Video Surveillance as a Service (VSaaS) innovator AVA Security found that more than four out of every five (82%) of IT, Operations, Facilities Management and Security systems decision makers employed by medium and large-sized businesses, see a potential role for their workplaces’ video monitoring systems in supporting corporate plans for 'a safe return to the workplace post-lockdown’. Video monitoring systems This was perhaps the most significant finding of the security industry&rs...
Global technology provider Arrow Electronics has signed a pan-European distribution agreement with global cybersecurity company Secureworks® to offer a comprehensive portfolio of software and services that deliver scalable, complementary security solutions to the European channel. Meeting cybersecurity needs It is imperative that digital transformation is protected from evolving threats The collaboration between Arrow and Secureworks intends to deliver the ability of businesses to di...
The CrossChex Cloud is based on the AWS cloud server, providing easy solutions for the small and medium business sectors and helps store the data more safely. The security processes and controls are authenticated to meet SOC 2 Type II security standards. This includes using two-fact or verify, encrypting computers, logging administrators' actions, tracking access grants using verified policies, and following repeatable processes for a consistent and secure customer experience. Recognition Abil...
The CCTV User Group welcomes the appointment of Fraser Sampson as the new independent Biometrics and Surveillance Camera Commissioner (BSCC). The appointment was announced on March 9, 2021, by the UK Home Secretary. The new BSCC combines two roles that were previously separate offices: the Surveillance Camera Commissioner and the Biometrics Commissioner. Previously held by two part-time appointees, the new role is a full-time position. Promote compliance with the Surveillance Camera Code The...
Antaira Technologies is a globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNX-1600 series. Antaira Technologies’ LNX-1600 series is a series of industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applications in harsh and outdo...
Arteco 9000 is the new surveillance server designed to offer the company’s customers a powerful and affordable solution for a variety of application demands. Ideal for those who need to manage IP video surveillance in medium-to-large installations, Arteco 9000 can handle IP video sources from all major international manufacturers and is compatible with ONVIF and RTSP devices. Each Arteco 9000 comes pre-loaded and tested with the users selection of Camera licences (sold separately). Choose...
The Security Industry Association (SIA) has announced the 2020 winners of the SIA New Product Showcase Awards, the flagship awards program in partnership with ISC West recognising innovative security products, services and solutions. Top among the winners – who were recognised on July 9 during a virtual awards show – was Leica Geosystems, part of Hexagon, receiving the 2020 Best New Product Award. Since its inception in 1979, the SIA New Product Showcase has been the security industry’s premier product awards program. New products are reviewed by a panel of judges with extensive industry experience, and in 2020, following significant deliberations, the 30 judges presented awards for technologies covering 23 product and service categories. Leica Geosystems, part of Hexagon, received the Best New Product honour for its 3D Surveillance with Leica BLK247, submitted in the Emerging Technologies category. Building security The 3D Surveillance with Leica BLK247 is “a first-of-its-kind reality capture sensor for building security and operations,” said Leica Geosystems. “It is the latest product in the company’s BLK product line, a collection of reality capture, scanning and photogrammetry hardware and software. The BLK247 offers continuous, 24/7 LiDAR-based 3D monitoring and change detection within spaces. It does this using LiDAR, 3D digital fencing and continuous scanning to monitor buildings and spaces 24 hours a day, 7 days a week.” The prestigious Judges’ Choice Award was presented to Suprema Inc. for the Airfob Patch product, submitted in the Access Control Devices & Peripherals Hardware – Wireless category. “Airfob Patch is the world’s first mobile-to-RF-card signal translator, enabling mobile phones to communicate with the existing RF card readers,” said Suprema Inc. “Wire, batteries nor construction is required for installation. Airfob Patch charges itself by using the existing RF field signals transmitted from the RF reader. It transforms the RF fields into its own power source.” New Product Showcase Merit Award SIA is proud to present John Spooner with the 2020 SIA New Product Showcase Merit Award" Additionally, John Spooner – executive vice president at Alarm Detection Systems and an active volunteer judge in the SIA New Product Showcase program. Spooner received the New Product Showcase Merit Award, which recognises an individual or company who, through their support of the New Product Showcase, demonstrates a commitment to the vision and mission of the program, contributes to its success and promotes the advancement of SIA and the security industry overall. “SIA is proud to present John Spooner with the 2020 SIA New Product Showcase Merit Award; John has not missed a single SIA New Product Showcase event since he began as an active volunteer judge in the program 17 years ago,” said Chris Grniet, chair of the SIA New Product Showcase Committee. “He has always been a fair and honest participant and has never hesitated to jump in and help whenever we need him. He has been exemplary in his commitment, participation and ability to help the group reach consensus.” Services and contributions “Following hours of panel-driven judging and technology demonstrations, SIA is thrilled to recognize the 2020 winners of the SIA New Product Showcase Awards for their innovative products, services and contributions representing the best new offerings in the market,” said SIA CEO Don Erickson. “SIA applauds all the honourees who received awards in 2020 and particularly Leica Geosystems and Suprema Inc. for standing out in this highly competitive field of entrants to earn the Best New Product and Judges’ Choice distinctions. Additionally, we congratulate John Spooner on receiving the 2020 New Product Showcase Merit Award in recognition of his many valuable contributions to this premier program.” Award winners The 2020 SIA New Product Showcase winners are: Best New Product Award Winner – Leica Geosystems, Part of Hexagon: 3D Surveillance with Leica BLK247 Judges’ Choice Award Winner – Suprema Inc.: Airfob Patch New Product Showcase Merit Award Winner – John Spooner, executive vice president, Alarm Detection Systems Category Awards Access Control Devices & Peripherals Hardware – Wireless Winner – dormakaba: BEST Switch™ Tech Access Control Software, Hardware, Devices & Peripherals – Wired Winner – Swiftlane: Swiftlane Access Control Honourable Mention – Altronix Corporation: Tango Anti-Terrorism/Force Protection and Biometrics Winner – Gibraltar Perimeter Security: G-1441 Ultra-Shallow Bollard Winner – IDEMIA: VisionPass Commercial Monitoring Solutions Winner – IronYun Inc.: AI NVR Edge Analytics Communications and Networking Solutions Winner – Axis Communications, Inc.: AXIS C8210 Network Audio Amplifier Convergence and Integration Solutions Winner – Blue Light: Blue Fusion Design, Diagnostic and Installation Tools Winner – Alarm.com: On-Site Wrap Up Emergency Communication Systems Winner – Verint: NowForce Emerging Technologies Winner – BioConnect: BioConnect’s Unified Mobile Access Solution Winner – IPVideo Corporation: HALO IOT Smart Sensor 2.0 Fire/Life Safety Winner – Kidde: Kidde Optica Smoke Detectors Hosted Solutions/Managed Services Winner – SiteOwl: SiteOwl Intrusion Detection and Prevention Solutions (Physical) – Wireless Winner – Alula: Slimline Touchpad Honourable Mention – Cartell: CW-SYS Wireless Driveway System Lock and Key Solutions Winner –Medeco: All Weather Padlock Honourable Mention – Abloy Oy: ABLOY® BEAT Mobile Solutions (Connected) Winner – CloudScann: Visual Intelligence Control Centre (VICC) With VisualC3 Mobile Honourable Mention: Rapid Response Monitoring: rapidSMS Smart Home Solutions Winner – Alarm.com/Building36: Smart Water Valve+Meter Threat/Risk Management Software Applications Winner – Splan Inc.: SIVI™ – Splan Intelligent Visitor Insights Video Surveillance Advanced Imaging Technologies Winner – Axis Communications, Inc.: AXIS Live Privacy Shield Video Surveillance Cameras (HD/Megapixel) Winner – Bosch Security and Safety Systems: MIC IP Ultra 7100i Honourable Mention – Hanwha Techwin: PNM-9085RQZ Video Surveillance Data Storage Winner – Dragonfruit AI: Dragonfruit LiveArchive Video Surveillance Hardware and Accessories Winner – EIZO Inc.: FDF2711W-IP Video Surveillance Management Systems Winner – Airship Industries, Inc.: Airship EMS v5.4.5 During the 2020 SIA New Product Showcase virtual awards ceremony, in addition to the presentation of the overall and category-specific awards, attendees enjoyed hearing insights from New Product Showcase judges into innovations driving product advancements in the security industry.
