Allied Universal for them and our customers.” Electronic access control Midstate Security will expand the company’s Allied Universal® Technology Services division, which provides electronic access control, video surveillance, fire/life safety, alarm monitoring, emergency communications, hosted /managed services and a variety of Global Security Operating Center (GSOC-as-a-Service) offerings. “Midstate’s ability to expand our geographic reach into the Midwest, as well as their enterprise-class delivery capabilities are both strategically important additions to our business,” said Carey Boethel, president of Dallas-based Allied Universal® Technology Services. “We are excited to be partnering with such a great team as we continue to grow and expand across the US.” Midstate Security was represented by Barry Epstein of Vertex Capital Corp. and the law firm Rhoades McKee PC in the transaction.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. What first brought the issue of alarm verification to your attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What is the false alarm rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why did this issue resonate so strongly with you? When I first investigated this issue, I was sure that the security industry would have already recognised this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who is affected by this? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a bill for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What is the average false alarm fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why do you believe audio is the ideal technology for secondary source verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How would a secondary source verification system work with audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are there any additional resources you would suggest looking into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
Police in the United Kingdom have been testing the effectiveness of live facial recognition (LFR) for several years now, but future uses of the technology have been called into question. The Information Commissioner’s Office (ICO), an independent authority that seeks to uphold information rights in the public interest, has weighed in on issues of data privacy related to LFR, and Members of Parliament (MPs) have called for a moratorium on uses of the technology. The big question is whether the benefits of LFR outweigh its impact on privacy rights. Live facial recognition I believe that there needs to be demonstrable evidence that the technology is necessary" The House of Commons Science and Technology Committee has expressed concerns about bias, privacy and accuracy of facial recognition systems and urged the U.K. government to issue a moratorium on further live facial recognition trails until regulations are in place to address bias and data retention. According to Elizabeth Denham, U.K. Information Commissioner: “[Police trials of LFR] represent the widespread processing of biometric data of thousands of people as they go about their daily lives. And that is a potential threat to privacy that should concern us all.” Denham says live facial recognition (LFR) is a high priority area for ICO. “I believe that there needs to be demonstrable evidence that the technology is necessary, proportionate and effective considering [its] invasiveness,” she says. Potential public distrust “Any organisation using software that can recognise a face amongst a crowd and then scan large databases of people to check for a match in a matter of seconds, is processing personal data,” says Denham. General Data Protection Regulation (GDPR) wording specifies biometric data as a ‘sensitive’ category of personal information. London’s Metropolitan Police Service performed 10 trials of live facial recognition at various venues in 2016, 2017 and 2018. The London Police Ethics Panel reviewed the trials and concluded that additional use of the technology would be supported if certain conditions were met. One condition is if the “overall benefits to public safety [are] great enough to outweigh any potential public distrust in the technology.” Each deployment should be assessed and authorised as necessary and proportionate. Operators should be trained to understand associated risks and to be accountable, and there should be evidence that the technology does not promote gender or racial bias. Develop strict guidelines Met Police used NEC’s NeoFace technology to analyse images of the faces of people on a watch list The Ethics Panel also specified that both the Metro Police and Mayor’s Office for Policing and Crime should develop strict guidelines to ensure that deployments balance the benefits of the technology with the potential intrusion on the public. “We want the public to have trust and confidence in the way we operate as a police service, and we take the report’s findings seriously,” said Detective Chief Superintendent Ivan Balhatchet, who led the trials. In its 10 trials of live facial recognition, Met Police used NEC’s NeoFace technology to analyse images of the faces of people on a watch list. The system measured the structure of each face, including distance between eyes, nose, mouth and jaw to create facial data, which was used to match against the watch list. The system only kept faces matching the watch list, and only for 30 days. Non-matches are deleted immediately. More accurate identification An independent review of the trials, commissioned by the Metropolitan Police, concluded it is ‘highly possible’ that the Met’s ‘trial’ deployments would not satisfy the key legal test of being considered ‘necessary in a democratic society’ if challenged in the courts, according to U.K. human rights advocacy group Liberty. South Wales Police have partnered with NEC to formally pilot facial recognition technology. NEC’s real-time solution enables trained officers to monitor movement of people at strategic locations. “Facial recognition technology enables us to search, scan and monitor images and video of suspects against offender databases, leading to faster and more accurate identification of persons of interest,” says Assistant Chief Constable Richard Lewis. “The technology can also enhance our existing CCTV network in the future by extracting faces in real time and instantaneously matching them against a watch list of individuals, including missing people.” U.K. human rights advocacy group Liberty has taken legal action on behalf of one Cardiff resident against South Wales Police Intrusive technology “We are very cognisant of concerns about privacy, and we are building in checks and balances into our methodology to reassure the public that the approach we take is justified and proportionate,” says Lewis. U.K. human rights advocacy group Liberty has taken legal action on behalf of one Cardiff resident against South Wales Police over its use of facial recognition. “Facial recognition is an inherently intrusive technology that breaches our privacy rights,” says lawyer Megan Goulding at Liberty. “It risks fundamentally altering our public spaces, forcing us to monitor where we go and who with, seriously undermining our freedom of expression.” ICO’s Denham says any judgment resulting from the legal action will form an important part of ICO’s investigation and will be considered before ICO’s final findings are published. Information management South Wales Police offers the following assurance: “Data will only be retained as long as is necessary for a policing purpose, as per guidance within the Authorised Policing Practice on information management.” Facial recognition systems are yet to fully resolve their potential for inherent technological bias" One concern is that live facial recognition ‘discriminates’ against women and people of colour because it disproportionately misidentifies them, thus making them more likely to be subject to a police attention. ICO’s Elizabeth Denham comments: “Facial recognition systems are yet to fully resolve their potential for inherent technological bias; a bias which can see more false positive matches from certain ethnic groups.” Taking regulatory action ICO has also considered data protection ramifications of commercial companies using LFR. Denham says: “The technology is the same and the intrusion that can arise could still have a detrimental effect. In recent months, we have widened our focus to consider use of LFR in public spaces by private sector organisations, including where they are partnering with police forces. We will consider taking regulatory action where we find non-compliance with the law.” A 27-page U.K. Home Office Biometrics Strategy sets out an overarching framework within which organisations in the Home Office sector will consider and make decisions on the use and development of biometric technology. However, Biometrics Commissioner Paul Wiles says the document “doesn’t propose legislation to provide rules for the use and oversight of new biometrics, including facial images. Given that new biometrics are being rapidly deployed or trialed, this failure to set out more definitively what the future landscape will look like in terms of the use and governance of biometrics appears to be short-sighted.”
Workforce management systems gather and analyse information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimises operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customisable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organisations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimised to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyse current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyse current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalise resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customisable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
Leon Medical Centers is a privately-owned healthcare organisation with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighbouring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organisations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analogue cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedised design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialise. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organisation with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customise their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favour of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualisation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfil project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customised alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilised or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realise independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
