Luxul, globally renowned innovator of IP networking solutions for security integrators, has announced its technology lineup for ISC West 2019, taking place April 10-12 at the Sands Expo in Las Vegas. In Legrand | AV's booth 29098, Luxul will exhibit PoE Self-Healing, managed Gigabit switches; award-winning routers with integrated Domotz remote management technology; the company's next-generation wireless controller; "Good, Better, Best" dual-band wireless access points (APs); and the new Easy Se...
Everbridge, Inc., the global provider of critical event management and enterprise safety software applications to help keep people safe and businesses running, announced the launch of its Crisis Management solution, a new software application designed to help organisations dynamically manage the lifecycle of a critical event and accelerate response and recovery times. Crisis Management, which is fully integrated with the Everbridge Critical Event Management (CEM) suite, centralises incident res...
AlertEnterprise Inc., global physical-logical security convergence software company, has announced its latest evolution in insider threat protection with the launch of its next-generation Identity Intelligence technology, available in the upcoming release of Enterprise Guardian and Enterprise Sentry software (“The system”). Identity Intelligence technology Identity Intelligence technology is designed to dramatically reduce the time and cost for detecting and resolving risk by automa...
You can work smarter and more sustainably when electronic locks and keys power your security. An electronic locking solution minimises security risks when keys go missing. With an eCLIQ system from ASSA ABLOY, you can manage everyone’s access from anywhere, at any time — electronically, securely and wirelessly. Based on award-winning CLIQ access control technology, the eCLIQ system is built around precise locking mechanics and high-end microelectronics. A battery inside each program...
IONODES, a market innovator in dedicated IP video appliances, announced that it has joined the Genetec Technology Partner Program as a Silver Partner. Genetec is a global provider of unified security, public safety, operations, and business intelligence solutions. IONODES’ Secure Display Stations, which offer a secure and reliable video wall and spot monitor solution, is now fully integrated with Genetec Security Center. The integration is available as of Security Center 5.7 Service Releas...
Visitors to The Security Event will be among the first to see live demonstrations of some of the latest products to be launched by Tyco, the security division of Johnson Controls. A wide range of access control, intrusion and video products from the American Dynamics, Exacq, Illustra, Bentel, CEM Systems, DSC, Kantech, Software House and Visonic brands, which are supplied under the Tyco umbrella, will be on show on stand SE102. These include: Access control credential iotega, an all-in-one sm...
DICE Corporation is pleased to announce and welcome Carl Galsterer as the company’s new chief network architect. Galsterer will be responsible for overseeing all aspects of the company’s information technology infrastructure, including the design and implementation of customer networks and process standardisation. More about Carl With over 16 years of experience in network engineering as a senior engineer, Galsterer was pivotal in building the Charter Spectrum network throughout Michigan and the Midwest. In his new position at DICE Corporation, Galsterer will work in combination with our telecom partner IPtelX to develop innovative and exciting opportunities for the security industry, including advanced proprietary telecom networks designed specifically for alarm companies. DICE Corporation is positioning alarm companies with the resources to be able to compete with cable providers As the security industry continues to experience new challenges with changing technology and consumer habits, Galsterer’s extensive knowledge will help make DICE Corporation an integral partner for alarm companies looking to diversify their offerings. This year, the company will start supplying a triple play of security software, phone, and internet services for residential and commercial subscribers. By offering this new approach, DICE Corporation is positioning alarm companies with the resources to be able to compete with cable providers, adding more ways to increase value for their customers and boosting recurring monthly revenue. Triple play services “We are very excited to have Carl join the DICE team,” said DICE Corporation president and CEO, Cliff Dice. “The new triple play of services we are making available for our customers is going to be essential for alarm companies moving forward. We already have a few customers testing this concept and they have doubled and sometimes even tripled their recurring revenue per customer. I am confident Carl’s contributions will help us continue to provide the unmatched service and value our customers have relied on for over 25 years.” Dice said.
