Bodies within the Security and Fire sector, namely the British Security Industry Association (BSIA), Fire and Security Association (FSA), National Security Inspectorate (NSI), and the Security Systems and Alarms Inspection Board (SSAIB) are re-iterating calls for employees of all security and fire safety companies approved by UKAS-accredited specialist certification bodies to be designated as ‘Key Workers’, to ensure environments not currently designated as ‘critical’ con...
STANLEY Security, an integrator of comprehensive security solutions, appointed Chadi Chahine as Chief Financial Officer. Chadi will be responsible for helping accelerate short- and long-term business objectives while also ensuring strategic financial decisions and initiatives operate with excellence. “Chadi will be a pivotal member of the STANLEY Security team, leading the overall financial strategy and planning while also laying the groundwork for future corporate initiatives,” sai...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LEP-301M-KIT. Antaira Technologies’ LEP-301M-KIT was designed to overcome the 100meter limitation of Ethernet. This kit comes with both the near end (LEP-301M-TX) and the far end (LEP-301M-RX) for a complete set. The LEP-301M...
Arcules, innovators in integrated video and access control cloud services, announces the appointment of Bruce Nisbet as Senior Director of Sales. In this role, Nisbet will help guide the regional sales teams and develop strategic initiatives for expanding the reach of the company’s cloud-based services in key markets. With more than 30 years of security, video surveillance, sales and management experience, Nisbet has executed successful sales strategies and business development initiative...
ASIS International and the Security Industry Association (SIA), the membership associations for the security industry, have entered into a partnership to best aid in the COVID-19 recovery and rebuilding efforts of its diverse group of 34,000 member professionals and over 1,000 member companies respectively. The partnership will begin by addressing two primary areas of focus – business operations and advocacy – as well as content development and coordination. SIA will lead a team com...
GlobalPlatform, the standard for secure digital services and devices, publishes a new specification that simplifies the communication between embedded Secure Elements (eSEs) and connected devices. The specification now supports the serial communication interfaces – Serial Peripheral Interface (SPI) and Inter-Integrated Circuit (I2C) – that are widely deployed in smartphones, wearables and other internet of things (IoT) devices. Biometrics matching on SE The standardisation of the...
Beyond Encryption, the provider of secure email systems, road tested its working from home policy, safe in the knowledge that their ‘Digital Recorded Delivery®’ email system will continue to keep their communications secure. With the fears surrounding the Coronavirus (COVID-19) outbreak worsening by the day, businesses are already relying on technology for remote working. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Protecting external email communications Traffic in other countries is up 400% or more and specialist video conferencing businesses have seen a near doubling in share value, when the rest of the market is shrinking. Reliance upon email communications will increase significantly but basic email security has remained unchanged for 30 years. The default state of all email services is unencrypted, unsecure and open to attack Many smaller businesses are still likely to be using outdated Simple Mail Transfer Protocol (SMTP) when sending or receiving email. As such, the default state of all email services is unencrypted, unsecure and open to attack – putting crucial information at risk. Ensuring our external email communications are protected and not susceptible to interception and abuse will be increasingly important. Protecting communications and data Paul Holland, CEO of Beyond Encryption said: “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority. We decided to road test our own remote working policy to ensure that we truly practice what we preach, that our meetings and conversations were unhindered, and, indeed arguably, we operated more efficiently!” “Many other companies, large and small, are already trialling their remote working policies, from those in Silicon Valley to us here at Beyond Encryption. As well as protecting our health by working from home, it’s important that we also protect our communications and data,” added Paul. “Mailock® allows businesses and their clients the peace of mind to be able to work from any device on any network, at home or in the office, without the worry of data compromise or cyber security issues.