New Covent Garden Market is the largest wholesale fruit, vegetable, and flower market in the United Kingdom. Redevelopment work launched in 2015 included a new security monitoring system, as well as a migration from analogue security equipment to an IP solution from FLIR Systems. New Covent Garden Market is a phenomenon in London, to say the least. The world-famous wholesale market provides 40 percent of London’s fresh fruit and vegetables eaten outside the home and serves 75 percent of London’s florists. With more than 175 affiliated businesses, New Covent Garden Market is the largest wholesale market in the UK. IP-based security system Redevelopment construction works started in 2015 and should continue until 2022 When London authorities decided to redevelop the entire site on Nine Elms and Battersea in order to meet future needs, it was clear that New Covent Garden Market was facing a huge operational challenge. Redevelopment construction works started in 2015 and should continue until 2022. In addition to a better road layout, improved waste management, and upgraded parking facilities, the market authorities wanted better security so that employees, tenants, customers and suppliers would feel safer. The organisation wanted to upgrade its legacy analogue CCTV technology to an IP-based security system capable of incorporating future upgrades. Surrey-based company Phoenix Integrated Security Limited, which had been the security solution provider for New Covent Garden Market for years, oversaw the security overhaul, as well. Future-proof system “We designed a security system together with the end customer and the site constructor so that it could meet today’s security standards again,” said Trevor Hearn, Director at Phoenix Integrated Security Limited. “We were looking for a future-proof system that was able to monitor this complex site and that was easy to work with for our security guard personnel. We looked at various manufacturers for this, but FLIR Systems was the only company that ticked all the boxes.” Phoenix opted for FLIR United VMS, which includes FLIR’s enterprise-level software solution Latitude, and a wide range of FLIR IP cameras. At the end of 2018, New Covent Garden Market already had more than 300 IP cameras installed across the entire site it intends to gradually upgrade all analogue systems over a five-year period. Wide range of cameras The image quality of the FLIR IP cameras represents a huge improvement over analogue The site combines a wide range of cameras, including the FLIR Quasar 4K fixed box camera, the FLIR Ariel Quad HD bullet camera, and the Quasar 1080p PTZ camera. The cameras offer high evidentiary detail and discreet, compact form factors. According to Hearn, the image quality of the FLIR IP cameras represents a huge improvement over analogue. Image quality is not the only benefit of using United VMS. Another valued feature is the platforms scalability. From 2016 onwards, New Covent Garden Market has been gradually replacing analogue cameras and storage equipment across the entire site, and Latitude has the flexibility to incorporate an unlimited number of channels. Body-worn cameras Operators have the flexibility to present their video sources on screen where they want and define user profiles to see only specific video sources from a given particular building, for example. “This project is an engineer’s dream,” said Hearn. “The FLIR Latitude system allows New Covent Garden Market to easily expand their camera network whenever they feel the need and to connect with practically any camera they want, including body-worn cameras. The Latitude system is also easy to couple with third-party systems, such as intercom and access control systems.”
In a highly visible, and competitive sport like Formula One racing, it’s not hard to understand why an organisation like Aston Martin Red Bull Racing attracts people who want access to their factory, and all the secrets contained within. Intrusion from unwanted visitors or vandalism is something that the people at Milton Keynes headquarters, in Buckinghamshire, England, want to avoid at all cost. Asset protection “Our Milton Keynes facility contains valuable technology and intellectual property,” says Mark Hazelton, Chief Security Officer. “At the same time, we are located alongside a public road, close to a residential area with high footfall. That is why it is critical for us to have high-performing security processes and systems in place, so we can effectively protect our assets as well as the people who work here.” The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing. Crafting the next Formula One challenger is done on the engineering site with a variety of buildings, including many office spaces, an R&D facility, manufacturing and storage areas. The design, testing, building and assembling of thousands of parts required to construct each race car all happen in house. About 750 people are employed at Milton Keynes and some parts of the factory are operated on a 24/7 basis. Site and facility security “As our site has grown, our previous CCTV system was no longer sufficient to provide adequate security monitoring,” says Caroline Tierney, Infrastructure Project Manager at Aston Martin Red Bull Racing. “Our CCTV installation was no longer state of the art and we wanted to ensure that we made best advantage of the improving technology available. We were also looking to make it easier to retrieve information from the system.” Aston Martin Red Bull Racing started to look out for an updated CCTV system, investigated different options and ultimately selected FLIR Systems as their technology provider through a local IP security system integrator. Quasar HD and 4K cameras The facility is now equipped with some 120 cameras, both visual and thermal, that cover the entire area 24/7. Cameras on site include FLIR’s visual Quasar HD and Quasar 4K, the latter