To say that the security industry draws people in and demonstrates its value in terms of relationship building with the caliber of people who comprise the industry is an understatement, as Bart Williams, President of Security Solutions and Communications, Inc. (Security Solutions) found out. Founder of Security Solutions Williams chose to become an engineer as his profession, but he began dabbling in the security industry part time, soon to discover it would lead him on the path to becoming St...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability...
SmartTask, a UK-based developer of cloud workforce management solutions, has announced the availability of its mobile operations app. Fully integrated smartphone app streamlines mobile patrols, alarm response callouts and keyholding for security officers and controllers helping demonstrate BS7984 compliance. Designed specifically for UK security services providers in collaboration with the UK security industry, SmartTask mobile operations keep field officers in contact with the control room....
Codelocks has expanded its Marine by Codelocks range, giving customers a wider choice of weather-resistant keyless access solutions. Due to the popularity of its CL510 and CL515 Marine by Codelocks products, launched in October last year, Codelocks has added a number of new locks to its Marine by Codelocks range. The new additions include light and medium duty locks from the CL200 and CL400 mechanical range, as well as further heavy-duty locks from the CL500 mechanical range – all of whic...
As International Security Week (ISWeek), 30 November – 3 December 2020, draws closer, experienced names in the industry are preparing to join together to dissect recent incidents of terrorism and how to combat extremism while protecting national assets. International Security Week The International Security Week marks five years since the shocking series of coordinated terrorist attacks across Paris, France which tragically killed 130 people. Recent incidents in Nice, France and Vienna,...
IDS Imaging Development Systems GmbH expands their headquarters in Obersulm-Willsbach – after a construction period of about one and a half years, the technology centre b39 could be moved into. "Despite COVID 19, the work went almost without a hitch," says managing director Jan Hartmann. "We are very pleased that with the new building we can provide our employees with an ultra-modern and at the same time very attractive place to work.” With more than 4,500 square metres of total spa...
ACOEM, a premier manufacturer and supplier of advanced public security solutions, is introducing its state of the art acoustic threat detection technology solution in the United States this year. The solution, known as ATD (Acoustic Threat Detection), uses ACOEM’s signature AI powered technology to sense and track threats to public safety. ATD combines the power of sight and sound to boost a security system’s intelligence using surveillance cameras attached to ACOEM’s signature sensors. Once a sensor detects a threat, the surveillance camera immediately responds by turning to face the threat’s detected location. Threat detection alerts ACOEM recognises the tremendous opportunity their cutting edge technology has to serve and protect communities Real-time threat detection alerts are sent to a VMS so first responders can make quick and informed response decisions. While ACOEM has provided global military security solutions using AI technology for the past 25 years, this is the first time the company is introducing it in the civilian arena. With active shooter events on the rise, ACOEM recognises the tremendous opportunity their cutting edge technology has to serve and protect communities. “Having a sense of security is a basic human need, so we want to use our capabilities for the greater good of society,” says Bobby Darling, Director of Marketing at ACOEM. Active shooter event Partnering with entertainment venues, corporate campuses, schools, and cities will enable ACOEM to implement ATD in the places that are most at risk for an active shooter event. ATD offers indoor and outdoor threat detection sensors. Solutions are customisable to meet the security needs of the establishments it serves. ATD is part of ACOEM’s developing portfolio of security solutions. Future technologies will support the monitoring of public threats beyond gunshots such as air quality levels. To see the product in action, sign up for the Introducing ACOEM Acoustic Threat Detection on December 10th at 1:00 EST.