Safeture AB announces that several new customers have signed up for its cloud-based software to help manage safety and reduce risk for their employees. The increasing awareness of corporate duty-of-care for employees continues to drive demand for Safeture’s software globally. The new direct customers who have obtained the company’s platform include the Swedish firm SwedFund, electric racing championship Formula E and U.K. giant Imperial Tobacco, which has some 32,700 employees. Safeture also has ISS in Sweden, Kinnevik and the Swedish Civil Contingencies Agency using its software via one of the company’s partners. Safeture now has more than 3,000 corporate customers in 190 countries around the world. Receiving tremendous attention “We have never had so many customer on their way in or reaching out to us than right now,” said Magnus Hultman, CEO of Safeture. “Companies have a major responsibility, so-called duty-of-care, to take care of their biggest assets – their workers. Our flexible platform embraces the trends of mobility, digitalisation and globalisation, giving employees and managers the tools they need to work safely.” The launch of Safeture’s Corona Exposure Tracker has received tremendous attention The launch of Safeture’s Corona Exposure Tracker has received tremendous attention, and a record number of companies around the world are now testing the software, which the company has made available for free for 40 days which is the most critical time to act to limit to slow the virus’s spread. It is clear that many organisations have a large need to take care of their employees and protect their operations. Offering employee safety software “The corona crisis has pushed many companies to realise they lack the tools needed to quickly support their workers in an emergency situation and make informed decisions to ensure safety,” said Hultman. “The dire situation facing the world now is a wake-up call for organisations to act, and we are glad Safeture’s platform is there to support them around the clock.” Safeture is offering its employee safety software to any company looking to track the potential exposure of their workers to the coronavirus, now impacting countries around the world. Potential external costs related to importing travel bookings and accessing company travel data are not included.
Consortio Security has adopted employee scheduling and workforce management software SmartTask to streamline internal processes and improve operational performance. The solution will be used to better manage and monitor a team of 330 security officers that provide a range of services at 250 customer sites including manned guarding, key holding, mobile patrols and alarm response. This will enable the company to reduce its administrative burden, while enhancing the service it provides to customers. Workforce management system SmartTask represents a big step forward for us that will help transform our internal processes" “SmartTask represents a big step forward for us that will help transform our internal processes by gaining complete transparency of operational data,” commented Earl Knight, CEO of Consortio Security. “The software is already proving its worth and we expect to gain even greater efficiency savings and performance improvements as we embed it into our business further.” SmartTask replaces an existing workforce management system that was no longer meeting the demands of the business in terms of usability and reporting capabilities. Following a review of the marketplace, SmartTask was selected as it offered a simple, cloud-and app-based solution, with smartform functionality. The smartphone app provides security officers with a simple way to record proof of attendance, submit incident reports, access and confirm assigned shifts, and read assignment and risk assessment forms. Proactively managing security operation Consortio will use SmartTask across its operations function – both centrally and regionally – to create and communicate work schedules, validate contract delivery and support duty of care. The company’s national control room will have complete visibility of all booking on-and-off of shifts, hourly check calls, scanned patrol points and raised alerts via a live dashboard. Meanwhile, three regional operations managers will have controlled access, so they can manage their individual teams, measure performance and respond to issues in real-time. The added visibility and control provided by SmartTask is helping us proactively" According to Tom Dilley, National Control Room Manager at Consotio Security: “The added visibility and control provided by SmartTask is helping us proactively manage our security operation in the most efficient and effective way. By streamlining our internal processes and reducing incoming calls from security officers by as much as half, we are saving a considerable amount of time, so the operations team can focus on other priorities and ensure the highest levels of customer satisfaction are maintained.” Individual security operations The added reporting capabilities and access to highly accurate data via SmartTask will enable Consortio to enhance service delivery and contract compliance, quickly resolving any operational issues or reacting to customer queries. Moving forward, the company is also planning to introduce an online portal, which can be accessed by customers to view real-time and historical details of their individual security operations. Our longer-term aim is to integrate the software with our finance system" Reports will also be used by the payroll and finance teams to help calculate employee and customer billing. Accurate timesheets will be downloaded and exported to Consortio’s finance systems, along with holiday accrual, absence and pay rate data. “The added precision and adaptability of SmartTask means we can input different variables by employee and contract to create highly accurate reports. Our longer-term aim is to integrate the software with our finance systems to automate our payroll and billing processes,” explains Elliot Moss, Consortio Security’s Head of Finance. Accurate screening process Meanwhile, SmartTask’s vetting module will enable Consortio’s HR team to speed up and simplify its BS7858-compliant background checking and pre-employment screening processes for new employees. It will ensure the company is complying with legal regulations such as working history, DBS checks and right to work, as well as helping to effectively source appropriate references. SmartTask Vetting will allow certificates and identification documents to be uploaded, removing the need to store paper copies, while electronic reminders will allow the software to flag-up any upcoming expiry dates. According to Mick Stone, Head of Human Resources at Consortio Security: “SmartTask’s vetting module is already speeding up staff recruitment by having a fast and accurate screening process that is fully compliant with all legal regulations and our internal employment policies. We are, on average, reducing the time required screening a new starter by 40 per cent when compared to the previous system we had in place, which is freeing up valuable HR resource.”
