Security monitoring system
Genetec Inc, a technology provider of unified security, public safety, operations, and business intelligence solutions has become the fastest growing providers of Automatic Number Plate Recognition (ANPR) technology, according to a recently-released report by IHS Markit. According to the report ‘ANPR and Detector Sensors Report – 2018’, Genetec has now become a top 5 global provider of ANPR technology for surveillance applications (which includes ANPR for access control, trave...
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced that the Avigilon H4 IR PTZ (Infrared Pan-Tilt-Zoom) camera has been selected as one of the recipients of Asmag’s Buyer’s Choice Awards for 2018. Winning in the network cameras category, the Avigilon H4 IR PTZ camera line combines patented Avigilon self-learning video analytics with zoomable infrared (IR) technology to provide broad coverage and exceptional image quality in a range of lighting con...
The global market size of surveillance is projected to nearly double by 2024, according to a report from Market Study Report. Technological advances, increased public awareness of the role of surveillance, and an increased adoption of artificial intelligence solutions are all driving demand for products and services in the electronic security industry. Major players are already making moves to grow their market share, so how can other businesses be sure they get their piece of the growing video...
Matrix NVRs are packed with high end processors to deliver all the functionalities like high resolution recording, playback, simultaneous local and remote monitoring along with storing for higher number of days. Furthermore, these latest NVRs are also backed with an intelligent software to detect threats and send instant notifications for real-time security. All in all, these comprehensive, flexible, reliable, integrated NVRs provide a proficient, persistent and a preventive security solution s...
BlackBerry Cylance, a business unit of BlackBerry Limited, announces the introduction of CylancePERSONA, the first proactive, native AI behavioural and biometrics analysis solution for the security industry. CylancePERSONA adds user monitoring to the company’s expansive defence of the enterprise and augments the AI-driven prevention, detection, and response capabilities of the Cylance native AI platform. This lightweight solution combines continuous biometric behaviour and user conduct mo...
Comelit Group, as a founder Partner to The Security Event, will be exclusively presenting its very latest smart solutions in stylish door entry, home automation, fire and CCTV at the premiere industry exhibition. On stand SE28, Comelit will be launching its innovative Switch solution, which has been developed solely for installers to enable a simple ‘switch’ upgrade to an audio or video panel option. Easy upgrade opportunity Also exclusively previewed at The Security Event is Come...
At ISC West, in booth # 26061, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence will unveil a new version of Security Center, the company’s open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. With customisable live dashboards, enhanced privacy protection features, a brand-new map-driven mobile app, and new functionalities that help users actively monitor the health of their system and ensure compliance with cybersecurity best practices, version 5.8 will ensure that users can optimise their physical security environment while benefiting from greater visibility into their operations. Valuable contributing sensor Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system Security Center 5.8 will enable users to create custom dashboards that will display real-time data, such as video feeds, alarms, reports and charts in a way that is meaningful to them and their specific job function (security, operations, IT etc.). Users can set up their dashboards using simple point-and-click tools, and instantly combine data from the entire Genetec portfolio (video, access control, ALPR, etc.) in one screen to gain a new perspective on the evolution of events and key metrics across their operations. Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system when they are on the move and allow them to turn their smartphone into a valuable contributing sensor to their security system. Map-oriented interface In addition to recording incidents, accessing nearby video, access control, and ALPR devices as well as sharing video from their phones to Security Center, the new mobile app will let operators share their location with colleagues in the operations center, send in-app messages and share live and recorded video through an intuitive map-oriented interface. Key features will include: Video (live and recorded playback, PTZ controls, bookmarking, time- and event-based reports) Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information. Physical security devices With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes System administrators are acutely aware of the critical nature of security systems, but often lack the tools to assess the potential exposure of their software, operating systems and physical security devices. Security Center 5.8 will introduce a new Security Score feature to track each system’s compliance with hardening guidelines, firmware availability and updates, password strength, as well as several other dimensions of cybersecurity. Available through the built-in System Health dashboard, the Security Score will measure individual cybersecurity processes and verify that they are followed by the system. This will enable users to get a better understanding of the cyber security risks they face and enable them to take the necessary steps to harden their system. With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes, loss of image quality or tampering, and alert administrators immediately. This allows them to get ahead of problems and take the necessary corrective action immediately, rather than wait to find out there is a problem when they need footage and it is not available.