Acronis, a globally renowned company in cyber protection and data security solutions, has announced an update of its Acronis True Image 2021 that incorporates a professional-grade vulnerability assessment tool into the personal cyber protection solution. Scanning operating systems Individuals and home office users can now scan their operating systems and applications for exploitable vulnerabilities and get recommendations on effectively closing those security gaps. Users can now scan their operating systems and applications for exploitable vulnerabilities With an estimated 60% of data breaches involving vulnerabilities for which a patch is available but not applied, and more than 11,000 common vulnerabilities and exploits (CVEs) listed for popularly used software, the ability to quickly find and fix those openings is critical in stopping cybercriminals. Vulnerability assessments Incorporating vulnerability assessments in the same personal solution as Acronis’ advanced anti-malware and backup ensures individuals, prosumers, and home office users can significantly reduce the risk of malware. “During the past five years, the emergence of ransomware as a service means criminals don’t need to be particularly technical and that they can just pay for a malicious toolkit that exploits unpatched vulnerabilities,” said Serguei Beloussov, Founder and Chief Executive Officer (CEO) of Acronis. Comprehensive cyber protection solution “Users need an easy and efficient way to identify and close those vulnerabilities to ensure their system data and backups are secure and protected. Providing that capability in one solution with anti-malware and backup delivers comprehensive cyber protection and tremendous value.” Given this year’s increased number of remote workers and online shoppers, cyber-criminals are expected to be particularly aggressive in their attacks, especially during the holiday shopping season. The ability to close any security gaps in their system comes just in time for users taking advantage of the Black Friday and Cyber Monday deals. VB100 certified anti-malware In addition to the vulnerability assessment tool, the autumn update also introduces an enhanced anti-ransomware engine. The improved engine further strengthens Acronis True Image’s next-gen, full-stack antimalware technology, which recently earned VB100 certification by returning a 99.9% detection rate with zero false-positives in the independent lab’s tests. Peter Karsai, Head of Testing at Virus Bulletin, said "We were pleased to welcome Acronis True Image to our endpoint security certification programme and it came as little surprise that it achieved VB100 certification on its debut, the product's business counterpart Acronis Cyber Protect now having earned its third VB100 certification. We look forward to continuing to test both products." Enhanced ransomware engine The advanced anti-malware capabilities are included with Advanced and Premium licences The new vulnerability assessment tool and enhanced ransomware engine are both included in all editions of Acronis True Image 2021, the personal solution in the Acronis Cyber Protect family of products. The advanced anti-malware capabilities are included with Advanced and Premium licences, and offered as a three-month trial with Standard and Essential licences. “Increasingly, cybercriminals are leveraging artificial intelligence and other technologies to make their malware more effective and increase the frequency of attacks. Stopping these attacks starts with fixing vulnerabilities so they are denied access to your system,” noted Candid Wüest, Vice President of Cyber Protection Research at Acronis. Anti-malware solution Candid adds, “Yet even with strong system defences and an anti-malware solution, the reality is an attack can still get through. That’s why cyber security without backup and backup without cyber security, is ineffective against today’s threats. Only Acronis True Image delivers the cyber protection today’s users need.”
Radiflow, a provider of cyber security solutions for industrial automation networks, announces a collaboration with Mitsubishi Electric UK to address the needs of IEC62443 cyber security standards in the Critical Infrastructure and Industrial Automation markets. Radiflow develops trusted industrial cyber security solutions for critical business operations that have been successfully deployed in over 4,000 sites by major utilities and industrial enterprises worldwide. Security risk assessments The combination of the automation knowledge and tools of Mitsubishi Electric UK with the cyber security and IEC 62443 compliance skills of Radiflow, provides a holistic view of a client’s risk posture. Radiflow will also provide Mitsubishi Electric UK customers with a consultancy service for cyber security, which includes the provision of OT security risk assessments, provision of Radiflow intrusion detection software and general advice on alignment with IEC 62443-3. Supporting asset owners There is a growing demand for solutions that address the requirements of cyber security in the OT space" In addition, the solution will help customers to support asset owners in satisfying the requirements of the NIS Directive along with due diligence in alignment with CPNI (Centre for the Protection of National Infrastructure) best practice. Commenting on the announcement, David Bean, Solutions Manager for Mitsubishi Electric UK said, “Our new collaboration with Radiflow provides expertise in the field of OT cyber security which compliments and broadens the services that we offer our customers through the Mitsubishi Electric UK System Service Operation. There is a growing demand for solutions that address the requirements of cyber security in the OT space and we are looking forward to delivering those solutions and building our relationship further with the team at Radiflow.” Data-driven analysis Ilan Barda, Founder & CEO of Radiflow added, “Radiflow sees huge value for OT organisations to have cyber security services and solutions aligned with their automation systems. By combining the automation knowledge and tools of Mitsubishi with the OT cyber security skills and tools of Radiflow, we are able to provide a holistic view of an organisation’s OT risk posture.” In August, Radiflow launched Cyber Industrial Automated Risk Analysis (CIARA), the first fully automated tool for asset data collection, data-driven analysis and transparent risk metrics calculation including risk scoring per zone delivering best practice around risk modelling and management using the ISA/IEC 62443 series of standards.