Abloy UK unveils its newest innovation in digital security, the Abloy BEAT. The new keyless solution combines three main components: a digital key, a mobile application and a heavy-duty, Bluetooth padlock, all managed with the visual Abloy OS user interface. Businesses across the UK have a growing need for the convenience and accessibility of highly secure keyless access solutions – either as an addition to existing workflows or as a standalone solution. This is particularly true in remote areas or situations where carrying a physical key can increase the risk in security or even danger for the holder. Physical protection of critical infrastructure BEAT is designed especially for professional physical protection of critical infrastructure Aaron Yule, Managing Director at Abloy UK, said: “The Abloy BEAT is part of the ongoing ‘keyvolution’, heralding a new era of effortless connectivity, without a physical key. Yet there are no keyless locks. The key has just taken on some new forms. Leveraging on our heritage and expertise in high-level security, we have built a new digital key.” “It is encrypted with the most advanced Seos® credential technology, developed by HID Global. Used with your mobile device, the digital key provides best-in-class security and privacy protection.” BEAT is designed especially for professional physical protection of critical infrastructure, businesses and industry sites. It physically secures property while offering customers improved operational efficiency, reducing both logistics and costs. It also saves on fuel emissions, making it a sustainable option. The solution is intended to be used in sectors like telecom, transport and logistics, utilities (water, electricity, gas) and data centres. Security workflow solutions The digital BEAT key connects to the physical heavy-duty, Bluetooth padlock, designed to perform in harsh environments and remote areas. The padlock has an IP68 protection rating, a case-hardened steel body and LED indications for lock status. It complements the current Abloy® SUPER WEATHER PROOF range of padlocks. BEAT is the latest addition to Abloy’s comprehensive and evolving digital portfolio BEAT can be integrated with existing security workflow solutions, but it can also be implemented as a standalone locking solution with Abloy OS. Abloy OS enables management of keys, locks, and access rights on-the-go and remotely from a single, easy-to-use and highly visual interface. BEAT is the latest addition to Abloy’s comprehensive and evolving digital portfolio of future-ready security and access control solutions. Providing customers with technical expertise This is the first phase of the BEAT solution, and the company plans to unveil new features in the future. With this launch, the Abloy digital portfolio now includes both keyless (BEAT), electromechanical (PROTEC2 CLIQ) and patented mechanical (Abloy® PROTEC2) options. In the near future, all options, including the mechanical PROTEC2, can be managed with the same Abloy OS interface. Abloy Competence Centres, sales units and distributors across the UK will provide customers with technical expertise, professional service and support. Abloy BEAT will be showcased at IFSEC International (UK) in September, while samples will also be available for demonstration at Abloy distribution offices.