presenting four times the resolution of the HD camera and, therefore, able to cover larger areas with less cameras. The facility also makes use of the Quasar Hemispheric Mini-Dome, which provides 360° immersive viewing, and of the thermal FLIR FC-Series ID camera, which includes onboard video analytics capable of classifying human or vehicular intrusions. The entire camera network is managed by FLIR’s Latitude Network Video Management System (VMS). FLIR thermal cameras The image quality that we get from the new range of visual FLIR cameras is truly impressive" “The image quality that we get from the new range of visual FLIR cameras is truly impressive,” says Zoe Chilton, Head of Technical Partnerships at Aston Martin Red Bull Racing. “It’s amazing what kind of image quality can come out of such a compact camera unit.” The FLIR thermal cameras have powerful video analytics on board, which makes them extremely useful as intrusion protection devices at several strategic locations across the Milton Keynes site. With the FC-Series ID camera, you can set custom trip lines and regions of interest that will trigger alarms for human or vehicular intruders, even at night or in poor weather conditions. Upon the detection of an intruder, an alert is sent over to security personnel via email. FLIR Latitude VMS The FLIR Latitude video management system is the backbone of the system, allowing Aston Martin Red Bull Racing personnel to easily view, playback, search and export video from a scalable number of cameras. “In the past, when we wanted to investigate a particular incident in more detail, it used to take a long time to actually retrieve the information we needed from our video recordings, but with the new FLIR Latitude VMS, this is much more straightforward and we save a lot of time,” says Tierney Comprehensive camera network The cameras used in the network around the Milton Keynes site are relatively small in size. And there’s a very good reason for that, according to Chilton. “Of course, it’s important to have the best image quality possible, but on the other hand, we don’t want our cameras to be too large and imposing either.” The Milton Keynes headquarters receives visitors, customers and partners every day. For Aston Martin Red Bull Racing, it’s important that everybody feels welcome: “While we need our site to be secure, and the cameras are of course important, we don’t want them to be the first thing visitors see when they arrive to visit us, " said Chilton. "I think that the FLIR cameras strike that difficult balance between security and subtlety really well.” The cameras can also be used to check whether visitors are using the parking lot correctly FLIR security monitoring system Other than the security aspect, there are other practical benefits of having a comprehensive camera network, as well. The cameras can also be used to check whether visitors are using the parking lot correctly, to track contractors around the site, and just for general site management purposes. The selection of the FLIR security monitoring system fits into a long-standing technology partnership between FLIR and the Aston Martin Red Bull Racing team. Since 2014, the team has been integrating FLIR cameras for a wide variety of uses around the factory and track, from electrical maintenance, test rigs and security on site, to tyre temperature assessments in the garage. High product quality The high product quality and innovative approach FLIR takes to developing new solutions for the challenges of Formula 1 makes a great fit with Aston Martin Red Bull Racing’s desire to push the boundaries of available technology for developing their cars.
Merthyr County Council were experiencing high levels of break-ins and thefts in its three household recycling sites resulting in high repair and replacement costs. The Council employed a security company to man guard three sites which cost over £150,000 per annum however, the break-ins were still occurring. The Gallagher Channel Partner designed a solution to detect, deter and protect. They installed a Gallagher Monitored Pulse Fence to detect intruders climbing or breaking through the fence, deter by delivering a short, sharp but safe shock, while protecting the Council's assets and on-going operation. Cost-effective installation The system was retrofitted to an existing fence structure ensuring an easy, efficient and cost-effective installation. Since the fence was installed break-ins have ceased and the requirement for man guarding is no longer needed. Electrical Statutory Compliance Inspector at Merthyr County Council, Les Lewis, said: “I was thrilled with the completed project. Not only is it aesthetically pleasing, but it has met all of our security requirements. It has also helped make huge cost savings as we no longer require manned security out of hours or need to repair damaged fences and replace expensive assets. I believe the Gallagher system will pay for itself within 18 months.”
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Hikvision Security monitoring system
- Seagate Security monitoring system
- BCDVideo Security monitoring system
- MobileView Security monitoring system
- LILIN Security monitoring system
- Pelco Security monitoring system
- Arecont Vision Security monitoring system
- Hanwha Techwin America Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- VIVOTEK Security monitoring system
- Sony Security monitoring system
- DSC Security monitoring system
- Optex Security monitoring system
- FLIR Systems Security monitoring system
- Parabit Security monitoring system