Following on from a very successful 2019, Cathexis EU has appointed a new Business Development Manager in South East Europe, Katerina Ryan. Katerina has over 10 years of experience in driving sales and maintaining accounts in video surveillance and IT industry and has substantial has experience with bringing new brands to the European market, developing the existing ones and managing strategic alliances. She has developed markets and worked on large infrastructure projects with such brands as Pivot3, Grundig, Veracity, TKH Group and also has hands-on experience on the integrator side. Client’s desired outcomes Katerina said “I see Cathexis as a great opportunity, they have a fantastic solution matched with a great team, offering a very personal and flexible service. I am excited and ready to get out there and spread the word on what I see as the best kept secret in the industry.” Cathexis EU MD, Mark Ross, said “Cathexis prides itself in supporting our clients with quality, well thought out solutions. We expect all our sales executives to be competent in answering the most complex of questions with regards the client’s desired outcomes. Katerina, with a solid technical background and wealth of industry experience, will fit very nicely into our team. We welcome her to the Cathexis family and wish her a long and successful stay.”
Vicon Industries, Inc., a designer and producer of security surveillance solutions, and Software House, part of Tyco Security Products, announced that they have entered an integration partnership that will enable Vicon’s VMS Valerus to integrate with Software House’s C•Cure 9000 Access Control system. Vicon has released a software package that provides advanced, seamless integration of Valerus with C•Cure 9000, allowing the user to correlate video with access control event information in one powerful interface. The combination allows full interaction with live video and recording, turning the physical security interface into a full-featured video security solution. The integration is based on both a working Valerus and C•Cure system on the network. Pivotal IP technologies This integration supports any Valerus device (NVR, encoder, IP camera) and 3rd party camera listed as supported by Valerus and runs as a service on the C•Cure system server. This is a first release of the integration package with the following minimum versions: Valerus VMS Version 18R2 or higher and Software House C•Cure 9000 version 2.70. Bret McGowan, SVP of Sales & Marketing, stated “Vicon is dedicated to providing this type of integration that addresses end-user security needs, and displays our commitment to provide our customers with pivotal IP technologies that will move their business forward.”
Echodyne, the manufacturer of innovative, high-performance radars for government and commercial markets, announces the immediate availability of the EchoGuard Rapid Deployment Kit for surveilling borders, securing critical infrastructure perimeters and temporary events, and enhancing situational awareness. Echodyne’s innovative MESA™ technology and powerful software deliver the leading performance of electronically scanning array (ESA) radar in a compact, lightweight, solid-state format for the very first time. Portable surveillance kit The Rapid Deployment Kit is built for field agents, law-enforcement, and security personnel charged with temporarily or intermittently securing ground and airspace perimeters. With essential components weighing under 20 lbs., the kit is extremely portable and enables surveillance in the most remote or hard to access locations. Securing events and borders “Echodyne is excited to announce the Rapid Deployment Kit, specifically designed for securing temporary and special events and critical infrastructure, remote surveillance, and border security” said Eben Frankenberg, CEO of Echodyne. “Being able to rapidly deploy a high-performance radar sensor is a field force multiplier, significantly enhancing agent safety, and dramatically improving situational awareness. This is another example of how our MESA technology can provide exceptional performance in a low cost, size, weight, and power package.” Features of the EchoGuard kit: Industry leading 3D radar performance in a super lightweight kit Intuitive radar UI software Ruggedised high-performance computer Wired and optional wireless connectivity Choice of tripod size Essential components weigh less than 20 lbs
VIVOTEK, a global IP surveillance provider, announced 46 network cameras are natively integrated with Amazon Kinesis Video Streams and Amazon Web Services (AWS) Internet of Things (IoT) will support the AWS IoT Camera Connector Quick Start. The combined implementation of Amazon Kinesis Video Streams and AWS IoT enables VIVOTEK camera users to leverage the new AWS IoT Camera Connector Quick Start, a new solution that automates the discovery, provisioning, and connection of VIVOTEK cameras and their streaming video content to the user’s Amazon Web Services account. Using the new solution, VIVOTEK users are able to quickly and securely connect their cameras to AWS where they can store, index, playback and analyse streaming video content using a variety of machine learning services. Maximising video application With the integration of VIVOTEK network cameras and Amazon Kinesis Video Streams, users can maximise video application in open platformIn response to the possibilities offered by the rising trend of IoT, VIVOTEK aspires to become the Eye in IOT by drawing on its expansive technological capabilities in image and audio. Nowadays, apart from closed system, market demands of accessing video and audio streams in IP surveillance have grown rapidly in open platform. With the integration of VIVOTEK network cameras and Amazon Kinesis Video Streams, users can maximise video application in open platform. In addition to the first 46 network cameras available now, more VIVOTEK cameras will be ready next year. Customers in all industry verticals can leverage the joint capabilities to simplify their video-based infrastructure utilising the scale of the AWS cloud, while gaining access to innovative new machine-learning services for video analytics. Offering hardware solutions to more users “Providing Amazon Kinesis Video Streams and AWS IoT readiness on our platform, supporting the new AWS IoT Camera Connector Quick Start, and participating in the Device Qualification Program provides us with a positive, disruptive opportunity to bring our hardware solutions to a broader range of users. “The catalogue adds weight to the various offerings, by expanding exposure to choices that again, can be tailored to customers’ needs or even present options they weren’t aware existed, ultimately levelling the playing field for all types of vendors. Now we are accelerating more VIVOTEK cameras to integrate with Amazon Kinesis Video Streams by the first half of 2019,” said David Liu, President, VIVOTEK USA, Inc.