It’s the first quarter of a New Year and businesses are already busy reviewing budgets for ways to save money. One line item that can impact business the most – loss. Employee theft alone is a crime that costs U.S. businesses $50 billion annually*, according to Statistic Brain. So if you aren’t sure who is keeping watch over your property and assets, and how they reduce preventable loss, it might be time for a security audit. According to GuardOne, the security patrol and remote video monitoring company, more than 400,000 businesses in the United States experience theft, robbery, vandalism, and criminal acts each year. The company advises that all businesses should consider the reality that thefts and other crimes can happen on their premises. They note that having the right systems in place can prevent these occurrences. Protecting employees, guests and property We are experts at using video monitoring in conjunction with security guards to maximise coverage while minimising security costs"“Some types of businesses – such as banks, convenience stores, and high-end retailers – are a natural target for theft. But if you have the right security partner, your employees, guests, and property will be protected,” said Robert Copeland, President and CEO of GuardOne. “We are experts at using video monitoring in conjunction with security guards to maximise coverage while minimising security costs.” It may be time to reassess your security needs “if” your company is: Experiencing retail shrinkage, equipment, or inventory loss. The National Retail Federation reported that retailers lost nearly $44 billion from theft in 2014, with 34 percent of these crimes committed by employees. Theft accounts for tremendous profit losses for retailers. A trained guard or surveillance camera will help reduce your losses, increase your profits, create a deterrent for would-be thieves, and help catch criminals in the act. Having issues with squatters, damage or vandalism. If your office, warehouses, parking lots or distribution centres are unattended at night, the risks of vandalism, squatters, and damage rises. Businesses – including car dealerships, warehouses, retail locations, and empty campuses – benefit from security monitoring that deters these crime risks. Experiencing issues with your parking lot, garage or business perimeter. Employees and customers may feel uncomfortable walking to their cars at night, particularly if the parking lot is not well lit or heavily trafficked. Unattended parking lots can attract vandalism, theft, muggings and other crimes to people. A patrolling security guard can reduce these risks, serve as a crime deterrent and ensure the safety of people and property. Located in a high crime location. “High crime” doesn’t necessarily mean a bad neighbourhood. It could include a location in a sparsely-populated area that attracts loiterers and vandals. Risk may be reduced through high tech surveillance. Keeping incomplete safety records. Company employees are often tasked with day-to-day record keeping regarding safety, personnel and property, and may not be trained for this task. F or example, if a door is repeatedly left open, a security guard will notice (and record) that pattern. Then, he or she will investigate causes like whether the door’s lock is faulty or if an employee is leaving the door open to sneak back in later. Because the guard works for the security company and not the business, he or she can provide objective third-party records (and testimony) for events like employee termination, liability issues, and workplace injuries. Experiencing heavy traffic. Businesses that have high-volume traffic will benefit from on-site security guards to manage security and liability concerns, check guests’ IDs, log people in and out, handle crowd control, search guests for contraband, and respond to incidents and alarms. Unprepared for emergencies. Security guards are equipped to manage a wide range of emergencies, medical emergencies, natural disasters, terroristic threats and more. They are trained to act quickly, responsibly and sensibly regardless of the circumstance. Experiencing the threat of a lawsuit. Has your company been targeted for frivolous lawsuits or false claims? You may encounter physical fights between employees or customers, harassment claims, or employees ‘faking’ an injury to spark a lawsuit against your business. Security guards and surveillance cameras can protect you from all of these unfortunate scenarios (and more). Assessed by employees as an environment where they don’t feel completely safe. Protect your employees and your property with a high-quality safety system. The right security company will safeguard your assets, protect your employees, and improve your day-to-day business operations by fixing observable problems and delegitimising false claims. Unreachable during off hours. If you have unreliable security detail that doesn’t always show up for work, won’t answer a call or text or you can’t ever reach loss prevention management, it’s time for a change. Security should be the one thing you don’t have to worry about. If it’s reliable, it just happens. Preventing crime and keeping people safe “Securing your business helps your staff and customers feel more comfortable, knowing that you’re taking concrete steps to prevent crime and keep them safe. Many companies have found that investing in on-site security was one of the best choices they ever made,” says Copeland.
The provider of industrial lighting, Larson Electronics LLC, releases a solar-powered LED surveillance tower that features two IP security cameras, four 265-watt solar panels, a 1,000aH capacity battery bank with a battery charger, a solar generator and a telescoping mast that deploys eight LED light heads and the two security cameras up to 20 feet. The entire assembly is mounted on a single axle aluminium trailer for easy transportation, making this light tower ideal for remote and rugged locations. The SPLT-1.06K-LM20-8XWP50-2XPTZ.23X-2TB-AT-BC-W4G is a complete, portable solar-powered surveillance system for outdoor and remote locations. Providing high performance This solar security assembly comes with a 2TB, 8-channel network video recorder compatible with two-way audio streaming This powerful security system is equipped with two cutting-edge 1080p full HD high-resolution security cameras that provide operators with precise 20x optical zoom, integrated long-range IR LEDs with an 850nm wavelength, day/night capabilities, MP4 format, as well as H.264 and MJPEG video compression. These IP cameras are IP66 rated providing high performance in outdoor locations. These explosion proof cameras with Power over Ethernet (PoE) features enable data transfers and power to be passed through a single Ethernet cable. This solar security assembly comes with a 2TB, 8-channel network video recorder compatible with two-way audio streaming. Installation only takes minutes via plug-and-play, which automatically detects, displays and configures system components. Withstand demanding conditions When using the NVR, operators may access a 1080p monitor that is virtually borderless, for side-by-side screen setups that flow together almost seamlessly. This video recorder accepts USB mouse and keyboard inputs. The four included 265-watt solar panels generate a total maximum output of 1.06 KW and have a 45-degree tilt for optimised sunlight exposure The four included 265-watt solar panels generate a total maximum output of 1.06 KW and have a 45-degree tilt for optimised sunlight exposure. The tower is equipped with eight 50-watt LED lights. The light assemblies each consist of four 12.5-watt LEDs paired with high purity specular optics to produce a light output distance comparable to that of a 400-watt metal halide. The LED wall packs are housed in a waterproof aluminium housing that is powder coated for added durability and resistance to corrosion and designed to withstand demanding conditions of an outdoor environment. Effective monitoring system Each lamp can be powered on individually, allowing operators to power one lamp or all eight lamps at a single time. Rounding out this security solution is a NEMA 3R component control box with a component cooling system, and 1.06 kW solar generator. Connectivity features are facilitated by a 4G/LTE rugged router. Equipped with built-in security, the unit offers 600 Mbps internet speeds (minimum). The internal router can be utilised to monitor uptime and for real-time alerts. Customers must provide their own 4G service/plan for the router, as the system does not come with an internet plan. “The SPLT-1.06K-LM20-8XWP50-2XPTZ.23X-2TB-AT-BC-W4G is a total security package, ideal for live events, outdoor surveillance and other law/military applications,” said Rob Bresnahan, CEO of Larson Electronics LLC. “The IP camera, solar panels, high output LED lights, generator, battery bank and the tower/trailer assembly that pulls it all together provides operators with an effective monitoring system for temporary and outdoor jobs.”