Matrix NVRs are packed with high end processors to deliver all the functionalities like high resolution recording, playback, simultaneous local and remote monitoring along with storing for higher number of days. Furthermore, these latest NVRs are also backed with an intelligent software to detect threats and send instant notifications for real-time security. All in all, these comprehensive, flexible, reliable, integrated NVRs provide a proficient, persistent and a preventive security solution suitable for enterprises and multi-location offices. Key features The features of SATATYA NVR3204X Video Channels: 32 IP Channels Inbuilt Storage Slot: 4 SATA Ports (10TB each) Raid Support: RAID-0, RAID-1, RAID-5, RAID-10 Compression Technique: H.265 with 512Mbps Throughput Cascading: Monitor Cameras Connected with up to 20 NVRs without a Server Instant Notification: Call Responsible Person in Case of an Event and Sent SMS/Email with Snapshots in Real Time. Integration: Database Level Integration with Matrix Access Control, Fire Alarm and other Third Party Sensors
Morse Watchmans, the provider of key control and asset management systems, is demonstrating their new KeyWatcher Fleet system along with their KeyWatcher Touch key management system at this week’s Security and Counter Terror Expo (Stand C36) in London. “While KeyWatcher Touch continues to deliver the best in key management for general security operations, we are very excited to launch KeyWatcher Fleet to address the specific needs of fleet operations and management” said Fernando Pires, CEO at Morse Watchmans. Reducing operational costs “When you control the keys, you control the fleet – so this new solution will be a tremendous advantage to fleet managers across all industries.” KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usage while reducing many operational costs. Managers can create user role-based ‘Pools’, or groups of vehicles, to automatically assign each vehicle accordingly. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle Flexible booking workflows enable customisation to balance usage, ensure vehicle availability and more. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. Desktop fingerprint reader Alongside the KeyWatcher Fleet system, Morse Watchmans is showcasing their flagship KeyWatcher Touch key management system, utilising a touch screen and their patented SmartKey system with KeyAnywhere technology that makes it simple to return a key to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. “We’ve continue to add enhancements to our KeyWatcher Touch system, making it ever more capable,” said Mr. Pires. “We always welcome the opportunity to connect with our community and show them what additional benefits Morse Watchmans can deliver.”
WeSuite, a software manufacturer of industry-leading sales management tools for technology sales and service providers, announced today the release of the WeSuite Site Survey, a powerful project documentation tool that ties in automatically with WeEstimate. The Site Survey Module allows users to create simple to highly detailed site surveys on their iPads, tablets or laptops. Users represent a job site on the Site Survey canvas by uploading images of floorplans, maps, photos, or by sketching layouts and then drag-and-drop real parts and part packages into place. Parts are displayed as photo images or icons on the canvas, making them easy to identify. These may be images of the user’s choice or selected from a of library of security icons included free within Site Survey. Auto generation of materials bill Out-of-the-box integration with the PSA Security Catalogue and accounting platforms make it simple to select from the company’s actual material offerings. Within each survey, users may include notes at the part and project level for use by sales, accounting and operations teams responsible for follow-up. As each site survey is created, WeSuite’s software adds all specified parts to the corresponding project folder along with pricing. When the user is ready to generate an estimate or proposal, a bill of materials is automatically created based upon all parts indicated on the canvas. The Site Survey Module is an add-on module for users of WeSuite’s WeEstimate software The site drawing may be included within the proposal scope of work and serve as a useful supporting document for each sale, to share with customers and operations teams for reference during installation. The Site Survey Module is an add-on module for users of WeSuite’s WeEstimate software. Easy creation of detailed surveys “For security and technology integrators, creating meticulous site documentation is vitally important for calculating accurate estimates and ensuring a smooth workflow throughout the installation process. It’s also something that many salespeople dread. “The Site Survey Module makes it easy for sales people to create detailed surveys, collaborate with their customers if they’d like, while simultaneously streamlining and automating much of the quoting process,” explains Tracy Larson, President of WeSuite. WeSuite’s Site Survey be on display at ISC West, booth 33040.