Airbus has invited journalists to a tour on its stand at Berlin Messe, stands A 70, B 90 and C100, hall 22a, 15 May 2018, 12 o’clock noon May 2018. Under the slogan ‘Intelligence Shared’, Airbus will be showcasing next-generation communication solutions for professional mobile networks at the Critical Communications World (CCW) 2018 in Berlin from 15 to 17 May. As a provider of secure intelligence platforms, Airbus will demonstrate how the application ‘Tactilon Agnet’ will integrate videos from a drone. Tactilon Agnet is an app that lets smartphone users contact professional talk groups at the touch of a button. With Tactilon Agnet, smartphone and tablet users become part of the professional world – voice, data, video and location services are all on hand and all with the reliability and security that professional users expect. Airbus will also introduce new apps for the Tactilon Dabat, an Android smartphone and Tetra radio in one device Secure communications infrastructure Airbus will also simulate a scenario: a firefighter will wear a 360-degree camera in a metro station. From a command centre, an officer with goggles will virtually step into the situation. Thanks to this solution, firefighters and police officers will be able to effortlessly carry out complex tasks from remote places through a secure communications infrastructure. Furthermore, Airbus will also introduce new apps for the Tactilon Dabat, an Android smartphone and Tetra radio in one device. Partnership with application developers Nine app developers and Airbus partners will present their solutions on the Airbus booth. The companies are: Exomi, Intelligence on Wheels, Findwhere, ASC, Steerpath, Stashcat, Eyesolution, Magister and Secunet. Journalists are invited to a press tour on the Airbus booth on 15 May 2018, from 12 o’clock noon to 1.30 p.m. Afterwards we will serve a lunch snack. On that ocassion, Airbus will present the above-mentioned developments. Participants can try out new apps with the Tactilon Dabat, (the first Android smartphone and Tetra radio in one device) and speak to new app developer partners – stand C100, hall 22a, Berlin Messe. Address: Messedamm 22, 14055 Berlin.
While US market is being sensitive about cybersecurity through their popular camera products, European countries and the UK are preparing for the new privacy regulation to apply in two months’ time. But how would these challenges affect the global security market? What are the main problems in it for the manufacturers? What should investors in security industry look at right now? We’ve all recently heard about acquisitions of market-leading companies by technological ‘monsters’ which have little experience in video security industry. Most of the market players would have thought: why don’t they give up when their businesses have just become ‘money-making machines’? One obvious potential may be that they were not prepared for the changes that are only a few months away. They have ‘milked their cow’ for as long as they could, and now it’s time to slaughter the cow and sell the meat. For instance, very few market players prepared for the upcoming General Data Protection Regulation (GDPR), that are being applied to their key markets. Manual GDPR functions will be still cheap, but you won’t be able to control massive amounts of data with them - though automated GDPR features may become very costly Improved quality for CCTV owners Development that could fix the ‘GDPR issue’ for a manufacturer may take 2-3 years and will require millions invested. As an alternative, they would have OEMed (Original Equipment Manufacturer) the required technology from competitive manufacturers. They probably made the decision to escape a few years back or just admitted the changes too late, and thus had to leave. Meanwhile, GDPR looks like a logical step towards better human rights and privacy guarantees in Europe. Presumably, everybody wants to have a right to be forgotten or at least hidden in someone else’s footage. We never know how CCTV owners may use this information and how it would affect us. No paranoia, it just doesn’t feel very comfortable if you are watched and stored, not knowing when and where. Life quality would improve much if people could have at least some control over it. Logically, considering this, GDPR is a clever and well-thought-out improvement. However, don’t forget that government will still have access to full storage. Encrypted personal data Having all personal data encrypted may let us get rid of some undesirable advertising and spam. The remarkable fact is that GDPR doesn’t mention any encryption standard to be used. This looks strange in view of the reliability of the applied regulation, though potentially leaves a ‘backdoor’ for local EU governments, so they may decide which encryption algorithm works best for them. Hopefully, they won’t ask for too many different ones, as it could be difficult to implement in every system that requires it. Development that could fix the ‘GDPR issue’ for a manufacturer may take 2-3 years and will require millions invested How about low-cost products, you may ask? Will the prices grow as GDPR starts? Most probably manual GDPR functions will be still cheap or free, but you won’t be able to control massive amounts of data with them - though automated GDPR features may become very costly as they require complex video analysis and even deep learning. It means that only those products which have effective analytics and neural engines will be desirable for the customers. Hence, smaller manufacturers would have a chance to OEM some of these technologies to stay in the EU market. However, all of this will increase the prices in May’18. None of the manufacturers would give away analytic features. Prepare to pay for them if you have more than a hundred cameras. The more cameras you have the more features you need pay for, so overall security system cost may grow in geometrical progression. Restricted footage access policies But does privacy conflict with security? What if someone asks to be forgotten and then commits a crime? Here, another challenge comes in. Footage has to be available for police access only. So, you can just remove the part of your video archive in which privacy is requested by a citizen. You need to hide it from VMS/NVR users, but must be able to show in case the police ask for it. Let’s imagine that instantly all manufacturers have managed to sort out the GDPR problem. Though doesn’t it look ridiculous to be able to hide faces in footage in Europe while US experts report, and others confirm massive backdoor issues with market-leading camera brands? Or is it just another infowar against successful market players? Unfortunately, yes, the backdoors exist and can be self-proven by following instructions that are publicly available online. The problem is not being spied on; the problem is low cost. Safe products cost more. The choice is ours Classification of security products Conspiracy supporters claim that ‘The Product for them is our personal data!’ and ‘it’s all done only to collect data for their machine learning and learning our behavior’. Let’s be logical, would we expect low-cost products to be secure enough? Obviously, the problem is not being spied on; the problem is low cost. Safe products cost more. The choice is ours. There must be some international – presumably approved by UN – certification for security products in critical and public infrastructure. Otherwise, each country should certify security products in order to avoid privacy or safety issues for their citizens. At the same time, all end users of critical and public security systems should be trained on how to use security products. Classification of security products for ‘hackability’ would be also great to have so we would know what we are paying and how much.