Panasonic Business opens the doors to its new Customer Experience Centre in Bracknell, showcasing its range of cutting edge B2B solutions both physically and virtually. Situated at the new UK headquarters on Western Road, Bracknell, the Customer Experience Centre is experienced as two zones. The first is an immersive 270 degree interactive presentation space, built around eight separate virtual vertical environments, and a demonstration space that allows customers to get hands-on with the latest Panasonic technology. The showcase delivers a ‘blank canvas’ for innovation, designed to spark conversations around how Panasonic can solve business technology challenges. Daily business challenges Featuring AV design and integration by Sysco Productions, concept development by AB Creative, and content and physical build by Hart Wilcox, the Customer Experience Centre features over 100 items of technology, with the presentation space squeezing an impressive nine laser projectors in to just 50 square meter in order to achieve a fully immersive feel. The new Customer Experience Centre provides a platform upon which we can work with our customers to solve their daily business challenges" Powered by two disguise 4x4pro media servers, the customer’s name is skilfully integrated in to the content in real time, to personalise the experience. “By quietly and reliably powering their capability our technology frees businesses to perform to their maximum,” says Simon Grantham, Managing Director of Panasonic UK on opening the Centre. “The new Customer Experience Centre provides a platform upon which we can work with our customers to solve their daily business challenges.” Automatic stock monitoring The Centre focuses on five main topics: Retail technology Rugged computing Audio Visual solutions Communications Solutions Next generation surveillance technology Among other things, the Experience Centre features the latest in Panasonic retail technology, including digital signage displays, electronic price tags and automatic stock monitoring, which uses CCTV analytics to detect low and no stock on shelves. In addition, a fully demonstrable lecture capture system automatically tracks a presenter, giving universities the ability to automate the recording of teaching sessions. Facial recognition platform All visitors are handed a 5” Android Toughbook rugged handheld on which a dedicated app allows them to select content of interest, ranging from white papers to brochures and introductory videos, via cleverly integrated NFC tags throughout the experience centre. These case studies are then emailed to the customer for follow-up, back in their office. The Face Server can identify faces that are difficult to recognise using conventional technology A smart security section features the latest in modern analytics software. A range of indoor and outdoor surveillance cameras are equipped with an upgraded facial recognition platform which features a ‘deep learning’ core engine that has ranked as the industry’s most accurate in independent testing by NIST. The Face Server can identify faces that are difficult to recognise using conventional technology, including those partially hidden by sunglasses and face masks. Rugged resistance test A range of Toughbook rugged notebooks and tablets is also on show, with a rugged resistance test station, which allows water ingress, drop and impact testing of the range. “We are bringing the latest technology for retail, transport, logistics and entertainment in one place. We hope to immerse visitors into our Panasonic world, inspire their creativity and ultimately prove our solutions can strengthen their business in an increasingly competitive landscape,” added Simon Grantham. The Customer Experience Centre is built around a newly launched B2B brand proposition ‘Freedom through innovation’, which is the belief that the future is about better connected technology. That businesses will succeed if they can simply focus on their customers, in the knowledge that the technology solution delivering their capabilities just works. And works together.
STANLEY Security, one of the security providers, launches a new Dealer Programme aimed at independent installers looking to expand their businesses without the risks associated with rapid growth. The new STANLEY Security Dealer Programme provides installers with the considerable competitive benefits that come from being associated with a major global brand, backed up by national security infrastructure and expertise, whilst maintaining their independence. The Programme will enable partners to capture new growth opportunities in both commercial and residential security by helping them stand out in a competitive market place and by providing their customers with a wider range of security solutions and services than would be possible for a smaller, regional company. Customer satisfaction These security solutions include an array of products and systems for both home and business security These security solutions include an array of products and systems for both home and business security that have been heavily invested in by STANLEY Security and that are available at reduced costs as a result of the company’s substantial purchasing power. The range of services available to companies in the STANLEY Security Dealer Programme is equally impressive and includes STANLEY Assure in-house financing (a key consideration for end users and a major selling point); a Customer First Team, set up to provide top rate customer satisfaction; plus a selection of security monitoring options from a self-service app to STANLEY’s Category 2 NSI Gold Standard BS5979 accredited Alarm Receiving Centre (ARC). Lead generation support Under the STANLEY Security Dealer Programme, partners continue to work with their customers as before, but with STANLEY Security supporting them and providing the customer after-sales and service support. In other words, the dealer makes the sale, supplies and installs the equipment. STANLEY Security buys the service contract from the dealer and pays multiples based on the terms of the contract. To maximise ROI, the STANLEY Security Dealer Programme features fast onboarding, including training on STANLEY products and services and a certification process. Once certified, and with a partner agreement in place, dealers reap the rewards of affiliation with STANLEY Security. An attractive incentive programme is in place as part of the scheme, along with quick payments, a dedicated, experienced remote support team, lead generation support in the form of marketing and sales tools, and ongoing training to ensure dealers are kept up to date with the latest developments in security. Independent security companies Stanley Security’s dealer support is light years ahead of the competition" “The STANLEY Security Dealer Programme is the best of both worlds” comments Dan Hindley, STANLEY Security UK Channel Manager. “Independent security companies continue to use their skills in sales and installation, but with the added advantage of our expertise in designing, delivering and servicing security solutions. They get to fast track their business without the pain points and we have the benefit of extending our customer reach.” The STANLEY Security Dealer Programme model has already proven successful. “Stanley Security’s dealer support is light years ahead of the competition. We’re proud to be a Stanley Dealer as it reassures our clients that they’re in the best hands,” comments Trevor Williamson Operations Manager at TRECC. The STANLEY Security Dealer Programme will officially be launched on the 21st February at Security TWENTY 19 Birmingham, at the Hilton Metropole Hotel at the NEC, and supported by a wide media launch.