Check Point® Software Technologies Ltd., a foremost provider of cybersecurity solutions, has announced that it has become a strategic partner of FinTech Scotland, an independent not-for-profit body jointly established by the private sector and the Scottish Government. Check Point solutions bring a practical boost to cybersecurity awareness and engagement with Scottish fintech firms. The collaboration will offer pioneering security solutions and education and training resources to help Scottish fintech companies protect their business and data against advanced cyber-threats. Protect business against cyber threats The partnership will see Check Point deliver cybersecurity education and training initiatives to organisations operating in FinTech Scotland’s cluster. It will also work with the fintech SMEs to enable cybersecurity from the outset with focused solutions to help protect their businesses against cyber threats targeting networks, cloud deployments and mobile devices. Fintech cluster FinTech Scotland is supported by a broad range of global financial services, technology, and professional services firms, as well as the University of Edinburgh and the University of Strathclyde, the Financial Conduct Authority, Scottish Government and Scottish Enterprise. Check Point brings its expertise and global experience in cybersecurity, which will help further develop Scotland’s position as a global fintech cluster. Embedded cybersecurity “Scotland is home to a phenomenal pool of fintech talent. However, as with many sectors, these firms face complex challenges right now, as they navigate the changes to their networks due to the rapid digital transformation and remote working practices forced upon us all,” said Roddy MacCallum, Head of Scotland at Check Point Software Technologies. “By partnering with FinTech Scotland, we aim to equip these firms with the tools and support they need to ensure cybersecurity is deeply embedded within their business in these challenging times and beyond.” Safe and secure innovation “We’re delighted to welcome Check Point as a strategic partner. They join a group of global organisations that have decided to support the development and growth of the Scottish fintech cluster.” “Cyber threats are one of the biggest concerns for fintech entrepreneurs. Involving a global expert in cybersecurity will help address those concerns and support fintech SME’s to confidently develop safe and secure innovation,” said Nicola Anderson, interim CEO at FinTech Scotland. Online event The partnership with FinTech Scotland further demonstrates Check Point’s ongoing commitment to providing essential education and training in Scotland. To mark the launch of the partnership, Check Point and FinTech Scotland are hosting an online event on 26 November to discuss the latest cybersecurity threats in the sector.
Over the last few years, the rapid increase in attacks of high-value assets across the UK has become a cause for major concern. Of course, for any organisation to lose an asset affects their bottom line. However, the impact of organised criminal activity doesn’t stop here. These stolen assets are often used to fund other unlawful endeavours in the criminal underworld. That’s why organisations are looking for new and innovative ways to combat organised crime. In these circles, Mark Roche, Head of Global Risk at Smarter Technologies, is no stranger. Roche is a highly trained specialist, one of an elite group trained to manage high-value asset recovery operations. Asset recovery operations Smarter Technologies’ Orion Data Network and devices are able to communicate directly with the police With Roche heading up the division, Smarter Technologies has a 95% recovery rate for all asset recovery operations. Amounting to over £5 million recovered in the last four years; organised crime groups have been arrested and clients have got their assets back. It’s no accident Roche is considered an expert asset tracker—he has the highest rate of recovery in the UK. Put simply, if an untampered, working tracker is stolen, he will find it in the exact location. Roche’s years of experience coupled with Smarter Technologies' state-of-the-art security solutions make for the ultimate team in combatting organised crime. Full-service security solutions Roche has been using Smarter Technologies’ tracking technology since it was first released, “I joined the Smarter Technologies team as I value the effectiveness of the tracking technology. In fact, I have been using Smarter Technologies’ equipment since 2007 in different roles. I was the first one ever to catch an organised crime gang when the kit was deployed in 2007.” Smarter Technologies’ Orion Data Network and devices are able to communicate directly with the police, which is vital in ensuring successful asset recoveries. Roche also conducts awareness training with