Amped Software, a developer of forensic image and video analysis solutions, has launched Amped Replay, a new tool which allows frontline police officers and investigators to quickly and easily view, analyse and present video evidence. With Amped Replay, non-specialist units can convert and play videos from a variety of proprietary formats, apply basic enhancements, annotate and redact images for investigations and media release, all while maintaining the integrity of the evidence and without having to rely on the availability of experts in the forensic video lab. Amped Replay’s intuitive and easy-to-use interface gives users the ability to perform quick enhancementsVideo footage from CCTV and DVR systems, body-worn cameras, dash cams, mobile phones and social media can be crucial in progressing an investigation, especially in the ‘golden hour’ when time is of the essence. However, with a multitude of proprietary video formats to consider, even playing and viewing the footage can be time-consuming and difficult. Intuitive and easy-to-use interface Powered by the same CCTV video conversion engine that sits behind Amped Software’s other solutions for forensic experts, Amped Replay solves this problem by enabling users to simply drag and drop the footage into the software, where it is ready to view. From there, Amped Replay’s intuitive and easy-to-use interface gives users the ability to perform quick enhancements, to annotate or redact parts of the footage and to export the results to be forwarded to a colleague or shared with the media as part of an appeal for information. For example, in the case of a missing persons enquiry, key details such as the individual’s face or the number plate of the car they were last seen in can be magnified ahead of sharing with local press. Validated tools to ensure forensic integrity With Amped Replay, organisations are reassured that video is processed correctly, using validated tools to ensure forensic integrityBy enabling frontline officers and investigators to independently view the evidence and proceed with any further lines of inquiry, the technology helps alleviate stretched police resources. In routine cases, it empowers frontline professionals to do more independently of the forensic video lab, thereby making themselves more self-sufficient and freeing up forensic experts to work on more challenging and complex cases. “We know how problematic proprietary video formats can be for our users and their organisations,” said Martino Jerian, CEO and Founder of Amped Software. “We saw the need for a tool to assist an entire organisation with its video evidence, starting from the field. With Amped Replay, organisations are reassured that video is processed correctly, using validated tools to ensure forensic integrity.” Maintaining integrity of original footage While Amped Replay facilitates access and use of visual evidence, it also ensures that the original footage maintains its integrity by monitoring any modification to the images so that every enhancement and annotation works as a filter, leaving the initial file untouched. This means that the evidence isn’t tampered with and that each professional who comes in contact with it is protected. Amped Replay is compatible with standard PC’s and does not require additional plug-ins, third-party software or special hardware“As a former police officer, and specialist in forensic video analysis, I know just how crucial video evidence is to the successful resolution of a case,” said David Spreadborough, International Trainer at Amped Software. “We’ve created a tool which can be utilised throughout the entire justice system, empowering investigators and frontline officers to examine evidence in the initial stages of the investigation process, reducing delays and ensuring resources can be deployed where they can have the greatest effect.” Amped Replay is compatible with standard PC’s and does not require additional plug-ins, third-party software or special hardware. Amped Software is debuting Amped Replay at the Forensics Europe Expo, currently taking place at London Olympia.