Utility security staff have a responsibility to ensure they can identify risks associated with security threats Protecting North America’s power grid is a thankless job. Day in and day out, the good citizens of the United States and Canada wake up with the assumption that when they get out of bed each morning and flip on the lights, the room will illuminate, the coffee pot will come to life and their mobile phone will have been fully charged. After all, we live in a modern First World society, where we have come to depend on timely and efficient power at our fingertips. In reality, that reliable electricity that we all enjoy has many people working around the clock to ensure its reliability, resiliency and security. Today’s grid operators are inundated with natural and man-made threats. As utilities tackle the monster of the moment, which is the evolving cybersecurity threat, we must not take our eyes off the more primitive threat. Security threats to US grid Electricity is perhaps the most vital of the critical infrastructures and key resources that support our society. The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long?term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Currently, the most significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists During emergencies, NERC supports industry actions to respond, mitigate and restore the BPS to normal operation by facilitating effective information sharing and communication with and between NERC registered entities, government agencies and the media. This information is not focused on operational decision making; but instead provides utilities data, best practices and mitigation strategies to help recover from crisis. Obviously as a regulatory body, NERC must stay out of emergency response until the utility has best mitigated the threat or reliability issue. Currently, the most significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks specifically targeting the grid are rare, but an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target”, could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. An attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target”, could inflict significant damage Critical infrastructure protection Critical infrastructure protection is a cyclical process incorporating prevention, detection, mitigation, response and recovery. The key to this protection is the identification of credible threats, which will assist energy companies in assessing risks and potential vulnerabilities (weaknesses) of their facilities. Once a threat has been thoroughly analysed, it is then possible to institute preventative measures to deter, detect and delay an attack. Of course, critical infrastructure protection planning must always include mitigation, response and recovery actions in the event an attacker is successful. While the security of the grid is a shared responsibility between the government and the private sector, the primary responsibility rests with utility owners and operators. Utility security staff have a responsibility to ensure they are able to receive and act upon criminal intelligence and be prepared to identify risks and vulnerabilities associated with security threats. Any protection programme that is developed must be as efficient and cost-effective as possible, as budgets are limited and ratepayers are sensitive to wasteful spending. Effective security programmes rely on risk management principles and associated tools to establish priorities, allocate budget dollars and harden infrastructure sites. Physical security protection encompasses defensive mechanisms to prevent, deter and detect physical threats of various kinds. Specifically, these measures are undertaken to protect personnel, equipment and property against anticipated threats. Properly conceived and implemented security policies, programmes and technologies are essential to ensure a facility’s resistance to threats while meeting demand, reliability and performance objectives. Unfortunately, many do not realise the amount of reports, guidelines, standards and assessments that have been developed for use Electricity industry physical security standards Significant progress has been made in the electricity industry surrounding the issue of security. Unfortunately, many do not realise the amount of reports, guidelines, standards and assessments that have been developed for use. The industry has gone through multiple iterations of mandatory Critical Infrastructure Protection (CIP) Standards that focus on security protections. The CIP Standards, while not perfect, may be an example for other sectors to immolate. These standards are a minimum baseline for compliance and utilities should not assume that because they have a good compliance programme they are somehow immune from attack. In addition, many electric utilities undergo a sector-wide Grid Security Exercise (GridEx) every two years to hone their skills and provide updates to their security practices and policies. This is in addition to annual exercises mandated by the cyber standards. It is fair to say that the industry has been very responsive to the evolving security threat and the mandatory requirements found within CIP compliance. As a result of the 2013 California substation attack that destroyed $15 million dollars in infrastructure, industry now has a physical security standard. This standard was created to protect the most critical transmission substations and control centres in North America. While protections vary, many utilities have upgraded their security measures to include concrete or non-scalable perimeters, robust access control, cameras, lighting and armed guards. It is highly likely that we will one day see similar standards put in place to better protect non-nuclear generation facilities, but only time will tell. Many utilities have upgraded security measures to include concrete perimeters, robust access control, cameras, lighting and armed guards The piece that the industry continues to struggle with is information sharing and the ability to quickly obtain actionable threat intelligence; an issue which has been combatted head-on through the sharing of security information amongst utility partners. Large utilities with the manpower and resources to address this initiative are changing the security model from reactive to proactive. If you understand your adversary’s tactics, intent, and capabilities, you can develop strategies to combat their attacks and better plan for future threats. Better, more proactive security, can be achieved through information sharing agreements and partnerships with other utilities, regulatory agencies and intelligence partners. Many utilities do not have the dedicated resources to dissect and aggregate this data and are thus unable to react appropriately, or wind up drawing inaccurate conclusions. As a result, the electricity sector is demanding more access to actionable intelligence and threat streams. With this added intelligence, utilities can better pinpoint threats to specific systems and focus efforts on system recovery and restoration. This will undoubtedly drive better, more informed responses to security incidents. The FBI, DHS and the DOE have made considerable strides in improving information sharing, and giving classified access to intelligence products Improving information sharing Over the past few years, the FBI, DHS and the DOE have made considerable strides in improving information sharing and giving classified access to intelligence products such as bulletins, alerts and secret level briefings. These products have been used to mitigate threats, reduce risk and update internal security policies. Additionally, this data flow has enhanced communications between security teams, management and board members by providing authoritative threat warnings. This ultimately drives better investment strategies by more directly connecting security priorities with business risk management priorities. Unfortunately, utilities still see risks in sharing information with federal partners. Recently, the Washington Post released an article with a salacious headline falsely suggesting that the grid was hacked via Russian malware. Even after correcting the story, the question remains: who leaked the information to the Washington Post? Utilities all over the country were witnessing an information sharing failure. We must assume that at some point in the future a North American utility will suffer from a planned and coordinated attack against electrical infrastructure. Have we looked at credible threats closely enough and did we prepare our people to respond, recover and communicate? As an industry, we will be judged and hard questions will be asked about how seriously we considered the threats and what we did to mitigate future attacks. Success will be determined by how quickly we are able to respond and the swiftness of system recovery. There is no doubt that security is an “all hands” approach by everyone involved.