police officers in the UK and IrelandUnlike other tracking technology in the market, Smarter Technologies offers a comprehensive crime prevention and a full range of recovery services. “We are one of the only companies that not only sell you the products, but also look to actually recover the asset. If an incident occurs, we take away some of the stress from the client by dealing with the police, all the statements and the recovery process - and even the court cases where clients would normally have to face the criminal gang - keeping clients up to date as we go along,” Roche says. Partnership with the police Roche has been involved in security operations for over 20 years, spending six years working in a covert capacity with the police. With a background in asset tracking, criminality, and behaviours, it is Roche’s practical, on-the-ground experience in detection and recovery that makes him an invaluable asset to police forces around the country. "I work with a network of police forces across the UK and Ireland. The issue is that police forces sometimes don’t have the resources to deal with asset theft. When it comes to their resource allocation and prioritisation between the theft of an asset and a case that involves potential preservation of life, the latter will always come first.” That’s where Roche steps in. “My process involves liaising with police force wherever that asset was stolen from, working with the troops on the ground and locating the tracker to a precise location. I also advise on potential criminal escape roads.” Smarter Technologies equipment awareness training Roche also conducts awareness training with police officers in the UK and Ireland on how to use Smarter Technologies’ equipment to implement an effective recovery. Mark is also known now as an expert tracker across many police forces and trains officers on tracking" Jason Hendy, Head of Serious and Organised Crime, Essex and Kent Police, says, “I have worked with Mark Roche for a number of years, and his application of Smarter Technologies’ equipment has had a significant impact in reducing crime and improving recovery rates. Mark has helped catch more criminals with his equipment than any other company we know. Mark is also known now as an expert tracker across many police forces and trains officers on tracking. We look forward to continuing our association to ensure we maintain our position at the forefront of detection and the successful prosecution of criminal behaviour.” Asset recoveries across a global network One of Roche’s greatest strengths is that he understands criminal behaviour and the approaches they take – and uses this knowledge to stay ahead of them, not just in recovery tactics, but making criminals less likely to steal in the first place. With regards to the sophistication of the technology itself, Smarter Technologies is continually investing in research and development to keep ahead of criminals. “In the cat-and-mouse game of fighting criminal activity, it’s our goal to always be one step ahead of the criminals. We are building and strengthening an expert team to tackle asset recoveries across the global network,” adds Roche.
PSA, a large consortium of professional systems integrators, announced the addition of Qumulex, to its Managed Security Service Provider Program (MSSP). Qumulex offers a cloud-based, unified access control and video surveillance solution for physical security integrators that serve commercial markets. Modern progressive web app “Qumulex designs products that make the transition from legacy systems to the cloud, easier and more manageable,” said Tim Brooks, Vice President of sales and vendor management for PSA. “This hybrid model allows customers to be both on-premises and in the cloud without having to entirely replace a legacy system. We are very pleased to add Qumulex to our lineup of products.” Qumulex’s video management and access control system is browser-based, using a mobile-first, modern progressive web app that runs on any device with a browser. The Qumulex open platform assures maximum flexibility for security integrators to choose best of breed cameras, door controllers, switches, analytics, and cloud integrations. Migrate on-premises installations to cloud “We’re very pleased to partner with PSA and provide its members a video surveillance and access control platform to migrate their customers from on-premises installations to the cloud and recurring revenue,“ said Tom Buckley, VP Sales & Marketing on Qumulex. “With Qumulex, dealers have one modern, easy to use platform which they can easily manage all of their customers and provide remote setup and support.” PSA’s MSSP program hinges on uniting pioneering partners in cybersecurity and cloud-based security solutions, offering training and certification opportunities and financing options with assistance from PSA.