Milestone Systems’, the open platform video management software (VMS) company, Board of Directors announces that Lars Thinggaard, President and Chief Executive Officer, has decided to leave the company. As a result, the Board has started an open search to appoint a successor to Mr. Thinggaard. During the intervening period, Lars Larsen, Milestone Systems’ Chief Financial Officer, will serve as Interim CEO. Video management software I would like to echo Lau’s thanks, Lars has played a crucial role in the development of Milestone" Following the announcement, Lau Normann Jørgensen, Chairman, Milestone Group, said: “I am very grateful to Lars for the energy, vision, and heart that he has dedicated to Milestone employees and the community partners. Please join me in wishing Lars the absolute best in all his future plans and endeavors.” Lars Larsen, Chief Financial Officer and interim CEO said: “I would like to echo Lau’s thanks, Lars has played a crucial role in the development of Milestone. Looking ahead, Milestone is a strong company and well positioned to continue as a leader in the open platform video management software business.” Focussing on new initiatives Lars Thinggaard has been President and CEO of Milestone Systems for 17 years and before this as a member of the non-executive board. For the last six years, since the company’s acquisition by Canon Group in 2014, he has led Milestone as a standalone company in the Group. Under his leadership, Milestone has developed into a growth company with a strong team and a great future. Looking ahead, as investor and non-executive chairman of several companies in the startup community, Lars sees that now is the right time to move on and focus on these new initiatives. He would also like the flexibility and time to promote his new book, Tech for Life, that is about to be published.
Genetec Inc. (Genetec), a technology provider of unified security, public safety, operations, and business intelligence is pleased to announce that it has opened pre-registration for its first virtual tradeshow, Genetec Connect’DX, taking place April 20-22, 2020. Building on the company’s strong culture of innovation, Genetec has designed Connect’DX to connect physical security professionals from around the world directly to Genetec experts and industry leaders. In what would normally be a busy conference calendar including such events as ISC West, IFSEC and Intertraffic, all postponed due to COVID-19, the business wants to be sure to engage and support its customers as they normally do in-person. Physical security solutions “Our team looks forward to bringing Genetec solutions directly to the customer and we are happy to do so in a new way this April. Though we love connecting in person, we’re excited by the opportunity to bring everyone together online,” said Andrew Elvish, Vice President of Marketing at Genetec. “We’re ready to showcase our portfolio of physical security solutions, discuss key trends and technologies that affect our industry and provide a preview of what is to come from our product teams,” he said. Sessions on key trends and new technology While the complete Connect’DX agenda and keynote speaker list is yet to be published, the event is shaping up to include: Sessions on key trends & new technology Keynotes from industry leaders including Pierre Racz, Genetec President Genetec product demos and Q&As with the product team Panel discussions on industry topics including privacy, cybersecurity and cloud Free training sessions from our training department To receive all of the pre-show information, get first access to the agenda, and early bird session registration details, be sure to sign up on the Connect’DX pre-registration page today.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyse the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognising and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognising and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behaviour analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognising suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and number plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specialising in VMS and modular AI analytics at ISC West 2020. Even if recognising suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and number plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyse employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyses the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognised the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognise all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specialising in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specialising in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco acquired by private equity firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic spins of security business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy year for acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola continues video push with VaaS acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE acquires access control companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy expands capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter going private and selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com expands commercial offering with OpenEye acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimised for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT makes multiple acquisitions, sells Canadian operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specialises in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorised parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilisers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimising physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specialising in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognise the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customised solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximise their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Air Partner plc ('Air Partner"), the global aviation services group, has launched a unique new product, Air Partner Protect, in response to the emergence and spread of COVID-19 ("coronavirus"). The Group has recently carried out a number of evacuations on behalf of the UK government, and has seen increased demand from customers looking for similar services with enhanced safeguarding measures in place. Air Partner Protect The fast-moving and widespread nature of the disease has presented a unique and challenging set of circumstances in which to travel around the world, and individuals, governments and businesses alike are facing unforeseen hurdles as new restrictions and regulations are put into place. Air Partner Protect has been specifically curated to