Agent Video Intelligence announces its seventh annual Channel Partner Awards, honouring members of its Channel Partner Program. This special accolade recognises six partners for their exceptional partnership and efforts during 2018 in their respective regions. Exanet is the Agent Vi Outstanding Partner of the Year for 2018, recognised for their professionalism in winning deployments such as the Vicente López Safe City project, and other large-scale municipal projects in Argentina. Furthermore, Exanet has shown dedication to joint marketing and promotional efforts of Agent Vi’s on-premise and hosted video analytics solutions. Technical expertise Exanet is a pioneer in planning, development and implementation of video surveillance solutions This is the second year in a row that Exanet has been given an Agent Vi Channel Partner award. Exanet is a pioneer in planning, development and implementation of video surveillance solutions. With more than 10 years of experience in the security market and a presence in Argentina, Uruguay and Chile, Exanet’s mission is to provide its clients with solutions that add the most value to their business and adapt to their specific needs. G4S Secure Integration has been given the Agent Vi Channel Partner Award for North America for their high levels of technical expertise, close cooperation in marketing and sales to Tier 1 enterprises in North America, and for their commitment to provide Agent Vi’s technologies to their customer base. Cloud implementation Additionally, G4S is at the forefront of delivering Agent Vi's innoVi solution to the utility market including a large customer-hosted private cloud implementation for a major global utility provider. G4S Secure Integration is a systems integrator who brings innovative, flexible and cost-efficient thinking to the design, construction and maintenance of stand-alone or integrated communication networks and security systems. G4S Secure Integration has designed and deployed thousands of complex security systems for utilities, municipalities, federal, state, local government agencies, healthcare providers, corporations and higher education. G4S Secure Integration has several extended centre of excellence capabilities, including design and engineering, technology and managed services. Risk prevention TICSA is at the forefront of consolidating infrastructure, experience and knowledge for risk prevention Thousand International Companies has been awarded the Agent Vi Channel Partner Award for Central America & Latin America for remarkable deployment and sales of Agent Vi’s solutions, commitment to promoting and advancing Agent Vi solutions in the Mexican market, and for working closely with Agent Vi to win large contracts, including two government contracts in Mexico in 2018. Thousand International Companies (TICSA) is a professional products and services integrator specialising in the field of security through the application of information and communication technologies. TICSA is at the forefront of consolidating infrastructure, experience and knowledge for risk prevention, that translates into valuable solutions for our clients. Tailored solutions Axone Systems has received the Agent Vi Channel Partner Award for Europe, Middle East & Africa for its commitment to Agent Vi and outstanding sales activity. As a distributor for the French market, Axone has introduced Agent Vi to local French systems integrators, going on to win multiple projects during the year, including a major transport authority installation in France. Axone Systems is a distribution company specialising in CCTV, video analytics and PSIM solutions for large and complex projects. Axone's objective is to help its customers by designing, customising and deploying tailored solutions answering their exact needs. For Axone, a good system must be KISS (‘Keep it Simple, Stupid’), and all Axone solutions are provided in this spirit. Exceptional partnership Global Guardian has been given the Agent Vi Central Monitoring Partner Award for North America for commitment to presenting and deploying Agent Vi across their service network, and delivering highly accurate, cost-effective monitoring solutions to their end user community. In addition, Global Guardian has exhibited exceptional partnership, including joint marketing and promotion of the innoVi Remote Guarding hosted solution. Global Guardian is a provider of world-class security solutions, custom-tailored to the individual needs of its global client base Global Guardian is a provider of world-class security solutions, custom-tailored to the individual needs of its global client base. Services include personnel tracking, emergency response, security and transportation support, intelligence and due diligence medical support and transportation, emergency and custom aviation, cyber security, and video surveillance monitoring. Global Guardian seamlessly integrates as many of these capabilities as needed and delivers them 24 hours a day under the close guidance of its Operations Center. Systems integrators Community Active Protection (CAP) is the recipient of the Agent Vi Central Monitoring Partner Award for EMEA for the implementation and rapid expansion of the innoVi Remote Guarding solution in South Africa. Additionally, CAP is being commended for actively marketing and promoting innoVi Remote Guarding among end users and systems integrators in their local market. CAP (Community Active Protection) was founded against the backdrop of increasing frequency and violence in residential suburbs. Since inception, CAP has been instrumental in eliminating crime in suburbs through its proactive, professionalised and strategic focus. It operates through a not for profit business model which allows for all collected funds to go directly back into the area to combat crime and is accountable to a board of volunteer members who are the founding members of CAP.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterised by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability issues of event security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organisers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic approach and technology integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behaviour analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged security and smart cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