The security industry knows the value of recurring revenue, as it’s the foundation of the residential security monitoring market. Commercial systems integrators have traditionally taken a different approach, focused on one-time commodity-based sales that lack the financial benefits provided through long-term serviced-based agreements. Cash flow is one of the biggest challenges faced by security systems integrators. And the truth is, during economic uncertainty, businesses will find that companies that have adopted and implemented a sales model that incorporates a monthly-based service program will be more financially secure. Technology solutions TAMCO was founded in 1994 by Jack Thompson who had a unique background that included technology integration, finance, and sales. With this knowledge, he set out to build a company that would introduce a finance offering and business model that addressed the pitfalls within cash and traditional lease procurement methods. The design of this finance offering was under the premise that most technology solutions are non-revenue generating assets. Most technology solutions are non-revenue generating assets The goal was to give the end-user customer a better way to pay with more control and flexibility as they entered in and out of technology lifecycles. At the same time, this new offering would give integrators easier ways to sell services with those technologies while shortening the selling cycle. With changes in telecommunication solutions several years ago, we noticed typical voice integrator partners attempting to diversify their technology solution offerings. We explored providing payment options for these additional technologies and found several areas with significant interest in our approach. About two years ago we saw increasing interest from within the security industry and this is now one of our top growth sectors today. Being in control Historically integrators have done a great job of getting customers accustomed to cash purchase transactions. While owning technology solutions may have felt like a way to be in control, customers have begun to realize that ownership is really not a necessity. It is the use of the technology and what they can do with the use of the technology that is truly meaningful. Now add to that the fact that technology continues to change more quickly than ever and I think it makes sense that customers are looking for better ways to pay for and manage their technology needs. Integrators have begun to express an overwhelming interest in creating recurring revenue At the same time, integrators have begun to express an overwhelming interest in creating recurring revenue. They are looking for ways to complement their one-time project-based revenue business or shift to a model that is focused on a regular stream of revenue. However, many integrators are not sure how to implement this new approach. As-a-service is just another way of saying a subscription service. At the consumer level, we are all very familiar with subscription services, such as Netflix or Birchbox. Small to medium-size businesses and enterprise-level commercial customers are also familiar with equivalent type technology services from their hosted phone service subscriptions or software-as-a-service (SaaS) solutions. As-a-service security If an integrator can package their technology solution in the form of an as-a-service solution, they will have a much better chance of developing recurring revenue. A majority of as-a-service models involve the customer paying for hardware equipment upfront and then having a monthly payment only for monitoring or support services. Or, to avoid a large upfront capital outlay, the integrator may arrange for a traditional lease payment that gives the illusion of as-a-service but still results in the customer owning dated equipment at the end of the term. TAMCO takes a different approach because we help integrators create a very comprehensive and logical solution under a single, use-based monthly payment. The integrator still designs, configures, and recommends the technology solution appropriate for the customer. But TAMCO will take the cash sale price of hardware, software, installation, manufacturer warranty, multi-year maintenance and support, and convert all of that to a single all-inclusive monthly payment which the integrator can present to their customer. In addition, this as-a-service monthly payment also provides the customer with exclusive protection against technology obsolescence. Integrators have really been excited to learn of this approach and to convert to selling this way. Integrators can remove themselves from being a commodity sale and thereby maintain margins Integrators can remove themselves from being a commodity sale and thereby maintain margins. They become much more successful at selling multi-year maintenance and support agreements, thereby building recurring revenue which is valuable to help weather slow periods of sales activities and economic downturns. And following the market currents of subscription-based solutions helps create long term customer relationships. Whether an organisation works with TAMCO or not, there are certain foundational elements they need to embrace in order to build and adopt a successful as-a-service sales model. Some form of payment alternative like we discussed is certainly one of those elements, but it is not necessarily the most important. The technical expertise to deliver on support has to be there for the customer. While sales training, mindset shift, and supporting marketing materials are all critical as well.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyse the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognising and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognising and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behaviour analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognising suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and number plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specialising in VMS and modular AI analytics at ISC West 2020. Even if recognising suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and number plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyse employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyses the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognised the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognise all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specialising in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specialising in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco acquired by private equity firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic spins of security business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy year for acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola continues video push with VaaS acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE acquires access control companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy expands capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter going private and selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com expands commercial offering with OpenEye acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimised for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT makes multiple acquisitions, sells Canadian operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specialises in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer programme Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer programme, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardising the behaviour and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimising physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specialising in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognise the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customised solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximise their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