mitigate risk for customers flying during the coronavirus outbreak Through its broad and varied service offering, Air Partner is able to provide customers with global tailored solutions that meet multiple aviation requirements at the same time. Air Partner Protect has been specifically curated to mitigate risk for customers flying during the coronavirus outbreak, while offering expert advice and reassurance. Enhanced Security Screening Air Partner's dedicated Safety & Security division Redline can provide its own security operatives and equipment to carry out security screening where it is not available through the normal channels due to infection concerns. Air Partner works with approved operators to ensure aircraft and crew comply with recommended procedures around coronavirus (in addition to the stringent health and safety processes already in place). This includes ensuring aircraft have been deep cleaned and crew is following strict hygiene precautions. Quick response evacuation and emergency medical support Using its exceptional relationships with operators globally, Air Partner can offer an extremely fast solution to evacuate any number of people from anywhere in the world, as evidenced by its recent work with the government's Foreign & Commonwealth Office (FCO). Air Partner's partnership with Northcott Global Solutions (NGS) provides customers with a quick and professional response to medical issues, emergency or routine, wherever they are in the world, 24/7. COVID-19 monitoring, updates and advice Working with partner NGS, the Air Partner team is kept fully briefed on all coronavirus developments, so that they can keep customers up to date on all the latest information and advice relating to their flights. Air Partner always monitors all of its customers' flights from start to finish, and the team can be reached 24/7, 365 days a year, for added reassurance. Bespoke safety solutions Customers are concerned and we have launched Air Partner Protect in response to growing demand" Commenting on the launch of Air Partner Protect, Air Partner CEO Mark Briffa said, "Coronavirus continues to affect communities around the world and global travel and transportation are becomingly increasingly challenging as new measures are brought in to try and limit the spread of infection. Customers are understandably concerned and we have launched Air Partner Protect in response to growing demand." Mark adds, “As a global aviation services group, we are already able to offer bespoke solutions spanning Charter, Consultancy & Training and Safety & Security so that customers can source everything in one place. Air Partner Protect goes one step further by ensuring that customers are safeguarded as much as possible when using our services at this difficult time." Fully-integrated solution Air Partner's collaborative and holistic approach was demonstrated when the Group supported the FCO's recent evacuation and repatriation of UK and Irish nationals onboard the cruise ship quarantined off the coast of Yokohama in Japan. The Group Charter, Freight and Redline teams worked together to deliver a fully-integrated solution for the multi-faceted project, which involved evacuating 32 people in line with all Public Health England health and safety protocols, security screening these passengers and their baggage ahead of the flight from Tokyo to the UK, and transporting cargo.
The new Courtyard by Marriott hotel at London’s Luton Airport is being protected with the latest, cybersecure video surveillance technology from IDIS. The complete end-to-end solution, from Korea’s video equipment manufacturer, is enabling trouble-free remote 24/7 monitoring, ensuring improved service efficiency, safety and security for guests. IDIS DirectIP® technology was chosen for its ease of installation and use together with the reassurance of multi-layered protection against cybersecurity risks. Although the installation team from DGS Systems had never previously worked with IDIS technology before, they found that it lived up to its true plug-and-play promise. Providing impressive recording capability IDIS DirectIP® made it easy to set up the three IDIS NVRs to provide impressive recording capability Despite having almost 100 cameras to set up - including 74 full-HD IR domes and 17 vandal resistant full-HD IR domes – one-click network configuration allowed the engineers to work rapidly, connecting devices easily and not needing to manually enter passwords for each one. This not only reduced installation time but ensured greater protection against network infiltration by minimising the likelihood of human error, which can occur when passwords need to be written down and entered manually. Encryption technologies and NVR firewalls together with proprietary protocols and file structures make IDIS surveillance solutions less vulnerable to attacks than many common open architecture components. IDIS DirectIP® made it easy to set up the three IDIS NVRs (32-channel DR-6332PS-S) to provide impressive recording capability and meet the customer’s requirement for three months’ storage of all footage. Protecting building exteriors The NVRs’ 370Mbps throughput ensures no latency on live footage and high-quality image capture in full HD. Most of the cameras are used for incident investigation, although with the hotel’s service areas now covered, operational efficiency has been improved too. The hotel’s owner also wanted to protect the car parks and building exteriors to reduce the risk of crime For example, routine checks on the rooftop plant room can now be handled remotely, rather than in person, which is particularly useful during adverse weather conditions. The hotel’s owner also wanted to protect the car parks and building exteriors to reduce the risk of crime, and shortly after the system was completed, a gang of opportunist scrap-metal thieves was recorded stealing cables from the site. Handling rapid variations in brightness The IDIS full-HD IR domes provided video evidence that was key to a successful police investigation, delivering pin-sharp images in all lighting conditions and easily handling rapid variations in brightness and shade thanks to their true wide dynamic range (WDR). “The IDIS solution was very installer-friendly and easy to configure,” says Dariusz Surowy of DGS Systems UK, confirming that the same technology is now being used on more sites. Grzegorz Surowy, MD of DGS Poland, agrees: “It has rapidly proved how well it works with successful incident investigations.” Meanwhile, James Min, Managing Director, IDIS Europe comments that IDIS solutions are designed to be easy to install, simple to use, and to give the lowest total cost of ownership (TCO). “For busy hotels such as the Courtyard by Marriott at Luton, they provide the perfect tool for safety, security and more efficient management.”