Open architecture in physical access control is built around Mercury Security’s access control panels, the de facto standard embraced by more than two dozen access control original equipment manufacturers (OEMs). Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments related to the Mercury platform. MercTech4 highlighted a new generation of access control products, which are increasing the capabilities for Mercury OEMs in areas such as two-way communication and encryption. Enhancements include use of the OSDP (Open Supervised Device Protocol) v2 communication standard instead of the older (and less flexible, less secure) Wiegand standard. Other advantages are relay count activations, a crypto memory chip and default encryption, a critical feature ensuring greater cybersecurity. Integration of hardware with physical security Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system. Mercury also provides hardware integration at the controller level with elevator manufacturers such as Otis, Kone and Thyssenkrupp, including “destination dispatch,” which groups passengers going to the same floors into the same elevators, thus reducing waiting and travel times. Mercury hardware is sold exclusively through OEM partnerships. The new LP4502 controller and access control platform use the Linux operating system Integration of Mercury controllers with LifeSafety Power’s IP-based intelligent power supplies enables system health and diagnostic data to be shared for preventive maintenance. Mercury also offers several “bridge” products to enable its OEMs to transition installed proprietary systems from outdated Casi-Rusco (GE), Software House I (Tyco) and Infographics (GE) technologies to an open platform using Mercury hardware. Business as usual Other recent news for Mercury is the company’s acquisition by HID Global last fall. Mercury Security President Matt Barnette says the acquisition will not impact how Mercury goes to market. “It’s business as usual,” he says. “It’s 130 days into the acquisition, so it’s still early on, but we are continuing to do what we do.” Steve Carney, HID Global’s vice president of product marketing for physical access control, provided an update from the HID Global perspective to MercTech4 attendees. He reiterated that there would be no change in Mercury’s OEM go-to-market strategy. HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud He emphasised that Mercury’s team and talent remain core to the brand, and HID will develop a roadmap for improved combined solutions among the controller, reader, credential and cloud. Open architecture companies throughout the access control industry – Mercury’s OEM partners – are incorporating the new boards into their products, each putting their “spin” on those capabilities and expanding the functionality of their systems. At MercTech4, seven of those OEMs hosted small groups of consultants in focused meetings to highlight what’s new with their products. Lenel honoured as 'Platinum Premier' partner Lenel, Rochester, N.Y., has been a Mercury's OEM partner since 1995. Lenel is Mercury’s first-ever "Platinum Premier" partner. In recent years, Lenel’s OnGuard system has evolved into a fully browser-based system providing both alarm and cardholder management through web browsers, and access to the platform on a computer, laptop or tablet. OnGuard WATCH (Web Access Trending and Comprehensive Health) provides system monitoring tools and health checks, such as tracking CPU usage and logging error files. Lenel has introduced its own BlueDiamond mobile credentialing system based on Bluetooth Low Energy and deploying mature technology previously used by sister UTC companies for real estate locks and in the hospitality market. Feenics, an Ottawa, Ontario, cloud-based access control company, was also among the Mercury OEMs participating in MercTech4. The Keep by Feenics platform is scalable from a single door to a global enterprise environment. A RESTful API provides easy connection of third-party applications. Feenics emphasises cybersecurity in the cloud, using Amazon Web Services, Transport Layer Security (TLS) encryption, and Veracode penetration testing. They use MongoDB open source database replica sets instead of Microsoft SQL. Mercury and several of its OEMs teamed up March 3-4 to present MercTech4, a conference in Miami aimed at updating security consultants about the latest developments Integration and encryption RS2 Technologies, Munster, Indiana, is another Mercury OEM highlighted at MercTech4. Their top vertical markets are K-12 schools, utilities, healthcare and government. RS2’s features include a PSIA-compliant interface, compatibility with BACnet and the Pinwheel DME (Data Management Engine) for bi-directional database integration.RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer RS2 offers web-based support, and each edition of the Access It! software implements features suggested by customer. Product enhancement is a focus of RS2’s engineering. Open Options, Addison, Texas, is a Mercury Platinum Elite partner whose customer base spans every vertical, and whose feature set reflects customer feedback. Open Options offers Mercury hardware mounted inside a sleek plastic enclosure, among other form factors. The company emphasises an open business culture and dedication to customer service. Customer support is a direct phone line to speak with a live person every time to get any issue resolved. Open Options’ DNA Fusion Version 7 platform includes new features such as an updated user experience. DNA Fusion interfaces seamlessly with security technologies — including video, biometrics, wireless locks, and more. Last year, Open Options marked 20 years of partnership with Mercury Security. Engineering for the masses Avigilon, Vancouver, B.C., is embracing new Mercury products in its completely browser-based Linux platform that can scale from entry-level to enterprise systems. The ACM (Access Control Manager) software is engineered for IT professionals and is updated every 60 days. For Avigilon, access control is a component of a broader approach that uses analytics and self-learning to manage massive amounts of data and provide the information an operator needs. The Linux-based system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance The system uses features such as the Avigilon “Appearance Search” capability to shift operation of security systems from a reactive to a proactive stance. Genetec, Montreal, Canada, emphasises the value of its “unified” approach that combines video, access control and automatic license plate recognitions into a single platform – designed from the ground up – that incorporates communications, intrusion detection and analytics. Cybersecurity failures prominent in the news often occur because of negligence – the customer had not implemented a software patch, for example. Genetec helps to manage such concerns. When cameras are deployed in the Genetec platform, the system provides an alert if a new camera firmware version is needed. The Genetec Update Service (GUS) notifies customers of any needed software updates. Prominence of cybersecurity Honeywell’s Win-Pak access control software is integrated with the Pro-Watch security management suite. Cybersecurity is a corporate priority for Honeywell, whose products follow the SDLC (systems development life cycle) process with security requirements based on the ANSI/ISA 62443-3-3 standard. Microsoft's Threat Modelling tool identifies entry and exit points of systems that an attacker could exploit, providing the development team an attacker's viewpoint. The secure product development process includes static code analysis, secure code review, code signing, binary scanning and component inventory. Products are thoroughly tested by the Product Security Assurance Team and at times by an Advance Independent Testing Team. If vulnerabilities are identified after release, they are handled by the Product Security Incident Response Team. Cybersecurity issues dominated a consultant roundtable event on the second day of MercTech4. There was plenty of spirited discussion and some valuable insights among the 40 or so participating consultants. More to come on that in another article in the next couple of weeks.