The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas The greatest trend in history will continue to change the world, and the physical security market. It’s called Moore’s Law. In accordance with Moore’s Law, our electronics have consistently doubled in speed, halved in size, or halved in price every two years for decades already. This trend means that our electronics, communications networks, data networks, and digital world evolve at a faster pace than anything else in the world, making a huge impact on the security market as well as hundreds of others. To put the power of the law into perspective, just imagine if Moore’s Law applied to our world beyond electronics and networks. Imagine the year 2025 – just 10 years from today. Imagine flying to China in less than 30 minutes. Imagine driving all the way across Texas on a single gallon of gasoline. Imagine paying just $3 for nearly $100 worth of groceries. What a wonderful world that would be! Future technology But to achieve these outcomes, flight speeds would need to double every two years, fuel efficiency would need to double every two years, and food prices would need to be cut in half every two years. These are aggressive trends to pursue. Ten more years at those rates, and in 2035 you would be flying to China in less than 60 seconds, driving around the entire planet on a single gallon of gasoline, and paying just about 10 cents for the groceries that cost you $100 today. But now let’s snap back to reality, because those trends are ridiculous. Nothing can improve that quickly (except our electronics and computer networks). Security devices have shifted from analogue to digital, and are therefore poised to accelerate in their evolution as well. Do we truly realise where this trend can take us and how fast it can take us there? Are we ready to embrace these changes? Does upper management see them coming? I’m reminded of a scene from the classic comedy The Blues Brothers in which Jake and Elwood (a.k.a. the Blues Brothers) return to Elwood’s apartment. A loud train rolls past the window. Security devices have shifted from analogue to digital, and are therefore poised to accelerate in their evolution as well Jake: How often does the train go by? Elwood: So often that you won't even notice it. Trains continue to noisily whiz past Elwood’s tiny apartment. The sound of the trains is overbearing at first. However, about one minute later and we – the viewers – have grown accustomed to the sound. Jake apparently does as well, because he falls asleep even as the trains continue to roar past. Perhaps Elwood is onto something… Personal experience Can the greatest trend in history go under-appreciated simply because it is so consistent? Back in the mid 1990’s, my parents bought a big beige family computer. That beige box was an exciting part of my childhood, and was a large part of why I went on to study electrical engineering. The computer had a whopping 8 GB of storage and cost thousands of dollars. It is now 20 years later, and I’m walking around with a much more powerful computer in my pocket. My smartphone cost me a small fraction of what my parents paid for that big beige box, it has much better software, it has a much faster internet connection, and I can take it anywhere with ease. Truly miraculous if you think about it, and even more miraculous if you think about where we might be in another 20 years. While I don’t expect to be flying to China in less than 60 seconds by 2035, I absolutely do expect our computers to be over 1000 times as powerful, 1000 times as small, 1/1000th the cost, or some combination thereof. Some bold predictions Now that you are hopefully in the proper mindset, here are three bold predictions for the future of surveillance: Ultra high definition: Despite all of the wonderful surveillance technology we have today, surveillance systems are very limited when viewing wide open areas at a long range. Their resolution and analytics don’t come close to the capabilities of the human eye and the human mind, respectively. This will change as digital camera resolutions skyrocket alongside computing power. The future will produce cost-effective solutions that can provide meaningful coverage of wide expansive areas at resolutions hundreds of times greater than modern cameras. Our borders, waterways, parks, streets, and so many other areas will become visible 24x7x365. Sensors everywhere: 8 GB of storage used to fill up a big beige desktop box. Now we can get 128 GB in something the size of a fingernail. Sensors are getting smaller too. Police officers are being outfitted with body cameras, most people carry one with them in their smartphone, and most storefronts have cameras. GoPro is creating a culture of documenting our most interesting moments, or just documenting everything. Meanwhile, electronic sensors are being placed all over our cars, houses, industrial facilities, motors, pumps, ships, and seemingly anywhere and everywhere else. Size reductions may someday enable micro-electromechanical systems (MEMS) to power devices purely from vibrations and temperature gradients. Smaller and more affordable sensors may mean faster refresh cycles in security deployments. The screen: Perhaps you’ve noticed the children at restaurants fixated on their smartphones and tablets. Teenagers often sit in groups at their tables in silence, eyes aimed at their devices. I’ve even gathered with my friends to watch a sports game, only to look up at some point and realise that everyone is staring at their phone screen. Adults walk the streets and hallways buried in their devices. We are so often connected to our screen, checking the latest updates, reading an article, or communicating with someone far away. We work at our computer monitors during the day and then go home to watch TV or read on our tablets, or both. At some point we will collectively spend more time looking at “the screen” that we do looking at the real world around us. What does this mean for security? Simply that the integrated software interface is the centerpiece of a security system’s success. The integrator must work hard behind the scenes to bring a streamlined and unified software interface to their client, because any other solution will obsolete. Smart phones, smart watches, smart cars, smart buildings, smart drones, smart everything – all becoming internetworked These are just predictions. I do not have a crystal ball, and something even more disruptive may very well come along and derail all of them; but right now these seem to be inevitable trends that will occur over the next 10 to 20 years. Reshaping the world Moore’s Law has reshaped the world, and it will continue to reshape the world. Smart phones, smart watches, smart cars, smart buildings, smart drones, smart everything – all becoming internetworked. Digital currency is taking hold, artificial intelligence is taking off, and data usage rates are skyrocketing. All of this combined has tremendous implications from both a physical security and a cybersecurity standpoint. There will be new creative tools to safeguard the world, and new creative tools to disrupt the world. As security professionals, it is our job to ensure that the client’s business can be conducted safely, reliably, and conveniently. Technology will continue to accelerate into the future, and this will likely bring about radical socioeconomic changes. There will always be challenges, but we are fortunate to live in these modern times. I encourage us all to take some time to look forward and wonder what is coming up on the horizon. Some will see amazing opportunities. Some may shrug this whole article off and ask, “How often does meaningful innovation really happen?” My response to those people: So often that you won’t even notice it. Or will you?
We don’t usually report on financial news here, but a recent financial move by up-and-coming industry leader Hikvision warrants attention. Specifically, Hikvision in Hangzhou, China, has secured a $3.1 billion line of credit from the government-owned China Development Bank. Companies use a variety of financing tools to provide the currency they need to fuel growth, so in that regard, Hikvision’s move is to be expected. Given their ambitious growth timeline, both in China and throughout the world, it’s no surprise that they would be creating mechanisms to finance that growth. The surprise here is the size of the move. To put $3.1 billion into perspective, consider that Canon paid $2.8 billion when they bought Axis, and that transaction generated tons of interest in the industry and, arguably, shook up the whole market. Obviously, with $3.1 billion of credit at their disposal, Hikvision is well equipped to shake up the industry, too. For fast-growing Hikvision, $3.1 billion is an amount greater than its reported sales revenue of $2.78 billion in 2014. “The company is focused on global growth,” says Alex Asnovich, Head of Marketing at Hikvision USA. “Talking about North America, we are opening our new Hikvision USA headquarters in the Los Angeles area in the summer of 2016. We have our new logistics facilities in Miami to support North and South Americas. We recently opened our Hikvision Canada headquarters office in Montreal and started our own bilingual English and French Canadian tech support center on the East Coast.” Hikvision’s R&D operations R&D is also a big part of the picture. I saw the scale of Hikvision’s R&D operations first-hand on my China visit earlier this year. The company has more than 5,400 engineers, including more than 2,000 software engineers. I also saw the construction site for a new 28-floor facility, adjacent to Hikvision’s other two high-rises in Hangzhou. When the new tower opens in 2018, a large part of it will be devoted to research and development. Hikvision has said its research focuses on such topics as perceptive technology, intelligent analysis, Big Data and cloud storage. “We also plan to build up our R&D resources in North America,” says Asnovich. “Globally, our new European facilities are opening in 2016 in a new building the company owns, and we are also opening new branches and facilities on other continents.” Hikvision is looking to expand into other market segments such as drones Growing a business costs money, and growing a large business this much takes a lot of money. Hikvision reportedly plans to use $1.6 billion of the credit line inside China, and $1.5 billion outside China, including the important U.S. market. Expansion into different markets Hikvision is looking beyond security, too, and the line of credit will help to finance expansion into market segments such as robotics, industrial machine vision, and drones. There was a hint of what’s to come at the China Public Security Expo in October in Shenzhen, where attendees crowded around a demonstration of a Hikvision drone (available now in the Chinese market). Could an acquisition be in Hikvision’s future? “The line of credit we recently received could prepare us in advance of an M&A opportunity, if and when a good prospect arises,” Asnovich comments. Possible Hikvision acquisitions in the United States have long been a topic of cocktail hour rumors and speculation in the security market. “It is certainly a large amount of money for the security environment,” says Asnovich. “However, it’s not atypical for many other industries. This is not the first time for Hikvision to receive a substantial line of credit.” For example, the company recently was also extended lines of credit for 5 billion Chinese Yuan (around $0.77 billion USD) from international financial organisations such as Deutsche Bank, Citibank, HSBC, and others. Needless to say, Hikvision’s future ambitions in the security market, and others, are well financed. If the amount of available funds reflects the scope and nature of that expansion, we might expect some dramatic moves from Hikvision in 2016.