Alvarado is pleased to announce the latest in state-of-the-art technology for guest admission applications, the IntraQ-SU5000 optical gate admission turnstile. Recently installed for guest entry validation at State Farm Arena in Atlanta and Gaylord Opryland Resort’s $90 million-dollar SoundWave Waterpark in Nashville, the IntraQ-SU5000 combines the self-validation and fast throughput of our admission devices with the intelligent optical detection system of our flagship SU5000 security turnstile. The result is a highly effective access control solution with an upscale look to complement any venue’s interior. Intelligent optical detection The IntraQ-SU5000’s intelligent optical detection system recognises and notifies of instances A driving reason behind both high-profile installations was the easy interaction between guests and the IntraQ-SU5000. The bright TFT touchscreen display provides customisable visual instructions and allows venues to display logos and generate revenue through on-screen advertising. As guests approach and validate their printed or digital credentials, panels open away, providing touchless entry. Because the devices offer self-validation, staff can greet and assist guests and pay greater attention to possible security threats. The results are faster validation and substantially higher throughput rates when compared to validation using handheld scanning devices. Helping to ensure that each guest is validated upon entry, the IntraQ-SU5000’s intelligent optical detection system recognises and notifies of instances such as tailgating or forced entry attempts. Blending seamlessly into any environment The IntraQ-SU5000’s many available options allow the units to blend seamlessly into any environment. Custom cabinet colours, panel illumination in team or venue colours and logo etching on the moving or side panels are just a few of the customisation options available. The IntraQ-SU5000 works seamlessly with Alvarado’s widely used GateLink10 admission control software The IntraQ-SU5000 works seamlessly with Alvarado’s widely used GateLink10 admission control software. A DirectConnect API is also available, supporting direct plug and play connections to widely used ticketing/access systems such as Ticketmaster (including Presence), Tickets.com, Paciolan, NeuLion, Accesso and many other ticketing companies in the collegiate, professional, performing arts and general admission space. Browser-based application As an added benefit, the IntraQ-SU5000 and all of Alvarado’s intelligent admission products come with GateUtility (GU). This browser-based application provides remote control of all Alvarado devices installed at a facility, allowing users to change screen graphics and sound files, open individual (or all) turnstile barriers to provide a clear passageway during or after event and update software and device configurations. With over 20 years’ experience providing admission devices and access control software, Alvarado products help venues around the globe transform the access process throughout the venue.