Genetec Inc., a technology provider of unified security, public safety, operations and business intelligence solutions, announces its solutions have been selected by the Royal Borough of Windsor and Maidenhead (RBWM) for region-wide CCTV monitoring and community safety purposes. The new system will result in better coverage across the borough and enable information to be quickly shared with regional police as and when required. At the heart of the programme is a completely refurbished monitoring centre, equipped with the Genetec flagship unified security platform Security Center and other complementary Genetec security solutions. KiwiVision privacy protector The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change These include the KiwiVision Privacy Protector to simplify GDPR compliance, Genetec Mission Control to guide operators in providing a consistent response to incidents and Genetec Clearance for the easy and secure sharing of evidence with local law enforcement. The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change. It also allows RBWM to protect its past investments by retaining the majority of its existing cameras, alongside the 200 that will be added, upgraded or relocated. “The safety of residents and visitors in the borough is a priority, and we are pleased to be installing a new-state of the art system that delivers this,” said Cllr. Mike Airey, cabinet member for environmental services. Improved information sharing “We not only benefit from reduced operating costs and improved information sharing with local police, but we also gain access to cutting edge privacy controls that make it far simpler for us to maintain our compliance with the EU GDPR and other data protection regulations.” The project began when specialist town centre video surveillance consultancy firm Global MSC Security (MSC) was called in to assess the Royal Borough’s existing analogue video surveillance system, its fitness for purpose and how it could be cost-effectively improved. This resulted in a competitive tendering exercise won by Computerised & Digital Security Systems Ltd. Cost-effective response (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system. Some of the key technical benefits delivered by CDS include full HD recording, advance graphical mapping, advanced incident response, customisable and extended video storage retention, and various features to aid data protection regulation compliance such as automated pixelisation of images and end-to-end encryption to enhance privacy controls “Genetec is delighted to see our solutions chosen by the Royal Borough of Windsor & Maidenhead for this well thought out upgrade that will benefit the council, local police and citizens”, added Dan Meyrick, Regional Sales Manager, Genetec Inc. “I would like to thank and congratulate our partner CDS for producing a high quality and cost-effective response that delivered against the customer’s requirements.”
Aston University, Birmingham, is transforming security and safety with the introduction of SafeZone for students and staff on campus and those travelling globally. The SafeZone solution, from CriticalArc, will put users directly in touch with the university’s security control room using their mobile phone, enabling them to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. SafeZone was selected following a detailed comparison of alternative systems, says Mark Sutton, Head of Security and Emergency Planning at Aston University. Resource management capabilities “While some alternatives offered individual features that were attractive, none of them combined all the functions and benefits in the way that SafeZone does,” he says. What we are investing in is a comprehensive solution that allows our security team to engage much more closely with students and staff" “What we are investing in is a comprehensive solution that allows our security team to engage much more closely with students and staff, and to work in a more integrated way with the university’s various departments and within its senior management structure. It also gives us important additional functions including lone worker protection and resource management capabilities.” The technology works by letting Aston’s control room operators pin-point the locations of individuals who elect to check-in using a simple app on their smart phones, including staff, students, service users and members of the security team. Reporting suspicious activity This app makes it easy for students, staff and school’s using the system to communicate directly with security responders, calling for help, asking for advice, reporting suspicious activity etc. And in return security teams can send out alerts and safety instructions to groups or individuals, in specific locations, as individuals or by specified user type. Notifications can range from helpful advice to alerts regarding specific threats. Officers responsible for emergency response management can also monitor activity patterns of those who choose to check-in, seeing where people are gathering during an incident for example. And they can co-ordinate resources, keeping track of where known first aiders are, or seeing exactly how team members are deployed, minute by minute. Significant placements programme The benefits of SafeZone bring together features found in an assortment of systems – including lone-worker protection - making them available in a unified, scalable package. There are also new options for users to collaborate with the growing global network of SafeZone system operators. At Aston University stakeholders such as the students’ union, staff and department heads have been fully engaged in the roll-out of the new system At Aston University stakeholders such as the students’ union, staff and department heads have been fully engaged in the roll-out of the new system. “Safety is a big issue, particularly for city centre campuses,” says Mark Sutton. “Prospective students and parents want to know how well we look after our community, so we see SafeZone as an important new benefit.” Aston also has a growing international reputation and a significant placements programme, with students and staff travelling around the world to work. Safety monitoring With the ability to ‘geo-fence’ any location in the world that has a signal, the university’s security team will now extend the same level of customer care and safety monitoring to all users, whether they are on campus, in accommodation blocks or associated sites around the city, or working abroad, says Darren Chalmers-Stevens, Managing Director EMEA and APAC for CriticalArc. “We are delighted to be working with Aston University’s security and emergency response team to help them provide the best available monitoring and protection for all their people, in all situations and wherever they are. In addition, they are benefiting from a wide set of extra functions which would otherwise have to be purchased separately - including lone worker protection and health & safety compliance.” There are also important, emerging benefits which CriticalArc is developing alongside its community of users, confirmed Darren Chalmers-Stevens. “These were discussed during our recent two-day user group conference in February.”