With traffic levels constantly rising, cities around the world are looking for ways to manage the sheer number of traffic on their roads. The city of Chorzow in southern Poland wanted to go a step further and provide information to streamline their public transport on the roads, as well as regular vehicles. They approached Sprint, a systems integrator in Poland, who delivered an intelligent traffic management solution using Hikvision technology. City municipal Board of Streets and Bridges in Chorzów (MZUiM – Miejski Zarząd Ulic i Mostów) an organisational unit of the city is responsible for the management of public roads in Chorzów. Offering image stabilisation The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System. The department had extensive requirements for this complex system to truly meet its needs. Firstly, they needed to be able to recognise number plates efficiently, even at high speeds of up to 250 km/h. Further the system needed to be able to classify the vehicles. The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System Secondly, the cameras used needed to have a high image quality and also to have some aesthetic quality, as they would be mounted all over the city, sometimes in prominent places. The ability of the cameras to maintain a high image quality in low light conditions, and to offer image stabilisation were also important for this project. Traffic management system The system needed to effectively monitor traffic on major roads and intersections throughout the city. It would be used for a variety of activities – from verifying accidents to tracking truck routes. A high priority for the solution was to create a traffic management system in the city, taking into account relevant data submitted to the Traffic Control Centre. With this, the MZUiM could optimise signalling work and create priority for public transport vehicles. Chorzów’s Traffic Management System using Hikvision ANPR intelligent cameras other supporting CCTV was installed by Sprint in 2019. The system used the DarkFighter Network Speed Dome PTZ camera (DS-2DF6A236X-AEL) in key areas. This camera has high sensitivity in low light levels, image stabilisation and rapid focus, making it ideal for the position. Client-server system platform They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections, to capture all the access roads to the intersection. These also come with lower infrastructure costs, since they combine four cameras into one. They also look pretty good! Footage from the cameras was recorded using 5 4K NVRs (DS-9632NI-I16) and it was all brought together using the HikCentral client-server system platform. But perhaps the real hero in the system was the ANPR technology. ANPR data from the ANPR Checkpoint Capture Unit (iDS-TCV300) provided key data to meet the project’s needs. This included recognition of registration numbers up to a speed of 250 km/h, recognition of overloaded vehicles, and vehicle classification. The system was also designed to integrate the information transmitted from induction loops embedded in the roads, which register a vehicle as it drives over them. Intelligent management software Łukasz Cysewski, Project Manager at Sprint, says: “Hikvision’s solutions in the field of intelligent ANPR cameras and CCTV best corresponded to the project requirements. Specifically, we were impressed with the scope of implemented functions and effectiveness of the ANPR cameras, image quality and overall management of the CCTV system. Hikvision also offered a high level of support to integrate the smart cameras with our intelligent management software.” The system gave Chorzów the ability to monitor their traffic in one place. This brought a raft of benefits, like automatic detection of road offenses, and allowing the department to prioritise public transport for a quicker journey. It also allowed Police to track suspicious vehicles, with integration into their Smart City platform.
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. Built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analogue legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports colour filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorised entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
Shift5, Inc., a cybersecurity company, has been selected by the Army's Rapid Capabilities and Critical Technologies Office (RCCTO) to deliver a prototype vehicle security system for a critical ground vehicle platform. Under the $2.6 million OTA, awarded November 12, 2020, Shift5 will provide unified cybersecurity prototype kits designed to help protect the operational technology of the Army's Stryker combat vehicle platform. Rapid prototyping efforts This award is a result of Shift5's participation in RCCTO's inaugural Innovation Day event, held in September 2019. The Army's RCCTO Innovation Day resembles a commercial investor ‘pitch day’ and supports new rapid prototyping efforts designed to accelerate the transition of emerging technology to Soldiers. As part of the process, Shift5 submitted a white paper in response to an open Broad Agency Announcement; delivered a presentation among a group of 42 companies; and was selected to quickly prototype its hardware and software to provide value to the warfighter. Military weapon system "Shift5 is answering the call to arms about military weapon system cybersecurity vulnerabilities. Our products are currently deployed protecting commercial rail and aircraft, and this newest engagement will integrate our products onto military ground vehicle platforms," says Josh Lospinoso, Shift5 CEO. Over the course of a year, Shift5 will develop, test, and refine an enhanced vehicle security system prototype and deliver a transition-ready product. The Shift5 solution will increase the cyber survivability of the vehicle across the full lifecycle. The solution will also provide increased situational awareness about the cyber health of the fleet and resources in the event of a cyber-incident.