A grocery chain was experiencing a shoplifting problem at several of its locations. The shrinkage loss was significant and was impacting store profitability. Having worked with Alvarado in the past, the chain reached out to Garda Construction and Dale Staton at Alvarado to help craft a solution. The store had an open layout, and while visually appealing, shoppers could easily walk out without passing through a checkstand. EAS equipment would periodically alarm when a patron or thief walked out the door, but because alarms were common, they were generally ignored. Monitored checkstand area Dale explained that the optimum solution would be a barrier that allows patrons to easily enter the shopping floor For purposes of theft control, Dale explained that the optimum solution would be a barrier that allows patrons to easily enter the shopping floor, while providing a physical deterrent from exiting the store without first passing through a monitored checkstand area. Acting on Dale’s suggestion, the store installed Alvarado’s SW500 motorised gate with camera-based detection and presence technology, along with Alvarado’s modular post and railing. After patrons pass through the exterior bi-parting doors, they approach the gate to enter the merchandise area. The gate opens automatically, allowing access. When the gate is closed, if a patron (or thief) walks up to the gate to exit, a pulsing alarm sound warns the patron and alerts store personnel. If the patron backs out of the detection area, the alarm stops. If the patron continues and attempts to push or pull the gate open, a sustained alarm provides additional notification. Fewer false openings and unwanted alarms The use of camera-based detection provides significant benefits. Traditional detection technologies, such as microwave or PIR, make it very difficult (and sometimes impossible) to accurately define motion and presence sensing detection areas, resulting in unwanted openings and false alarms caused simply by normal store traffic patterns. After installation of Alvarado’s products, the traffic pattern into and out of the stores changed dramatically Alvarado’s camera-based detection technology, which is installed in the top cap of the gate, allows both the entry and exit sensing areas of the SW500 to be accurately defined using an included software application. An accurate detection pattern results in substantially greater application flexibility and far fewer false openings and unwanted alarms. After installation of Alvarado’s products, the traffic pattern into and out of the stores changed dramatically. Camera-based motion detection Store personnel also commented that numerous patrons suspected of being shoplifters stopped coming to the stores. The overall result was a significant decrease in theft and improved profitability that more than justified the equipment purchase and installation expense. From traditional retail turnstiles and gates, to the innovative SW500 motorised pedestrian gate with camera-based motion detection, Alvarado provides an array of entry control solutions to retail customers – as it has done since 1956. Our full product portfolio offers inexpensive and effective methods of controlling pedestrian traffic and shopping cart flow patterns and reducing shoplifting and shrinkage in retail and grocery stores.
After seeing a continued rise in anti-social behaviour, littering and dog fouling, North Tyneside Council decided to invest in a mobile CCTV van, which along with extra wardens has been used to tackle environmental offences in public places as well as in communities and schools. The service was launched last winter by Mayor Norma Redfearn CBE, and a new team was introduced to work throughout the day, including weekends, to help catch offenders in the act. Staff are able to enforce anti-social behaviour legislation, which includes issuing those who break the law with community protection notices, issue fixed penalty notices, eviction orders, and injunctions to those who are going against what the community is trying to achieve. Travelling CCTV cameras Six businesses have also been challenged about the way they dispose of their waste The travelling CCTV cameras, as supplied by vehicle safety specialists Sentinel Systems, have led to a number of successes including identifying a suspected repeat fly-tipper and uncovering 14 areas being regularly used to fly-tip. By installing a PTZ camera (pan–tilt–zoom camera), the team has been able to use the remote directional and zoom control to stop and advise 120 people about keeping their dogs on leads in designated areas and issued several fixed penalty notices to people littering or not picking up after their dogs. Six businesses have also been challenged about the way they dispose of their waste, with two of them being subsequently fined £400 each. Tackling crime hotspots Richie Mitchell, Community and Public Spaces Protection Manager at North Tyneside Council, commented, “North Tyneside is a great place to live and we have seen noticeable results since introducing the CCTV van and environmental team to the borough. The council takes issues in the community extremely seriously and is always looking to do more to tackle any crime hotspots.” Installing the cameras has benefited the community in many ways and we are very pleased" He continued, “Residents had lots of concerns around littering and dog fouling, so the new service providing on-the-spot fines and CCTV footage that can be used to help with prosecutions has really made a difference. Installing the cameras has benefited the community in many ways and we are very pleased with what we have achieved for our residents so far.” Safety camera package Sentinel’s 360-degree camera system offers drivers an enhanced view around the outside of a vehicle and can be combined with Sentinel’s four or eight-channel DVRs, allowing for up to 30 days of footage to be recorded. Inside the vehicle, a seven inch in-cab monitor is installed with high image clarity so that anything around the vehicle is always visible to the drivers. Sentinel Systems’ safety camera package can be customised to meet the individual requirements of each fleet, depending on the size and operations of each vehicle. The camera system can be created using any number of Sentinel’s systems, including forward, rear and side facing cameras for a 360° view of the vehicle’s surroundings.