When iconic Dublin restaurant and super pub Café en Seine was totally redesigned and refurbished, Create Security Solutions was called in to provide an extensive but discreet video surveillance system, for the protection of customers and staff. Create worked with Hikvision to design and install a network video system that delivered on Café en Seine’s need for a high quality, aesthetically pleasing security solution. In the very heart of Dublin’s city centre on Dawson Street lies one of the city’s most iconic and aesthetically stunning venues. Café en Seine, established more than 25 years ago in 1993, has long been a go-to destination for Dubliners and visitors alike. And now its legacy continues, with a brand new redesign, featuring several beautiful dining areas and a host of bars and bespoke event spaces – and a unique indoor Parisian street garden, with room for 250 guests for special events. High-end food experience Café en Seine offers an extensive food menu which caters for a range of tastes and occasionsRenowned for its five-star service, and described as Dublin’s first ‘super pub’, Café en Seine offers an extensive food menu which caters for a range of tastes and occasions. Head Chef Stephen Gibson and his team provide simple, fun dishes, bursting with seasonal flavours, designed for sharing. It’s a high-end food experience in a casual dining atmosphere. Unsurprisingly, the team at Café en Seine are also experts when it comes to drinks. The cocktail menu has been specially curated by the team behind Crucible, London to ‘enhance specific moments and experiences within the venue, from the physical surroundings to the music and the service, making each drink memorable’. The Irish Times says Café en Seine has “been transformed into a sleek, opulent space set over three storeys, in a style redolent of the grandest Parisian brasserie.” It’s a large space, 1,544 sq. m in area, with the capacity for approximately 1300 people at a time. Intelligent video monitoring solution An intelligent video monitoring solution was required in order to protect this innovative new dining experienceA project like this is valuable and worth securing. An intelligent video monitoring solution was required in order to protect this innovative new dining experience. To this end, network video security experts Create Security Solutions were called in, and system designers Mark Woods & Niall McDonnell set about devising a system which would address Café en Seine’s specific needs. Woods, who is Create’s Managing Director, said the system had to be able to deliver a wide variety of results, whilst also blending into the art deco aesthetic of Café en Seine’s redesign. It was required to be able monitor the venue’s till areas, and to record any customer and staff health and safety issues, as well as the conventional function of after-hours surveillance for break-ins or theft. “At the same time,” Woods explains, “the whole of the network design, the topology, cable lengths and routes, the network video recorder and camera settings needed to minimise the impact on the network’s bandwidth as much as possible.” Reducing bandwidth load The solution Create devised was based on network topology using Hikvision H265+ encoding technology, to reduce bandwidth loads. Hikvision’s H.265+ is an optimised encoding technology based on the standard H.265/HEVC compression format. H.265+ video quality is almost equivalent to H.265, but uses far less transmission bandwidth and thus also extends video storage recording capacity. H.265+ video quality is almost equivalent to H.265, but uses far less transmission bandwidth and thus also extends video storage recording capacityThe other crucial factor was ‘plenty of time’. Time was important, because the system had to be installed simultaneous with all the redevelopment work which was taking place to the premises. “We had to stay on the same page as all the other workers on the site,” Woods said. “Obviously there are elements of a system like this that can only be installed at the appropriate moment, when contractors and decorators have reached the point that we can put our kit into place. “So we needed to keep an eye on their work, and follow-up as they progressed. It meant that we were assembling the system piece by piece – but those pieces weren’t necessarily in sequence, as different contractors worked on different aspects of the premises concurrently.” Ensuring optimum positioning of cameras As well as dealing with that complexity, Create needed to make sure that they addressed both the aesthetic and practical requirements of the system’s installation. The challenge we had was to ensure we positioned the cameras in the optimum place to get the best image" “We had to ensure that all 127 cameras we installed would blend into the interior, that they’d look unobtrusive and be able to see everything we needed them to,” Woods says. “The challenge we had was to ensure we positioned the cameras in the optimum place to get the best image, while also making certain nothing would encroach on the camera’s field of view. “That included speakers, trees, and chandeliers and other lights. Café en Seine’s pretty generously decorated, from the floor to the high ceilings, so this was a fairly complicated part of the process itself.” Installation of network mini domes Create’s Alex Koltunov was lead engineer on the project, and he oversaw the installation of the Hikvision kit. This included the aforementioned 127 cameras, all discreet network mini domes which blend into and complement the interior design of Café en Seine. The cameras record to four 32-channel network video recorders, sited in a comms room three floors above the diners. In the manager’s office is a 32-inch monitor. Using a mouse and switcher, all 127 cameras can be easily and conveniently viewed from here. The image quality is extremely high, the best they’ve seen, and the ease of use and customer friendly software is a fantastic plus"“We wanted to ensure that there was a minimum of equipment in the manager’s office, but that full control of the system was still possible,” Woods explains. “It’s an efficient use of the space, without CCTV control equipment dominating the room. Because of this and the system itself, the customer’s really happy with the installation. The image quality is extremely high, the best they’ve seen, and the ease of use and customer friendly software is a fantastic plus.” High-quality and user-friendly system David Murray, Café en Seine General Manager, confirms the sentiment and satisfaction. “We are extremely happy with the new CCTV system from Create Security Solutions,” he says. “Create have exceeded their remit in providing a high quality, aesthetically pleasing system. We asked that our new CCTV system blend with the new fit out and that has been achieved by Create. “All areas of our premises are covered by CCTV. We could not ask for better-quality images, and the system is extremely user friendly. From the start of this project, Create have worked with us to overcome some challenges with lighting and placement of cameras, and the results speak for themselves.”
IDF Aluminium has installed transom closers, solenoid locks and hook locks from Alpro Architectural Hardware at a building in a historic section of London’s Finsbury Square. 4 Chiswell Street backs onto the Artillery Ground which has seen archery in Tudor times, some of the first organised games of cricket in the 1730s and even a hot-air balloon flight in 1784. The four-storey structure was refurbished by main contractor Parkeray to a design by Ben Adams Architects that created column-free office space with exposed concrete soffit and a signature golden mesh & grille facade based on curtain walling with bold circles. Automatic voltage regulation The glazing is unusual since the Reynaers’ curtain walling for the double-height reception uses innovative bracketry to support massive panes from Euroview Architectural Glass. The Alpro closers are on the distinctive gilt exterior doors and the client is also benefiting from solenoid bolts in the door heads. Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg Alpro transverse action deadlocking bolts offer high levels of physical strength with holding forces of up to 2,000kg, a bolt throw of 14mm and models with oversize pins. The advanced microprocessor module provides power reduction allowing for continuous operation without heat generation as well as automatic voltage regulation, dual monitoring and access control features to fully monitor and control movement. Installers can use housings from the same series for surface mounting which facilitates the securing of glass doors. Dress plates are offered for a clean finish. Public sector environments The 4 Chiswell Street refurbishment was carried out with tenants in occupation and even involved use of abseiling techniques to replace glazing. A temporary reception was created for access and egress. Daylight has been maximised and floor-to-ceiling height is used wherever possible in a design that meets the Equality Act and includes a revised fire strategy. IDF specialises in the design, manufacture and installation of aluminium doors. The door projects are often in business and public sector environments where usage may be high but maintenance costs must be minimised. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