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, has announced that Olymbec, globally renowned privately owned industrial real estate holder on the US East Coast and Canada, has chosen Hanwha cameras to help secure its properties and improve rentability. Managing upwards of 300 properties in Quebec, Canada and 15 different states in the US, Olymbec owns more than 30 million square feet of property. Managing this much real estate means that Olymbec has to balance a variety of concerns, including providing positive tenant experiences, generating revenue, and protecting assets. Countering growing cases of theft and vandalism Olymbec’s existing analog-based camera systems were not meeting the company’s needs When it comes to security, the company is faced with everything from accidental damage and theft to vandalism and refuse dumping both inside and outside their buildings. However, Olymbec’s existing analog-based camera systems were not meeting the company’s needs. After looking at a number of different options, the company chose Hanwha Techwin because of the range of products, the modularity of the solutions the excellent training and customer support, and the cost, which allows Olymbec to add components easily. Hanwha Techwin cameras deployed Olymbec has deployed over 700 operational cameras and carries stock for both replacement purposes and new systems. The deployed cameras are connected to either a Wisenet WAVE VMS system in their larger installations or to NVRs in their smaller installations. Through their VPN, everyone at Olymbec, from the Chief Technology Officer (CTO) to security personnel and property managers, can access video footage from every security camera remotely from their smartphones and tablets. Remote video footage access This allows security administrators to view footage from anywhere, at any time and gives them the flexibility to react quickly and appropriately, when an incident occurs. Hanwha cameras have the capability to trigger alerts and alert security personnel, based on a variety of rules such as detecting motion after hours. Olymbec has spent approximately three-fourth of a million dollars on equipment from Hanwha Techwin to deploy its new security infrastructure. The result is a robust, homogenous environment that makes it easy to manage and add new camera systems to the company’s various properties. Multi-sensor, multi-directional cameras installed Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes The Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes. This means that Olymbec relies heavily on the quality of the video feed. To capture the best possible video, Olymbec decided to go with multi-sensor, multi-directional cameras, which are deployed across the company’s properties allowing them to cover a very wide area with just a single device. The multi-sensor cameras also work very well when the time comes to pull the video footage for investigation. This is especially helpful because Olymbec’s security department receives video requests from law enforcement at least 4-5 times a month. Reliable and flexible video security system “Using our new security system, we are able to ensure the integrity of our video evidence. This is important when local law enforcement asks us for footage to help with an investigation,” said Jack Ross, Chief Technology Officer (CTO) at Olymbec USA & Canada. The company, Olymbec has stated that they remain enthusiastic about their decision to install more number of Hanwha Techwin cameras across their various properties in the US and Canada. “It was important for us to choose a platform that is both complex enough to meet our needs and reliable enough to set up and simply let run. When it comes to reliability, as well as flexibility and ease-of-use, I think Hanwha Techwin really shines,” concludes Jack Ross.