I love Wikipedia, not just because I use it every day, but also because it reflects the value that can be created when a large community works together. When each member of a community contributes a small part, the result is monumental. I saw an estimate somewhere that it would take a million pages to print out Wikipedia. Is there an opportunity to leverage video in the same way; that is, to tie together the capabilities of millions to create a central repository that could be useful? Consider the proliferation we’re seeing of smart phones that – we keep getting reminded – have higher resolution than many of the professional video surveillance cameras our industry provides. Consider that these smart phones can provide better quality video every day because of new features that accommodate low light and other challenges. The Boston bombing investigation highlighted the value of smart phone video when police filtered through video captured by bystanders in search of the bombers. But why should we leave crowdsourcing the capture of video to mere chance? Why can’t we create a system that can provide access to smart phone video of a specified area in an emergency? As the saying goes, there should be an app for that. Smart phone users who voluntarily download the app would be able to provide video instantly to a centralised repository whenever they are prompted to do so (via the app). Because of GPS systems in phones, the system could know who is in a specific area at a given time and could send a “need video coverage” message to any smart phone users in the area. The user would then know to deploy the powerful video camera in his or her pocket (and could even be directed what to view.) Citizens could be encouraged to download the app in the interest of good citizenship and Homeland security. Access to instant video of hundreds of smart phone cameras in an area where an event is under way would be immensely valuable to police and emergency responders Access to instant video of hundreds of smart phone cameras in an area where an event is under way would be immensely valuable to police and emergency responders in assessing the situation and directing limited resources in a timely manner. After an event, video recorded (automatically?) at the central repository would provide a forensic tool. The smart phone users would merely be fulfilling their role as good citizens. Like Neighbourhood Watch to the millionth power. (All participation and capture of video would be voluntary, so privacy wouldn’t generally be a concern.) It’s not that far-fetched an idea, is it? The benefits of apps that encourage citizens to do good deeds have already been demonstrated. For example, the city of Boston has a map-based Web app that allows individuals, businesses and community organizations to “Adopt-a-Hydrant,” in effect to volunteer on an ongoing basis to shovel the snow away from a specific fire hydrant to avoid delaying fire fighters who would need the hydrants in an emergency. It’s the same idea – calling on community volunteers to fulfil a service that would be time- and resource-consuming if handled centrally, but is perfectly manageable if everyone does a part. As good as our professional video systems are getting, and even considering how many are being deployed, a big drawback will always be camera coverage. Having a powerful video camera in the hands of almost every ordinary citizen it too good a resource to ignore, and technology exists to enable that value to be harnessed. In our industry, IP video systems could provide the ability to tie into the centralised source of smart phone video, and could even prompt users to deploy their cameras as needed, in effect expanding the camera count of their systems exponentially. There was a news story out of San Jose last week about the creation of a video surveillance camera registry that would provide voluntary access to the city’s private surveillance cameras as an additional tool in crime prevention. Same idea, but there are many more smart phone cameras than private surveillance cameras. And Wikipedia shows us how the Internet can combine a vast number of individual data points into a useful whole. Could a similar approach work for smart phone video feeds?
You can depend on the National Rifle Association (NRA) to enter the conversation after almost any high-profile violent incident, and such was the case recently after a 22-year-old college student went on a deadly rampage outside the main campus of the University of California, Santa Barbara. Thirteen were injured and six young adults lost their lives, including the perpetrator. After the tragedy, “NRA News Commentator” Dom Raso took issue with what he called “inaccuracy of the media, especially regarding their reports of mass shootings.” Specifically, Raso objects to the media’s use of the word “shooting,” rather than the more general term “murderer.” His contention is that “shooter” focuses excessive attention on how a crime was committed, rather than the crime itself. “All of a sudden, instead of focusing on the real common link between all acts of evil, the evil person who did it, we are subconsciously told to think about the tool they used instead,” he says. “Evil is the problem, the tool is irrelevant and stories designed to make you think anything other than the truth are propaganda.” I thought his argument was a little thin until I realized that the University of California perpetrator used both a gun and a knife in his crime – he stabbed three victims before shooting the others. However, he was almost universally referred to as a “shooter” but not as a “stabber” or “knife-wielding maniac,” or whatever the equivalent knife-related noun would be. It’s not that any of the reports were incorrect, just a matter of emphasis. How many marketers avoid the term “video analytics” because of bad connotations from early failures of the technology? I wouldn’t exactly call it propaganda, but it reminds us of the importance of how we use words in our market as well as in the world at large. Something as simple as using the term “security officer” instead of “security guard” can suggest a higher stature or greater importance of the job being done. Why do retailers use a polite euphemism like “shrinkage” to mean “theft” (in its various forms)? Terms like “surveillance” can absorb negative connotations, suggesting “Big Brother” or the NSA. You see word choice reflecting market trends, too. How many marketers avoid the term “video analytics” because of bad connotations from early failures of the technology? Some apparently think the term “PSIM” carries an implication of being expensive or two specialized. That’s how you come up with companies saying things like, “It does everything a PSIM does, but it isn’t a PSIM.” (PSIM is an acronym for physical security information management.) As an editor, I am aware of the power of words. I take Mr. Raso’s point, although I disagree that the intent is propaganda. Most journalists would choose “shooter” over “murderer” or “perpetrator” simply because it is more specific. Sadly, most of us hear the words so often nowadays we hardly stop to think about them. Maybe we should. Bottom line: Our words can reveal our biases, so we should choose them carefully.
Traditionally, many stores have used an assortment of tags and labels on a diverse range of merchandise, most of which were designed for an entirely different set of products. As a result, many apparel retailers have recognised that in some instances merchandise and textiles are being damaged. Checkpoint Systems, renowned supplier of source-to-shopper solutions, has therefore developed an innovative new anti-theft solution to meet their specific requirements – Mini NeedleLok. Mini NeedleLok anti-theft solution Designed to protect all types of garments, including very thin fabric, the one-piece solution deters thieves while preventing damage that would usually occur on application of pinned security tags. Whilst other products on the market feature a hinged mechanism which can snag and rip textiles, Mini NeedleLok uses a needle in place of a separate pin, which separates the fibres rather than breaking through them. This allows store assistants to gently spread fabric threads on application to avoid leaving a visible hole after removal. In order to reduce time spent on in-store tagging labour, the Mini NeedleLok mechanical design allows quick and easy application, whilst the solution’s wide opening also allows freedom of placement anywhere on the garment. Minimum product damage risk The Mini NeedleLok speeds up the self-checkout process The Mini NeedleLok also speeds up the self-checkout process. It can be removed quickly and efficiently at the point-of-sale, thanks to its single-piece design and wide opening, enabling store associates to assist with other enquiries, improving the in-store customer experience. It also eliminates the risk of damage to the merchandise, or injury to the customer, as the needle is never exposed. Not only that, with 70% of purchase decisions made at the shelf, Mini NeedleLok has been designed with display in mind. Its sleek look and smart black colour ensures it doesn’t impede on the garment’s aesthetics in order to help turn a browser to a buyer. For those retailers wishing to take their visual merchandising a step further, the solution can also be customised, from adding a logo to a bespoke colourway that matches the company’s branding. Anti-theft retail solution Irene Fernandez, Product Management Europe at Checkpoint Systems, commented: “We’re more customer focused than we have ever been in our history, which is demonstrated through the diverse range of solutions that we now offer retailers across a variety of markets. With the Mini NeedleLok, we took our existing technologies and created a product that fits our apparel customers’ requirements - an effective anti-theft solution that protects merchandise, with the added benefit of being customisable. This is ideal for fashion brands where aesthetic is crucial to their identity.”