On December 11 to 16, 2018, the 14th FINA World Swimming Championships was held at the Olympic and International Expo Center in Hangzhou, China. Nearly 1,000 world swimming stars from 178 countries and regions competed here, creating a new glory with breaking 9 world records and 22 event records. The Chinese team won three gold medals, five silver medals and five bronze medals with the total medal number ranking the third in the world. The World Swimming Championships is one of the world's highest-level international swimming events. It is also the highest-standard individual international sporting event ever held in Hangzhou. For an international sporting event of this scale, the safety and security of the venues are of paramount importance. Security monitoring equipment As an important guarantee force for the security of the World Swimming Championships, Dahua Technology ensured the event’s safety with the host spirit and a great sense of responsibility. Dahua Technology once again shouldered the mission of guarding international events after successfully guaranteeing the G20 Hangzhou Summit. Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions In the periphery and outside of the venue, important entrances and exits, various passages and commanding points in the venues and security commanding headquarters, Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions, assisted the security department to establish security command headquarters, refined the security deployment of the venues and realized the full coverage of security monitoring from the periphery to the stadium and from the bottom to the commanding heights, facilitating the safe and smooth host of the 2018 Hangzhou FINA World Swimming Championships. Intelligence equipment At the venue of the 2018 Hangzhou FINA World Swimming Championships - the surrounding area and interior of the Hangzhou Olympic and International Expo Center, Dahua Technology has teamed up to deploy a number of professional intelligent HD PTZ cameras, fiber cameras, bullet cameras, domes, transmission and other intelligence equipment, covering all areas within the venue, which helped the security department to control all corners inside and outside the stadium in real time so that to ensure the safety of the venue and the event. Dahua Technology combined the requirements of ‘first-class venue facilities, first-class organization guarantee, first-class opening and closing ceremonies, and first-class city image’ in the Championships, focused on key links and built a set of intelligent security video management system with the support of advanced technology platform. Integrated control system It integrated control system, storage and management, and enjoyed the advantages of simple deployment and operation, flexible combination, excellent performance, and a high level of security and stability. It turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships, meeting the high-level security needs of the event. Dahua Technology set the command and dispatch of the security department as the core At the security command headquarters of the site, Dahua Technology set the command and dispatch of the security department as the core, with high-definition tiled LCD screens as the display carriers and brought more intuitive and flexible display and control to the security management of the venues before and after the event to ensure the real-time handling, efficient command and visual control of the entire venues, thus winning the praise of the security department leaders. Display control equipment On the evening of December 16, the 2018 FINA Annual Awards Ceremony was held at the Hangzhou International Expo Center. As a ceremony of the most authoritative awards, with the largest scale and the greatest number of world-class swimming athletes in the global water sports field, Dahua Technology assisted the security units to reuse a large number of equipment around the venue, including intelligent cameras, storage, management platforms and display control equipment, making sure the ceremony was successfully being held. As an essential force in the escort 2018 World Swimming Championships, Dahua Technology actively devoted to the security work. Stationed professional and technical personnel were responsible for on-site equipment support, achieving zero failure of the equipment, successfully completion of the tasks, and winning the praise of the security department leaders.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announces that the South Grand Community Improvement District (CID) in St. Louis, Missouri is using the Genetec Stratocast cloud-based video monitoring system to deter license plate theft in its parking lot and provide video access to the local police department to help reinforce security. License plate theft One of the services offered by the South Grand CID is free parking. At any time of the day, drivers can park in a central parking lot to visit businesses or residents. While this lot has always been convenient and safe, license plate theft was troubling nearby areas. Video recordings are sent over a wireless network which connects to the South Grand CID main office To deter license plate theft in their own community, the South Grand CID board decided to add video surveillance to the lot. Currently, three cameras monitor the entire 90-space parking lot. Video recordings are sent over a wireless network which connects to the South Grand CID main office, just a few blocks away from the lot. With this cloud-based video monitoring system, Rachel Witt, Executive Director at South Grand CID, can quickly and easily view video from anywhere, at any time. Cloud video system “Using the cloud video system, I am able to find and view the video in seconds. I can narrow down my search based on dates and time and watch the event unfold with all camera feeds up on the monitor. It’s really that simple,” commented Witt. Only two weeks after installing the Stratocast video monitoring system, a visitor reported that their license plates had been stolen. “The visitor provided a description of the car, and a timeframe in which the incident likely happened. Using the Stratocast system, I was able to find and view the video in seconds. I could clearly see the suspect enter the lot, remove the plates and leave in his own car. Since the police are very busy here, I was able to bookmark the video recording and then notify them that the video was ready,” said Witt. View video recordings Stratocast has made it easy for the South Grand CID to give video access to local police so that when a crime is reported in the district, officers can immediately begin to conduct investigations without leaving their desks. While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required. This is enabled by the Genetec Federation feature, which gives an organisation access to manage multiple independent Genetec systems as one. A memorandum of understanding was signed so each parties’ responsibilities are clear. Better sense of safety “Instead of driving over and picking up a DVD, officers can directly access video from our cameras to see what happened. Not only does it help speed up investigations, it saves officers’ valuable time,” continued Witt. The installation of Stratocast is not only helping to reduce license plate theft but it is also helping residents and visitors feel safer than ever. “Business owners, residents, and visitors have a better sense of safety when they know cameras are up. But they also need to know that we’re equipped to respond quickly to any disturbance. And that’s what Stratocast helps us achieve. With the addition of Stratocast, we’re able to show everyone that we have strengthened the security in our community,” concluded Witt.
Round table discussion
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Products are the building blocks of systems and solutions. How those products are combined, and where the integration happens, is a variable in the physical security market. Before the advent of open systems, a single manufacturer typically combined his own products, using proprietary connections, into end-to-end solutions for customers. Open systems undermined that paradigm to some degree and made it possible for customers to pick and choose products from multiple manufacturers to be integrated into a solution. Lately, the pendulum has again swung toward “system solutions,” or end-to-end systems provided by a single manufacturer … Or has it? We asked this week’s Expert Panel Roundtable: Is the industry shifting from a focus on products to emphasising end-to-end solutions? How is that a good (or bad) thing?