Supra, a provider of mobile credentialing and entry management systems for automotive and real estate sectors, announces that its TRAC-Box key management solution has been selected by Oregon-based Guaranty RV Super Centres to help secure and track keys while keeping pace with a growing demand for recreational vehicle (RV) travel. Supra is a part of Carrier Global Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. Located in Junction City, Oregon, Guaranty is the state’s largest dealer of recreational vehicles, from entry-level tent campers to luxurious diesel-powered RVs that sell for more than $400,000. Gaining valuable sales An industry publication, RV Business, has named Guaranty one of North America’s top 50 dealers for six consecutive years and a top 10 dealership based on customer reviews. “With our large footprint of 25 acres and long dark winters, it is difficult to have visibility of activity,” said Marty Nill, managing partner, Guaranty. “With the Supra TRAC-Box, we’ve improved security and gained valuable sales and marketing insights, and assigning permissions is simple. We’re confident we have authorised access to our vehicles with tracking controls in place. Our vehicles are retail-ready using the Supra TRAC-Box.” Providing greater visibility Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles. Each TRAC-Box uses Bluetooth to communicate with Supra’s eKEY® mobile app on smartphones carried by Guaranty sales associates. They enter a PIN code into the app to unlock the keybox and acquire the keys from a built-in container. “Each time an authorised user opens a keybox, a record of the activity is stored in both the TRAC-Box and eKEY app, so managers and users can see the history of openings without having to return to the office,” said André Lalande, vice president – sales, Supra. “The app also transmits activity to the TRACcess Manager software to create an audit trail providing greater visibility to lock-up activities.” Removing access permissions TRACcess Manager also provides prompt visibility to the activity and frequency of RV showings, enabling management to see which RVs are most popular and reposition vehicles more efficiently. Notifications can also be set to alert management of keybox activity on specific inventory they want to monitor, for example, each time the 10 most expensive RVs are accessed. The TRAC-Box system also promotes accountability among associates and saves time looking for misplaced keys needed to show vehicles. When salespeople leave the company, managers can remove access permissions in easy, streamlined steps via any internet-connected computer or mobile device within a few minutes. Supra is featuring the TRAC-Box system in its virtual exhibit at the RV Dealers Virtual Convention & Expo, Nov. 9-20, 2020.
The new CCTV system installed by WLS at Vauxhall City Farm, is according to its Chief Executive, Monica Tyler, being used to its full potential to ensure that the 50,000 visitors who visit the farm every year, are able to safely enjoy all its facilities. “Our previous CCTV was well past its ‘use-by’ date. Although it was still working, it lacked the functionality we needed to ensure around the clock security of our animals and property, as well as ensuring compliance with our health & safety procedures,” said Monica. Central urban farms “The new CCTV system, generously donated and installed by WLS, has transformed our working lives by providing us with peace of mind in knowing we can monitor every area of the farm, including our recently opened eco-garden, without any blind spots.” “The quality of the images captured by the Dahua cameras enable us to see close up detail of any activity or incident, whilst I and other colleagues are able to use an app running on our mobile phones to remotely keep an eye on the farm when it is closed and if there is an alarm event.” Located within earshot of Big Ben, Vauxhall City Farm is one of the oldest and most central urban farms in London. Local and wider communities The farm was established in 1976 when a group of architects began working on a vacant plot of land The farm was established in 1976 when a group of architects began working on a vacant plot of land and made it available to local residents for them to grow vegetables and care for livestock. From those humble beginnings, the farm has continually grown and is now the home for over 100 animals, a riding centre and a cafe, and with the enthusiastic support of a large team of volunteers, conducts dozens of education and youth projects. As a registered charity, the farm’s main objectives are to enhance the health, well-being and life chances of children and disadvantaged people, as well as create enjoyment and recreational opportunities for those from our local and wider communities. Intruder detection systems WLS’s connection with Vauxhall City Farm spans over 15 years, during which it has installed and maintained the farm’s fire and intruder detection systems, as well as the now superseded CCTV system. Alison Ewen, the wife of WLS’s managing director, also has a close bond with the farm. Having been a volunteer for over 20 years, Alison has been appointed a trustee specialising in Riding for the Disabled activities. “As a company which has enjoyed considerable success installing a great number of electronic security solutions across London, we believe we have a corporate responsibility to give something back to the community,” said Jeremy Ewen. “We have welcomed the opportunity to do so by supporting a charity which we have such high regard for, in respect of the support, education and enjoyment it gives to so many people.”
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Security service: Manufacturers & Suppliers
- Bolide Security service
- Dedicated Micros Security service
- Dahua Technology Security service
- VIVOTEK Security service
- Seagate Security service
- ITI Security service
- Hanwha Techwin Security service
- Vigilant Vision Security service
- Vanderbilt Security service
- OT Systems Security service
- Messoa Security service
- HID Security service
- Panasonic Security service
- Tamron Security service
- Nedap AEOS Security service
- LILIN Security service
- AMAG Security service
- Parabit Security service
- Pelco Security service
- Videotec Security service