Shrewsbury Town Football Club have defied the odds at the start of the 2017-18 football campaign by being well and truly amongst the pace setters with a quarter of the season already gone. No doubt there many reasons for the turnaround in fortunes from what was a dramatic end to last season with the Town finishing near the bottom to being on the crest of a wave this season. One of them could be down to the complete refurbishment of the Club’s Sundorne training facility on the outskirts of the town. The Football Club have invested heavily in ensuring that the quality of the training pitches is equal to the match day playing surface at the Montgomery Waters Meadow stadium. The players, coaching and fitness staff are also benefiting from the computer-based analysing equipment and on-site catering facilities within the complex. Security system installation Needless to say the new training complex required a security system to protect the Club’s investment. One level of security was to install a CCTV system to monitor the site. Shrewsbury Town’s chief executive Brian Caldwell approached one of the Club’s main sponsors Pro-Vision Distribution for assistance. Being a national distributor of CCTV, Access Control and Public Address equipment, Pro-Vision were ideally placed to advise the Club. Following a site visit from local installation company K.J Electronics Systems Ltd, who specialise in CCTV, perimeter protection and intruder alarms the new surveillance equipment was installed. Based on the Samsung Wisenet brand, the agreed specification included 4 x vandal-resistant, true day/night dome cameras, a high definition external bullet camera and a pan/tilt/zoom camera with all recorded data stored on a network video recorder. New training facility secured The true day/night specification ensures that all cameras are able to view images 24/7 irrespective of the amount of natural daylight present and the recorder can accommodate any additional cameras that may be required in due course. Any alarm activation event is sent to a central monitoring station via a secured connection. The Town’s latest asset – their new training facility - now has awarding-winning security equipment to protect the Club’s investment.
Raytec VARIO2 illuminators have been installed in the greater Kruger National Park in South Africa to capture amazing footage of some rather large and wild animals. Raytec illuminators have been used in some of the most challenging and exciting environments globally, everywhere from the Arctic Circle to the jungles of Borneo, and when specialist wildlife film makers WildEarth were looking for a solution for their live night time filming needs they turned to Raytec for support. In the film and TV industry where picture quality is everything, outstanding illumination was essential for producing the best images. WildEarth deployed state of the art 4K cameras to capture high definition images of elephants, lions and leopards. But when it comes to filming at night, ethics plays the most important role in how the images are captured. Using visible white-light would disturb or temporarily blind the animals, or even affect the outcome of their hunts. Therefore, powerful infra-red lighting was chosen which would have no negative effect on the wildlife, but would help the cameras perform over long distances in the dead of night. Choosing VARIO2 i8-3 Highly recommended by other wildlife journalists, WildEarth looked to Raytec infra-red lighting as a powerful yet invisible solution which would allow the cameras to generate outstanding black and white images at night. They chose the ‘VARIO2 i8-3’ which delivers distances up to 600m+ with 5 different angle options that can be changed on site – giving them the flexibility to adapt the illumination at each location. With VARIO holographic lensing, the illuminators produce a highly even spread of light, which allowed WildEarth to capture consistent images of the animals anywhere in the scene with no bright or dark spots. “We’ve been so impressed by the Raytec IR lighting” comments Jeandre Gerding, Head of Camera Operations for WildEarth. “Not only have the illuminators allowed us to film incredible footage in zero light conditions, but the fact that they are low voltage means that we can conveniently power them via battery from our mobile camera vehicles”. Guaranteed lighting power The IR needed to guarantee exactly how much light it would deliver on scene because higher megapixel cameras generally require more light to generate the resolutions they are capable of, and the film crew wanted to guarantee perfect pictures of the animals. Raytec scientifically measure the performance of all their illuminators, and guarantee a recommended 0.35 μW/cm2 of lighting power at the maximum distance of all of their infra-red illuminators – reassuring WildEarth that they would achieve suitably high-quality images every time. All Raytec illuminators are highly robust and can withstand the most extreme temperatures and humidity. IP66 rated, they require zero maintenance and deliver a reliable 10-year life out in the field – perfect for any demanding environment.
The CrimeEye-RD-2 is lightweight, providing easy portability, installation, and superior imaging Total Recall Corporation, a Convergint Technologies Company, has been chosen to work with the City of Chattanooga and the Chattanooga Police Department to make their city a safer place. Total Recall will provide them with a citywide safety solution that includes 15 of its outdoor CrimeEye-RD-2 rapid deployment portable video systems, the latest in its CrimeEye line of digital video solutions. Creating a secure environment “Total Recall Corporation and Convergint Technologies are very pleased that the Chattanooga Police Department has selected CrimeEye as the platform for their citywide safety solution,” said Jordan Heilweil, President of Total Recall Corporation. “CrimeEye will allow CPD to respect the privacy of its citizens while also creating a more secure environment.” The Chattanooga Police Department (CPD) has begun installing CrimeEye-RD-2 video units on 15 power poles throughout Chattanooga. The CrimeEye-RD-2 uses Axis Communications dome network cameras—managed by Genetec Omnicast, an IP video management system—to stream HD-quality video within just minutes of installation. All of this video data will be viewed live at CPD’s new Real-Time Intelligence Centre. The CrimeEye-RD-2 is lightweight and self-contained, and it provides easy portability, simplified installation, superior imaging, and intelligent electronics. The unit requires virtually no tools to set up and can be deployed by one person on almost any type of pole with the included mounting hardware. Chattanooga, which is the fourth-largest city in Tennessee and has more than 175,000 residents, is one of several municipalities throughout the United States to choose Total Recall Corporation’s CrimeEye solutions. “The Chattanooga Police Department is now part of an exclusive group of CrimeEye users that includes the Department of Homeland Security, the Statue of Liberty, and some of the biggest police departments in the United States,” said Rebecca Law, Business Development Manager, Convergint Technologies. “We are honoured to be working with Chief Fletcher and the men and women of the Chattanooga Police Department. "CrimeEye promotes crime reduction, community safety and continues building relationships with our community" Promoting crime prevention “CrimeEye promotes crime reduction, community safety, continues building relationships with our community, assists in solving all types of crimes, and aids prosecutors in putting criminals in jail,” said Chattanooga Police Chief Fred Fletcher. AXIS Communications and Genetec Inc. are long-time Total Recall Corporation technology partners that have successfully collaborated on many CrimeEye deployments, including providing video coverage for the Statue of Liberty, the national Concert for Valor, and for the Passaic Valley Sewerage Commission, one of the largest wastewater treatment plants in the United States. “Safety is one of the key responsibilities of every city around the globe. We’re pleased that our cameras are part of the CrimeEye deployment in Chattanooga” said Mark McCormack, National Sales Manager, National Accounts, Axis Communications, Inc. “The collaboration between Axis Communications, Total Recall, and the Chattanooga Police Department has been successful in making Chattanooga a smarter and safer city for all.”, said Bob Carter, Business Development Manager for Smarter and Safer Cities, Genetec Inc. “We look forward to serving the City of Chattanooga and the Chattanooga Police Department through our partnership with Convergint Technologies, coupling our industry-leading video software solutions for law enforcement with Total Recall’s innovative CrimeEye outdoor video solutions,” added Carter.
IDIS’ integrated surveillance infrastructure provides comprehensive cover at the school’s estate Situated on a World Heritage site within the Precincts of Canterbury Cathedral, The King’s School, Canterbury is England’s oldest school, dating from 597AD. As a co-educational independent school, it offers a 21st-century education within an illustrious historic setting to more than 820 students aged 13-18, including boarders and day pupils. The school estate includes an exceptionally diverse mix of old and new architecture, ranging from medieval Grade 1 listed buildings to brand new premises. Unlike many schools, which typically occupy a single site that can be enclosed with relative ease, the King’s estate includes around 220 separate buildings. They are dispersed across a wide area, many within the public Cathedral grounds and others isolated further afield. Amenities include day and boarding houses, teaching facilities, a music school, recreational centre, sports facilities and staff accommodation. The school also runs security at the affiliated Junior King’s Canterbury, attended by pupils aged 3-13, on an 80-acre estate four miles away. Upgrading safety policies and incident management As at any school, student safety at The King’s School is of paramount importance. In 2015 the management team undertook a comprehensive review of all aspects of security, from safety policies to major incident planning. At the time security was dependent on disparate analogue CCTV systems plus a diverse range of hardware and software from multiple vendors. The school instead wanted a converged surveillance infrastructure unifying systems from a single manufacturer to ensure seamless capability across all sites. However, there were significant challenges, including logistical, engineering and regulatory restrictions on fitting new wiring and equipment within the historic buildings, some with very thick stone walls. Stringent Department of Education (DoE) controls on surveillance in schools also had to be observed. And, of course, the solution had to be cost-effective, ensure ease of use and require low maintenance. It also needed to deliver the flexibility and scalability to support all future plans in line with ongoing school development. "Sunstone Systems and IDIS were extremely creative in overcoming our challenges and the solution exceeded expectations" HD surveillance Security integration experts Sunstone Systems designed and delivered a customised surveillance solution built around a core base platform with IDIS equipment and software. Once complete, the solution will comprise a mix of 120 cameras from the IDIS fixed range, including dome cameras, network video recorders and all the associated software required to deliver an integrated surveillance infrastructure. Combining unobtrusive IDIS IP cameras with IDIS software ensured that high-quality images could be achieved by running HD TVI over existing coaxial cables, significantly reducing the need for extensive rewiring. This in turn eliminated the need for extensive engineering work in old buildings, helping to contain costs while meeting Historic England’s requirements. IDIS software overcame many key challenges, for example, by enabling digital enhancements, digital zoom and privacy masking to enable compliance with DoE requirements while providing comprehensive cover in the most sensitive areas of the estate. Improved reporting and low maintenance The system has been very well received. It is proving easy to use by staff, involves less time and administration, delivers improved reporting and requires minimal maintenance. Excellent HD image quality ensures easy access to indisputable evidence of any incident. At the recreation centre, for example, 23 new IDIS motion-detection cameras enable staff to quickly play back any events that require attention. “Safeguarding students is our top priority so we need surveillance we can trust implicitly. Sunstone Systems and IDIS were extremely creative in overcoming our challenges and the solution exceeded expectations. It does everything we wanted and more to protect students, the school and our reputation for responsible stewardship. What’s more, it provides all the flexibility we will need to meet our security requirements as they continue to evolve,” commented Lee Connelly, Security Manager at The King’s School.
The IRIS Cam system integration with Genetec Clearance allows efficient video evidence collection & management Point Blank Enterprises, a manufacturer of soft body armour and related protective solutions, announced that it has been awarded a five-year contract by the North Miami City Council to provide the North Miami Police Department with IRIS Cam body worn cameras, together with a collaborative case management system from Genetec Inc., a leading provider of open-architecture security and public safety solutions. PBE and Genetec will offer the city of North Miami Police Department an integrated system that combines 120 IRIS Cam body-worn cameras and Genetec Clearance, a case management system designed to accelerate investigations by enabling different organisations to collect, manage and share video evidence. IRIS Cam body worn camera The IRIS Cam is designed to meet the growing demand for law enforcement agencies to provide a visual and audio record of officers’ interactions with the public and help agencies improve evidence collection and enhance officer accountability. Built in a ruggedised enclosure, the IRIS cam provides ultra-high definition recording with a 140° FOV, for getting even closer to the action. Additionally, the IRIS Cam ensures not a moment is missed with 30 seconds of pre-recording. Genetec Clearance case management system The Genetec Clearance case management system is designed to speed up investigations by enabling different organisations to collect, manage and share video evidence, and other relevant case information. It allows police officers, investigators and security managers to gather digital evidence from the IRIS Cam and other sources—such as cell phone footage from bystanders and witnesses and store surveillance video—and easily store, manage, review and share it from a single application. Efficient video evidence capturing The integration of the IRIS Cam system with Genetec Clearance allows for quick and simple uploads, saving officers time at the end of their shift. Post-incident tagging can also be added to the recording, to help with further classification of the event and to aid in locating the file for future searches or investigations. With built-in video redaction, Genetec Clearance protects the privacy of bystanders by allowing identifiable information to be masked, if video must be shared with 3rd parties or when fulfilling public record requests. All user actions initiated within the system, whether internal or external, are automatically tracked to ensure the chain of custody of the evidence is maintained at all times. Streamlined video evidence management “The IRIS Cam system and Genetec Clearance will help the city of North Miami Police Department achieve a streamlined and highly effective process of capturing, managing and administrating video evidence, which will ultimately save the city time and resources in managing cases over the long term,” stated Paulo Motoki, Chief Operating Officer, Point Blank Enterprises. “With over 40 years of trusted service to law enforcement agencies around the world, we are proud to provide a unique hardware/software turnkey solution that will help strengthen accountability and transparency. This will result in more constructive encounters between the police and members of the community,” added Motoki.
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
Return on Investment (ROI) is crucial for any security installation. Most people consider what return on investment they are getting when making a purchasing decision. Usually, customers will select the option which provides them with the greatest ROI. But how can ROI be measured? Individuals involved at different points of the security buying chain will have different ideas of how to measure ROI. Here are a few thoughts from our Expert Panel. As you will see, ROI is more of a subjective matter, depending on several different variables.
Best practices guide: analogue video to cloudDownload
Delivering a smart, secure and healthy workplace with cloudDownload
Are your technology providers keeping you in the dark?Download
Capture new opportunities with computer vision and video analyticsDownload