Employees from Hikvision USA Inc., a provider of security hardware equipment and software solutions, worked with non-profit Mission 500 to assemble 250 backpacks with school supplies for students who attend East Hartford, Conn.-area Title 1 schools. Members of Hikvision’s Northeast regional team volunteered at Mission 500 partner World Vision’s Teacher Resource Center in East Hartford, Conn. The resource centre warehouses donated learning and classroom supplies that are provided to teachers at qualifying Title 1 schools. Title 1 schools have large concentrations of low-income families. Backpack supplies were purchased with donated funds from Hikvision. Helping under-served children “It was a rewarding experience to work together with the Hikvision team during the holiday season to help under-served children in the East Hartford community. This year is the Mission 500 10th Anniversary, and we are excited by the expanded participation of organisations like Hikvision that are committed to stepping out in creative ways to touch lives by increasing their corporate social responsibility impact,” said Tom Nolan, director of strategic partnerships for Mission 500. We discovered that backpacks filled with school supplies were much needed in the community, and would have the greatest impact on the kids"“Hikvision's Northeast regional team wanted to invest our time in giving back to the communities we work in. Through Mission 500, we discovered that backpacks filled with school supplies were much needed in the community, and would have the greatest impact on the kids in East Hartford,” said Andre Greco, director of sales for Hikvision. Participation in volunteer events Seven Hikvision team members met at the Teacher Resource Center and spent the day building care kit backpacks and writing encouraging messages to students to be included in the backpacks, and also helped to unpack and sort donated goods from large retailers, he added. Mission 500 is a non-profit organisation that works with the security industry to serve the needs of children and communities in crisis. An active partner of Mission 500, during 2018, Hikvision employees participated in several volunteer events, including the third annual Mission 500 February Hockey Classic in Toronto, the Security 5K/2K at ISC West in April, and the November Puerto Rico service trip where Hikvision employees helped victims of Hurricane Maria rebuild their homes.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. This is part three of our 'AI in Physical Security' series. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organisations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise software companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organisations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analysing mobile endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behaviour, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyse past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyse past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analysing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android mobile endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution of artificial intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behaviour or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionising the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
A rapid string of merger and acquisition (M&A) transactions as 2018 passed into 2019 suggests the physical security industry may be on the verge of a busy year of companies buying other companies. Observers have noted a large amount of investment capital currently available to be invested in security M&A, and plenty of entrepreneurial companies are looking to be acquired. Joe Grillo, CEO of ACRE, previously hinted at upcoming M&A activity for his company by the end of 2018, foreshadowing ACRE’s late-year announcement to acquire access control company Open Options, Addison, Texas.The VaaS cloud-based image capture platform includes fixed and mobile license plate reader cameras driven by machine learning Just days later, in the midst of the holiday season, Qognify announced its plan to acquire On-Net Surveillance Systems Inc. (OnSSI) and sister company SeeTec GmbH. Then came an even larger announcement: Motorola has acquired VaaS International Holdings Inc., a data and image analytics company for $445 million. The VaaS cloud-based image capture and analysis platform includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. Most recently, ADT announced yet another acquisition, Advanced Cabling Systems, a technology integration company in the South, thus continuing consolidation on the integration side of the business. There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019 Continuation of the trend In the case of the Qognify and Motorola deals, Jon Cropley, Principal Analyst, Video Surveillance & Security Services, IHS Global Limited, sees them as the next chapter in an M&A trend going back several years. “I think this is a continuation of what we have been seeing in recent years of video surveillance software vendors being acquired,” he says. In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features" “In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features and are looking at software to offer unique competitive advantages.” In short, he sees it as a continuation of a trend that previously saw Canon acquiring Milestone Systems and Briefcam, Panasonic acquiring Video Insight and Tyco acquiring Exacq. “There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019,” adds Cropley. “However, a spree of large-scale mergers and acquisitions is not expected.” Memoori, another market research firm, forecasts that the value of acquisitions could actually decline marginally in 2019 in value terms but increase in number. This observation is based on Memoori’s charting of physical security deals over the last 18 years. Jim McHale, Managing Director of Memoori, says there have been four cycles of increase and decline in activity, often exaggerated by billion dollar deals in one year such as the merger of Johnson Controls and Tyco of $165Bn in 2016. Access control when combined with identity management is punching well above its weight, and this trend has continued Access control to open systems Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead “It may be too early to make judgements on the future based on the last four weeks, but there are some interesting points that can be made when compared with our 2018 analysis,” says McHale. “Access control when combined with identity management is punching well above its weight, and this trend has continued. "Acre has been a major contributor and has completed some 10 acquisitions. In general, the access control business has been slow to move to open systems, and hopefully we can expect this trend toward openness to continue as it will give additional growth to the business.” For more commentary from Memoori, see their report “Major Trends in the Global Access Control Market 2018”. Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead. While past trends may provide a glimpse of what’s coming, there are always new variables. It’s a sure bet the overall trend toward consolidation will continue but predicting the pace and timing of individual transactions is almost impossible. In any case, it will be interesting to watch how 2019 unfolds on the M&A front, among other factors in a changing industry.
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorised access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher single access card control system Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Centre Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Centre central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast facts about the project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilised: Command Centre Controller 6000 T-Series readers Tag Boards Car park Management
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the cut-throat high street environment. Best-selling products They resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise How do we know if our marketing strategy is working? What is the conversion rate of purchases? What are the ‘hot areas’ of the store, and do these actually represent best-selling products? Originally, with no access to significant information, they relied on experience and conversation with staff. But there was no way to verify these findings. They also needed to be able to get this information remotely – i.e. management in their HQ in Warsaw wanted to be able to see the situation in the other four stores without having to visit them separately. Sometimes, they resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise. Tailor-made solution Miniso turned to Hikvision AI products, with a solution built by Polish reseller Volta, including people counting cameras, fisheye cameras and NVRs. These were all coordinated using the HikCentral software platform. A people counting camera in each store counts people passing by, while another counts people entering and leaving. With this tailor-made solution management could calculate how many people were passing by to see a purchasing conversion rate. This also helps them to know whether marketing strategy is working. They can analyse the information further to see whether the rate of people entering the store is dropping, and whether that relates to the number of those passing outside. Miniso’s management can then look into the causes of these numbers, along with sales figures, to form a picture. For example, whether there is an external factor affecting shoppers either to pass by, or to enter. Video management platform The professional video management platform allows managers to access the information from different offices and mobile applications anywhere Because Miniso have the same technology set up in all the stores in Poland, they can compare different locations. This also comes in useful when it’s time to negotiate rent with shopping malls. Using ceiling installation of several fisheye cameras, the system can generate heat maps. This helps managers to see where ‘hot areas’ are, helping them to allocate products in the optimal place for promotion. Hot areas can also be compared with sales figures to provide further insights into shopping patterns. All the information provided by the system is coordinated, and business information on both layout and original image can be overlaid in Miniso’s HQ in Warsaw. The professional video management platform allows managers to access the information from different offices and mobile applications anywhere. This makes life a lot easier for the operations team as they need to check the situation in all stores. Fiercely competitive environment It also means that everything can be viewed simultaneously, so they can identify trends throughout the network of stores. Byron Zeng, Vice President of Miniso Poland, says: “The high accuracy of conversion rate the solutions provides really solves a number of our management issues. We can now easily see what’s going on in the other stores, including heat mapping, which makes management of the whole networks so much more efficient.” This is a great example of how AI surveillance products can change the landscape of business decision-making. In a fiercely competitive environment, like a shopping mall or high street, shopping trend data can help a retailer to survive. In fact, this worked so well for Miniso, they decided to use the solution in their stores across the whole of Europe – potentially about 200 stores in the next year.
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle checks and fleet management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognise the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone worker protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Following the recent successful installation of 360 Vision Technology’s new Invictus ruggedised PTZ camera by a north London borough, the same borough has now rolled-out over 100 Invictus cameras across seven Greater London towns. With an early success in prosecuting serious crime following the deployment of Invictus, its highly effective night-time HD quality colour video footage proved to be just one of the useful attributes of the UK manufactured camera, when a recent significant impact by a vehicle to a camera column tested its suitability for roadside deployment. The Invictus camera took the high-speed impact in its stride and showcased its ‘Attack Detect’ feature, automatically resetting to the last viewing position prior to being forcibly moved from its previous viewing direction, and with no damage to the camera or its direct drive PTZ mechanism. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer" Importance of ruggedised cameras Commenting on the broader roll-out of Invictus cameras, DSSL Group’s Works Director, Aaron Stephens, who specified the 360 Vision Technology cameras confirmed: “The importance of selecting a product that is ‘fit for purpose’ when being deployed roadside in a town centre is often overlooked by some companies, who deploy non-ruggedised cameras purely on the basis of cost. If a PTZ camera were to fall from height following an impact, which is a real risk, there would be a substantial public health and safety incident. “At DSSL, we take a holistic view to consider the surveillance needs at each individual location, to ensure that all aspects of camera deployment are taken in to consideration. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer.” The expanded installation takes the total number of Invictus cameras to over 100; and allied to wireless links forming a major part of the system’s infrastructure, comment has been made regarding the superb quality of the Invictus camera video over wireless infrastructure. Simplified surveillance operation Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras"In a market often dominated by imported Far East products, the integration of Genetec Security Center and high-performance Invictus PTZ cameras has proven the effectiveness of two Commonwealth technology providers. Commenting on the camera/control technology collaboration, Genetec Country Manager, Paul Dodds said: “Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras. Genetec Security Center unified platform and Omnicast video surveillance has been used to seamlessly blend full Invictus camera menu control, within a single intuitive interface. 360 Vision cameras are a Genetec certified product on our supported device list. This successful deep integration has simplified the London borough’s surveillance operation and effective management. We value all of our technology partnerships, and especially with manufacturers such as 360 Vision Technology, who offer reliability with their Invictus PTZ cameras, as illustrated here across seven north London towns.” Reducing carbon footprint With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption"Adrian Kirk, Strategic Account Director at 360 Vision commented on the green credentials of Invictus, which was a factor in the overall decision by DSSL to specify the camera: “With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption. “On larger projects like this, the savings on energy and reduction in associated pollution offers significant advantages over Far East camera alternatives, helping Local Authority end-user system operators to meet their carbon footprint reduction goals. “With a host of performance and user centric operational benefits, Invictus is well placed to feature extensively in future Local Authority upgrades, as customers look at total cost of ownership and the need to ensure CCTV equipment deployed road side is fit for purpose.”
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking objects in real time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyse and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced awareness picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Maxxess eFusion technology is being used to provide seamless integration and easy management of security, safety and site management systems at Bluewaters Island, Dubai. Maxxess eFusion technology The region’s newest tourism hotspot, Bluewaters opened in November 2018 and is expected to attract more than 3 million visitors every year. The US$ 1.6bn project was completed by Meraas Holdings over five years and comprises four luxury residential complexes, a landmark Caesars Palace hotel, a shopping mall and the world’s largest observation wheel, Ain Dubai, as its centrepiece. Security and safety integration Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system, with particular emphasis on a solution that would be efficient to use, inexpensive to maintain and robust going forwards Following a sector comparison, Maxxess eFusion technology was identified as providing the best fit. Security management platform The eFusion security management platform was chosen instead of a more costly or complex conventional PSIM solution, because it uses versatile, open-technology software. Omnix International, one of the leading integrators brought in for the project, says eFusion proved particularly straightforward to work with, offering the advantages of a modular, building block approach and allowing maximum freedom to integrate, customise and adapt to future needs. “Thanks to its compatibility with leading surveillance, intruder, access and fire detection systems, eFusion proved to be a highly efficient integration technology for the Bluewater project,” says Mr. Henry Azoury, Senior Security Design and Engineering Manager at Omnix International. ASSA ABLOY Hospitality system The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system. It allows a unified system approach, with a single enrolment protocol for both front- and back-of-house access. The solution enables centralised management of room safes, mini-bars and cupboards, and for control of all alarm transactions. eFusion integration with the Zenitel Stantaphone IP Intercom System ensures that video and transaction data is called-up automatically in the Bluewaters control room as soon as any user press a call button. For maximum efficiency, the system allows the operator to unlock doors and communicate with the user remotely, with full activity logs kept for audit. With easy integration to the SeeTec Video Management System, eFusion also allows seamless control of all cameras. In addition, cameras are linked to the door access system, with video pop-up triggered by pre-defined events. The solution also gives the operators complete PTZ control, playback and video functionality. ID badging integration ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. The eFusion platform is based on technology that delivers robust, reliable performance" “For maximum efficiency there is no need to switch between different management systems and the eFusion platform is easy to work with, allowing full benefit from integration with individual systems,” says Lee Copland, Managing Director EMEA, Maxxess. eFusion at Intersec 2019 “The eFusion platform is based on technology that delivers robust, reliable performance, as well as being fully scalable as needs change the future. We look forward to our continued work with Omnix International, which is providing the world-class specialist engineering services combined with local, customised support that customers value.” To see Maxxess solutions in action come to Intersec 2019 on stand SA-H12.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What role can social media play in security?