The UK railway industry has set out its plans for the future of the rail sector, including completion of major projects, clean air policies and a long-term plan for infrastructure renewals and enhancements. With more investment and commitment predicted for the industry, Andy Hewitt, Product Manager for ASSA ABLOY High Security and Safety Group, Rail Products, looks at what is needed to supply the best products and solutions for rail projects. As a Group we have been supplying security and safety solutions to the rail sector for over 100 years and as such we’re aware of the many complexities involved specifying products for rail projects, which are very different to securing a building. Rail Standards for Safety Critical Items Any locking systems or safety products supplied to the railway industry are classed as ‘safety critical’ items Considerations around ease of use, product quality and wider issues around supplying on-scale and on-time all impact on a project’s delivery, but ultimately safety and security must be the key consideration. Any locking systems or safety products supplied to the railway industry are classed as ‘safety critical’ items and therefore must conform to specific Rail Standards for Safety Critical Items. In addition, the company supplying these products must be accredited as a safety critical supplier by an independent body. ASSA ABLOY High Security and Safety Group (previously Pickersgill - Kaye) was one of the first companies to be accredited back in 1994 and has remained an accredited supplier ever since. Products supplied for use on rolling stock is by, its very nature safety critical, securing doors that are used daily by the rail users must operate reliably and safely. Security, access and safety needs ASSA ABLOY products are not only supported by the exacting requirements of industry standards but are also backed up by years of experience gained working within the industry and having a detailed knowledge of changes to legislation put in place to protect both the public and the experienced rail staff. The security, access and safety needs on the UK’s railways is constantly changing and therefore products and solutions must continually adapt to meet these needs. Locking systems in particular are subject to high usage and the dynamics of a moving train, shock and vibration at speeds of up to 140 mph, this must be taken into consideration when designing products for this sector. Prototype locking system An example of how this has developed is in the change from traditional slam door trains where the door could be, and sometimes was, opened when the train was moving at speed, to the replacement of all slam doors with power operated doors. These doors cannot be opened unless the train is stationary and only then when the guard or driver allows. The Group has designed and fitted a prototype locking system that reduces the chances of fingers becoming trapped Another development High Security and Safety Group has been working on is the enhanced safety of Diesel Locomotive driver doors, where previously fingers being trapped was a concern, the new design has significantly reduced this. The Group has designed, manufactured and fitted a prototype locking system that drastically reduces the chances of fingers becoming trapped. The prototype is now in-service undergoing assessment, not only by train drivers, but by the locomotive operators’ safety representatives and the train drivers’ unions. Safety and security Investment is continuing into the UK railway network, whether that’s on large-scale projects like HS2 or enhancements to existing systems. The products and solutions which ensure the safety and security on these projects, must not only adhere to the relevant safety requirements but should come from suppliers with an established heritage and understanding of the sector. ASSA ABLOY High Security and Safety Group is committed to innovation and quality across all its railway solutions.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Security service: Manufacturers & Suppliers
- Bolide Security service
- Dedicated Micros Security service
- Dahua Technology Security service
- VIVOTEK Security service
- Seagate Security service
- Hanwha Techwin Security service
- ITI Security service
- Vigilant Vision Security service
- Vanderbilt Security service
- OT Systems Security service
- Messoa Security service
- HID Security service
- Panasonic Security service
- Nedap AEOS Security service
- Tamron Security service
- LILIN Security service
- AMAG Security service
- Parabit Security service
- Pelco Security service
- Videotec Security service
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals