BCDVideo, the pioneer in video data infrastructure, announces that it has partnered with Wasabi, the hot cloud storage company for video surveillance storage in the cloud. In an industry moving rapidly toward a hybrid-cloud model, this partnership expands the ability for both manufacturers to offer their customers a complete package: BCDVideo’s purpose-built, on-premises storage options and Wasabi’s competitive hot cloud storage solutions. Together, these two companies deliver a hyb...
Sensor solution provider, HENSOLDT is now a member of the United Nations Global Compact. The company is committed to the ten universal sustainability principles in the areas of human rights, labour, the environment and anti-corruption. By signing the Global Compact, HENSOLDT is making visible how important sustainable business practices are for the company. It is the world's largest initiative for sustainable and responsible corporate governance. Group-wide sustainability initiative As part o...
Eagle Eye Networks, the globally renowned company in cloud video surveillance solutions, has released a best practices guide ‘Analog Video to Cloud’ for business owners who are interested in economical ways to upgrade legacy analogue video surveillance cameras to a modern, digital cloud system, and how existing cameras can be reused in the process. This report details the advantages of managing analogue camera video in the Cloud, including lower costs and greater flexibility, outlin...
The global pandemic has triggered considerable innovation and change in the video surveillance sector. Last year, organisations around the globe embraced video surveillance technologies to manage social distancing, monitor occupancy levels in internal and external settings, and enhance their return-to-work processes. Forced to reimagine nearly every facet of their operations for a new post-COVID reality, companies were quick to seize on the possibilities offered by today’s next-generation...
Video Surveillance as a Service (VSaaS) innovator AVA Security found that more than four out of every five (82%) of IT, Operations, Facilities Management and Security systems decision makers employed by medium and large-sized businesses, see a potential role for their workplaces’ video monitoring systems in supporting corporate plans for 'a safe return to the workplace post-lockdown’. Video monitoring systems This was perhaps the most significant finding of the security industry&rs...
Pivot3, the provider of smart infrastructure solutions for enterprise-grade video, announces that it has named Darin Dillon as Vice President, energy. In this role, Dillon will lead Pivot3’s sales efforts in the energy sector. Dillon will further help expand Pivot3’s already strong presence in the critical infrastructure segments of utilities, oil and liquid natural gas markets. “Energy is a core focus for Pivot3 and Darin’s long-term collaborative relationships with cha...
Eagle Eye Networks, a global company in cloud video surveillance announced an official partnership with Co-Liv, a non-profit association of coliving professionals. As the global co-living movement continues to gain momentum, technology companies such as Eagle Eye Networks for video surveillance and Salto for Access Control will be crucial in providing tech solutions that allow coliving operators to scale faster and more efficiently than they would on their own. Advantages of cloud surveillance Using a cloud solution, the video is accessible to integrate with other applications Storing surveillance video data in the cloud comes with many advantages, especially for residential buildings, such as hotels, urban apartments, and coliving developments. Traditionally, video surveillance footage is only accessible if something bad happens – typically a security breach, such as a robbery. Therefore, the video is rarely used and the high price tag of the camera and data storage equipment remains just a “cost of doing business,” yielding no financial returns or useful insights. Using a cloud solution, the video is accessible to integrate with other applications and can deliver powerful insights that allow businesses to improve their people, product, and processes. Video surveillance technology “We are excited to join the Co-Liv organisation as technology partner alongside Salto. As the Coliving movement is growing, we want to support this with our video surveillance technology that both ensures the safety of the residents and provides relevant business insights for coliving operators." "As Eagle Eye Networks is fully integrated with Salto’s state-of-the-art Access Control systems, we provide a full solution for coliving operators,” says Rishi Lodhia, Managing Director Eagle Eye Networks. Building tech ecosystem Using artificial intelligence to analyse the video, operators can also discover how people interact in those spaces and use these insights to improve their communities, enhance their reputation as being secure and resident-focused, and make informed spatial design decisions in future developments. Eagle Eye also integrates with other technology solutions, such as SALTO’s access solutions, so the entire tech ecosystem of a building can work together to provide the best living experience possible. Seamless security Christian Schmitz, from Salto Systems, adds, “We have been a long-standing partner of the Co-Liv Organization as we do believe a seamless access control system helps coliving operators to create peace of mind about the safety of the property." "Adding Eagle Eye Networks means we can provide a seamless overall security solution without adding complexities with different systems that are not connected to each other.” Advantages of coliving Eagle Eye’s cloud video surveillance captures video for security purposes and provides unlimited access to artificial intelligence The advantages for the coliving industry can be best summed up with a quote from European coliving operator BaseCamp: “BaseCamp Student operates seven student housing facilities in Denmark, Germany, and Poland, with more locations coming soon. We are continuously striving to build and operate a global community focused on enhancing the student journey." "So, when we set out to find a security partner, we sought one that was willing – and able – to be as creative as our students and our spaces. We found this in Eagle Eye Networks. Its video surveillance solution captures video for security purposes, but because the video is stored in the cloud, it opens up unlimited access to valuable artificial intelligence – information that helps us and our residents make better decisions.” Benefits of video surveillance “For example, management can use data to understand which amenities are used most often, informing future designs and builds. And students can engage with the system, as well. They may want to check the laundry room in real time to determine if machines are available." "Or pull data regarding gym occupancy before heading to work out. By using our video surveillance system creatively, we’re enhancing the spaces where our residents live, learn, work, and connect – now and in the future,” says Daniel Doherr, Managing Director for BaseCamp Student Operations. Emerging partnerships “As coliving operators around the world continue to experiment with different communal living models, the ones that are able to use technology to more efficiently achieve their goals will be at a distinct advantage when compared to their peers,” concludes Connor Moore. “At Co-Liv we believe technology providers, such as Eagle Eye Networks, are excellent partners for innovative and tech-savvy coliving companies.”
LenelS2 announced the release of its Elements™ system, cloud-based, purpose-built access control and video management system delivered as a software-as-a-service (SaaS) solution. The Elements system is designed to be easily installed and simple to use with a mobile-first, intuitive user interface. Information is available at any time and accessible from anywhere on any device. By leveraging the power of the cloud, businesses benefit from automated updates, reduced on-site maintenance, predictable monthly billing, and minimised training requirements. LenelS2, a global company in advanced security systems and services, is a part of Carrier Global Corporation, the global provider of healthy, safe, and sustainable building, and cold chain solutions. Easy, unified access control Several LenelS2 Value-Added Resellers (VARs) participated in a pilot program to gain feedback for product development. “Our customer wanted a cloud-based unified access control and video surveillance system,” said David Ellis, Senior Manager, Integrated Solutions, Superior Alarm Systems (SAS), a LenelS2 VAR. "The Elements system was easy to deploy and use the customer’s existing system controller and credential readers. There was no need for a lengthy technician or customer training session. It was a great experience.” Real-time updates Elements VARs and end-users benefit from LenelS2’s continuous delivery model, allowing for real-time feature updates In addition to common access control functionality, Elements VARs and end-users benefit from LenelS2’s continuous delivery model, allowing for real-time feature updates that reduce the need for costly on-site maintenance visits. Additionally, mobile credentialing issuance and management can be done completely through the Elements web portal, eliminating the need to access a separate system. This simplifies the entire process and allows for touchless access via LenelS2’s BlueDiamond™ mobile credential, services, and reader solution. Catering varied businesses As part of Carrier’s Healthy Buildings Program, the Elements system joins LenelS2’s feature-rich OnGuard® system and web-based NetBox™ appliance-oriented access control system to cover the full range of requirements from small- to medium-sized businesses to the most demanding enterprise and government customers. “Developed from the ground up as a SaaS solution, the Elements system provides businesses and other organisations with a flexible cloud, subscription-based option for how they want to deploy and manage their security systems,” said Jeff Stanek, President, LenelS2. “Customers will appreciate the ability to rapidly provision and operate remote offices using a centrally-managed cardholder database that can also be connected to our feature-rich and highly trusted OnGuard system located at their main facilities.” Central access solution The Elements system can operate as an independent access control system that is well suited for a wide variety of deployments, but it also supports enterprises’ remote offices by utilising the Elements OnGuard Connector. This connector supports the use of the OnGuard system at headquarters to centrally manage all cardholders and event activity. Branch office locations, including those without corporate networks, are secured by the Elements system. All event activity flows into the OnGuard system and is available for use with other integrated business systems. As a result, branch and headquarters’ employee activity is processed and managed consistently. The connector also enables end-to-end LenelS2 deployments, regardless of facility size. Cybersecure As a unified solution, the Elements system includes video management functionality, providing system configuration, real-time video verification of alarms and events as well as the ability to view live or recorded video through a single user interface. The Elements system works with any reader that supports Wiegand or OSDP™ protocols and Mercury hardware. Moreover, the Elements system incorporates “Privacy by Design” cybersecurity principles and can enable secure end-to-end encryption from cloud to edge devices at customer premises.
Videonetics, the globally renowned AI & DL powered Unified Video Computing Platform (UVCP) strengthens its technology partnership with Axis Communications, the globally renowned company in IP surveillance, by co-creating and delivering numerous integrated solutions under Axis Application Development Partner (ADP) program, to meet growing demands of different market segments. Axis ADP Program The Axis Application Development Partner (ADP) Program is designed to help software vendors streamlining their software integration for Axis range of IP Cameras and other Network system devices. Over the years, the technology alliance has benefited both the companies to expand market penetration and geographical reach, by collaborating with the industry’s largest partner network and providing innovative integrated solutions to partners and design customised solutions for end-users. Solving unique customer challenges Avinash Trivedi, Vice President (Business Development), Videonetics, stated, “We are proud to be part of Axis Application Development Program (ADP), which helped us to create many interesting solutions designed to solve unique customer challenges and also to get optimal value of their surveillance investment.” Avinash Trivedi adds, “Moving forward, I am assured that this technology partnership will give both of us an unparalleled competitive advantage in providing end users, the innovative and unified solutions that they demand.” Building integrated solutions The ADP program helps us to design best of breed solutions to reach the addressable market" According to Sudhindra Holla, Sales Director, Axis Communications – India & SAARC, “At Axis, we strongly believe that opportunities increase when you help others win. That’s why we actively work alongside software vendors to build integrated solutions to expand our market reach.” Sudhindra Holla adds, “We are a global organisation with strong a reputation of innovation, excellence, and partner commitment. The ADP program helps us to design best of breed solutions to reach the addressable market.” Videonetics and Axis technology integrations Videonetics and Axis Communications have successfully completed following integrations: Videonetics Intelligent VMS 3.0 supports AXIS Zipstream technology that reduces the cost of bandwidth, server equipment, data storage systems and lowers the complexity of the video surveillance system, along with the total cost of ownership. Integration with AXIS network speakers allow users to react immediately to suspicious situations by making a live announcement and VMS sends the alert to designated operators to deter potential intruders and they can replay audio clips as and when required. Videonetics Intelligent VMS 3.0 when integrated with AXIS Radar, provides additional visual information of the scene with help of many cameras connected to IVMS, thus providing much needed situational awareness, detects real-time threats or multiple intrusions at the same time, while reducing false alarms. Videonetics AI-enabled Video Analytics has been embedded directly to the AXIS IP cameras ‘on the edge’ enabling each camera to operate independently with real-time detection capabilities, while eliminating the need for additional hardware. Similarly, Intelligent VMS 3.0 integration with edge storage of AXIS cameras, minimise loss of video in the event of connection issues or network failure between recording servers and cameras. Last but not the least, Intelligent VMS 3.0 added a new level of secure integration with cameras from Axis, based on Secure Real-time Transport Protocol (SRTP) as a means of hardening surveillance content against cyber-attacks and unauthorised interception.
FUJIFILM Recording Media U.S.A., Inc. (Fujifilm USA) has announced the release of an online calculator designed to help video surveillance (VS) industry professionals assess the Total Cost of Ownership (TCO) for long-term retention of video surveillance content. Modern low-cost, high-resolution cameras, combined with longer-term retention requirements, are driving video content storage costs upwards, across the video surveillance industry and leading many to take a new look at their storage strategy. Online calculator tool Developed by storage economics experts, Brad Johns Consulting and sponsored by Fujifilm, the decision-making tool allows users to input the specifications of their system, such as number of cameras, camera type, frame rate, resolution, retention period requirements, motion percentage, and duration of time, for keeping footage in ‘tier 1’ HDD storage or ‘tier 2’ tape storage. With these inputs, the calculator instantly weighs the variables and projects a 5-year cost comparison of using HDD only, or a combination of HDD with an integrated LTO tape technology tier. Data storage tape with LTO technology Using the real world parameters of their surveillance systems, they can quickly and easily see the direct results" “Fujifilm is excited about this opportunity to help video surveillance professionals calculate the real savings they can achieve by implementing a second tier of storage based on tape with LTO technology,” said Rich Gadomski, Head of Tape Evangelism, FUJIFILM Recording Media U.S.A., Inc. Rich Gadomski adds, “Using the real world parameters of their surveillance systems, they can quickly and easily see the direct results on their bottom line.” Establishing a strong cost-savings case for integrating high-capacity tape (12TB LTO Generation 8 cartridges), users with even modest retention requirements will typically find a 50% potential annual savings, when compared to disk alone. Those savings only increase with higher data volumes and longer retention times. Moving footage from disk to the tape tier sooner also drives costs down. Low energy use and carbon footprint reduction “In addition to lower cost, other quality and environmental factors are driving more surveillance industry professionals to consider data storage tape with LTO technology,” said Rich Gadomski. He adds, “Tape leads all storage media in reliability, with a bit error rate significantly better than disk. And when compared to constantly-spinning HDDs, tape’s low energy consumption not only drives costs down, but reduces carbon footprint as well.” LTO technology LTO technology is also becoming more operator-friendly. New video management software solutions, such as Cozaint Corporation’s askALICE, are designed to easily playback video from either tier-1 disk storage or tier-2 tape, without any additional steps needed by the surveillance timeline operator.
Personnel often only must keep an eye on certain security cameras as they do not have any other video management duties. Yet, this is often where users still install a separate PC and software. Since the beginning of the year, Dallmeier single sensor cameras are fully integrated with the EIZO IP decoding solutions, helping customers realise completely ‘client-free’ video surveillance solutions. Less hardware and software In the past, the transmission of video surveillance images from IP cameras to surveillance monitors was a highly labour-intensive task. Before the monitor, a PC with corresponding software and peripherals had to be running, so that it could output the image signals from the IP camera. This, in turn, involved additional software licenses and more system maintenance and hardware resources. Now, Dallmeier camera users can implement the IP decoder monitor, DuraVision FDF2711W-IP and the IP decoder box, DuraVision DX0211-IP from EIZO for in-use cases with no other video management requirements. The systems from EIZO support all the single-sensor cameras in the German manufacturer's portfolio. 24/7 operation in security and surveillance systems The EIZO systems are ideal for 24/7 operation in security and surveillance systems The EIZO systems are ideal for 24/7 operation in security and surveillance systems, and are equipped with a high-performance decoder and a range of video stream management functions, which are integrated directly with the firmware. With their assurance of high quality as asserted in the slogan - ‘Made in Germany’, Dallmeier single sensor cameras enjoy a reputation for distinctive image and playback quality even under difficult conditions. Application in multiple sectors When used together, the solution consisting of Dallmeier cameras and the EIZO IP decoder monitor or IP decoder box can be implemented in many different sectors. These include for instance passenger processing at airports, local public transport, gatehouses, care homes, hospitals, and many other scenarios. In small environments, the solution can often replace the VMS system entirely, thereby saving still more costs and effort in the delivery of video of images for security personnel and other employees.
The CrossChex Cloud is based on the AWS cloud server, providing easy solutions for the small and medium business sectors and helps store the data more safely. The security processes and controls are authenticated to meet SOC 2 Type II security standards. This includes using two-fact or verify, encrypting computers, logging administrators' actions, tracking access grants using verified policies, and following repeatable processes for a consistent and secure customer experience. Recognition Ability The FaceDeep3 Series is the powerful face recognition terminal with 1:10,000 user < 0.3-sec operational recognition ability, and the latest BioNANO deep learning algorithm. With the assistance of AI NPU, non-living body recognition such as videos and photos can be accurately excluded, and people wearing masks can be accurately identified adding to its FaceDeep3 temperature detection helps reduce the risk by alarming abnormal body temperature. A combination of FaceDeep3 Series with CrossChex Cloud System supports remote registration, real-time data upload, and real-time reports, temperature detection, and contactless solution which assure safety and satisfaction to small and medium business channels.
Since the start of the pandemic, almost a quarter of UK businesses have been forced to temporarily close, pause trading, or work remotely, with very little notice. Now nearing the 12th month of the crisis, the country is currently enduring its third national lockdown, with an unspecified timeframe. Most workers are being urged to remain at home and only venture out for essential travel. This means a huge number of premises across the board, from recreational venues such as theatres, pubs and leisure centres, to office buildings, and storage facilities, will remain empty. It’s likely that security has been scaled back, so many buildings could be vulnerable to attack for the foreseeable future. Just recently we’ve seen empty pubs in London targeted by opportunistic illegal rave organisers. Physical security strategy Even rural areas aren’t exempt from the problem, as burglars have reportedly targeted beauty salons, etc Even rural areas aren’t exempt from the problem, as burglars have reportedly targeted beauty salons, food stores and vehicle hire premises this winter. Vandalism and burglary remain very real threats, therefore it is vital that facilities managers and property owners ensure the physical security of these empty buildings is maintained to the highest standard to protect property and the assets within. Below we outline key considerations when evaluating a physical security strategy for an empty building. Assess the risk We would urge facilities managers and building owners to carry out regular, thorough checks of the building and the perimeter to assess any obvious factors which would elevate the risk of attack. This includes assessing the location. Is the crime rate high? How visible is the property? Are the contents of the property on show? How secure is the access or perimeter boundary? View the premises from a potential intruder’s perspective, and when you can’t be at the site in person, use photographs, notes and drawings to identify potential weaknesses. For example, there may be high security fencing at the front of the premises, but make sure it is not at risk of being compromised at the back. Conducting regular maintenance Retain and maintain quality Inspecting the fence line may seem obvious and straightforward, but it needs to be a deliberate, scheduled event Conducting regular maintenance is even more essential while premises are left empty, as it is much easier for any issues to appear and escalate undetected. We highly recommend regularly inspecting your fencing for disrepair or damage as this can affect the perimeter’s integrity. Alternatively, choosing high quality galvanised and preferably powder coated steel fencing with a 25-year guarantee will offer longer-lasting protection against rust and corrosion. Inspecting the fence line may seem obvious and straightforward, but it needs to be a deliberate, scheduled event. Take time to check the perimeter on both sides. As you inspect the fencing, keep an eye out for any attempted breaches and note if foliage, weather conditions, or topography changes have affected security integrity. Check all fixtures and fittings are in good working order, look for damage and corrosion, and clear all litter and debris away. Huge security risk Quality investments In a time when businesses are already stretched, it can be tempting to opt for quick, inexpensive fixes. However, poorly executed design or cheap, low quality products can lead to costly, long-term remediation or worse, significant loss to the business. Make wise, informed decisions and specify solutions based on your organisation’s security needs first and foremost. While generic steel palisade is a popular option, owing to its intimidating aesthetic, it is easily compromised. Steel palisade fencing has inherent weaknesses that undermine performance. Its wide pales can obstruct surveillance, while the bolted construction is a huge security risk. Simply removing or breaking the lower fixing on one or two pales would allow them to swing aside to give repeated access to the site without leaving an easily visible sign that the perimeter has been breached. It’s a false economy, as the initial lower price is offset by the costs and inconvenience incurred by regular repairs. Performance classification system The standard works via a performance classification system, and even considers the tools that an intruder may use Specifying a higher quality product that’s fit for purpose makes more sense both in the short and long term, and it adds little to the original cost. Fortunately, there are a number of security accreditations that facilities managers and building owners can refer to when specifying security measures at their site, helping them choose effective solutions to combat the risks the property faces. Proven performance Certifications and approvals, such as The Loss Prevention Certification Board’s (LPCB) LPS 1175 and the British Standards Institution’s (BSI) PAS, prove a product has been thoroughly tested to a specific standard. They prove the strength and durability of the item in multiple different situations. It is worth noting also that investing in effective perimeter protection can actually deliver a positive return by reducing the incidence of burglary and vandalism, and their associated costs. The technical evaluation work carried out by LPCB is extremely thorough. The product is subjected to rigorous quality audit processes, to certify the security products tested by BRE deliver verified levels of protection. All LPS 1175 rated products are vigorously tested before receiving an accreditation. The standard works via a performance classification system, and even considers the tools that an intruder may use. Intrusion detection system Our law enforcement teams are stretched to capacity and coping with reduced workforces due to illness By predicting a likely toolset, specifiers can construct multiple defensive layers to maximise how much time a facility has to respond to an attack. Different levels of security are crucial for the ‘5D defence’ concept, whereby a quintet of security assets work together to prevent access to your site, resulting in a strategy that will: Deter, Detect, Deny, Delay and Defend unwanted access from intruders. 360° security There is no single solution when it comes to securing a building. Every situation must be considered on an individual basis, starting with a full risk assessment. We recommend an integrated approach where appropriate. Along with a secure perimeter, this might also include effective lighting in shaded areas and at doors, gates, and vulnerable windows, Perimeter Intrusion Detection Systems (PIDS) and well-placed CCTV. These measures can hinder entry and escape, or increase the chance of discovery and detection. Domestic burglaries While domestic burglaries have become less attractive as many of our homes are now occupied around the clock, commercial properties have become increasingly more vulnerable. Our law enforcement teams are stretched to capacity and coping with reduced workforces due to isolating and illness. Therefore it has never been so important for building owners and facilities managers to assess the properties they’re responsible for to ensure they’re protected effectively in the event of an attack.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyse more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analysed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analysing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as licence plate reading, behavioural analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fibre-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
As a leader, I am a big proponent of using what’s happened in the past — and is currently happening in the present — to better prepare our business and our customers for what’s to come. Applying this mindset in the financial industry is particularly helpful. The emergence of various technologies and trends enables us to determine what we can optimise for the highest efficiency and satisfaction level. The past few years have been focused on the Internet of Things (IoT), data and analytics, and enhancing proactivity to mitigate the increasingly significant threat of fraud and cyber risks. While each of these elements will continue to play an essential role in the industry moving forward, we’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence. When broken down in terms of its relevance for banks and credit unions, we can expect to see these trends in certain areas in the future. Security and customer engagement We’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence There's no overstating the importance and value of one's hard-earned money. When it comes to keeping it safe, consumers demand their relationship with a financial institution is built on one powerful characteristic: trust. Customers must feel confident in placing their funds in someone else's hands, with the comfort and understanding that the institution's primary goal is to meet their needs while safeguarding information at all times. The digital transformation and incorporation of intelligent technology into the banking environment have undoubtedly changed how trust is defined in this industry. As customers become more tech-savvy, their idea of a trustworthy and engaging banking partner begins. We're seeing the necessity of digital services for elevating customer satisfaction, such as mobile banking, chat features, and intelligent virtual assistants, complementing in-person service, and modernising customer engagement. Now that customers are becoming more aware of some of the risks imposed by technology, simplifying and automating programs is more critical for banks than ever before. To address and mitigate customer concerns about data security and privacy, financial organisations must prioritise deploying an integrated, end-to-end solution that considers the vulnerability of the Internet of Things (IoT) and the risks of the cyber world. A security-led strategy But the aspect of security must remain at the centre of this strategy. As both the financial industry and the threats it faces become more complex, the promise of secure housing and management of one of our most sensitive assets is always top-of-mind. Ensuring adequate security, surveillance, and investigative processes are the key for banks to establish superior customer engagement and develop a healthy relationship based on protection. It’s a simple fact: Financial institutions can’t drive exceptional customer service without security having a seat at the table. In general, the customer experience is typically made up of these two elements above all else, and loyal customers place their trust in banks to demonstrate an apparent dedication to understanding how both sides impact one another — which is in more ways than one. Financial institutions can’t drive exceptional customer service without security having a seat at the table As we start to see the physical layouts of branches evolve to become more productive for customer engagement, it’s imperative to ensure that security is considered in these changes. For example, many bank environments are transitioning to be more liberal and free-flowing, which we will all take advantage of after the pandemic is behind us. These new environments could introduce various risks when it comes to employee and asset protection, making it paramount for security to react to this adjustment accordingly from a safety and fraud perspective. Physical security and IT By now, you’re probably more than familiar with the term “convergence.” The evolution of the threat landscape and the significance of risks that today’s banking and financial providers face have made the word top-of-mind. Organisations worldwide demand a more holistic approach to security to ensure they’re consistently protecting consumer data, employees, brand reputation, and infrastructure. Though this type of convergence has already begun to occur, the integration of physical and IT security will only become more critical in the years ahead. The use of advanced networked and cloud-based technologies in financial institutions — primarily through wireless network connections — has led to IT’s increased involvement in security decisions and operations, which is the right path to follow if a bank or credit union wants to ensure its solutions are protected against cyber threats. The collaboration between physical and IT security teams must exist at every level of the process; from procurement to installation to maintenance over time, it’s crucial that IT personnel are involved and asking the right questions. In the future, physical security groups will likely rely on IT professionals to help them solve problems regarding the technical and cyber sides of security solutions. Collaboration is key Whether it's due to the evolving risk landscape financial institutions face or the desire to adhere to customer demands, it’s become clear that collaboration will be the key to success for banks and credit unions in the future. A modernised customer engagement strategy must incorporate a focus on security, and that element of safety must be comprised of both physical and IT components. A modernised customer engagement strategy must incorporate a focus on security But while the traditional definition of convergence may seem simple to understand, we must look beyond these words to determine how exactly the practice can and should be implemented. In a more detailed sense, convergence can be defined as a marrying of cyber and physical security capabilities to form a comprehensive approach to identify potential threats and expand awareness for better event response. This level of “converged collaboration” fuels a unified and cohesive security strategy built with all areas of security in mind and can lead to better incident management and faster response. And with the potential impact of today’s security threats on a bank’s people, property, and brand, this approach is necessary to ensure that no stone is left unturned.
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry). The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market. The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg. Tesla amongst those impacted The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012. In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.” Hacking was possible due to built-in feature The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature. Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking." "Connected cameras are supposed to provide an additional layer of security to organisations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.” Super Admin account had access to all cameras Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.” Impact on broader video surveillance industry The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.” Widespread government and healthcare use The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organisation to find relevant footage. The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organisations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimise losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Not having to insert a card into the ATM removes the opportunity to trap cards Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs and crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The protection of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorised to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware.
Marriott International Inc. is a hospitality company and the Gaylord Opryland Resort and Convention Centre is a Marriott property in the world. Located in Nashville, Tennessee, Gaylord Opryland offers visitors the chance to experience Music City under a single roof. The resort has a hotel with over 3000 suites and rooms and a smaller adjacent hotel with more than 300. Risk assessment Ryman Hospitality, the organisation that owns Gaylord Brand Hotels, decided to embark on a risk assessment of their properties in 2017. The third-party assessors discovered that CCTV systems were lacking in all of the hotels, including at the Gaylord Opryland Resort. According to Greg Pezzo, Gaylord Opryland Resort and Attractions’ Safety and Security Director, “The system consisted of old operating systems and cameras that didn’t all work. The security team could not get consistent playback from all of their cameras, and they were not able to store data for more than a few weeks at a time.” As a result of the risk assessment, ownership decided to invest in a complete upgrade of all its hotels and chose the Gaylord Opryland as its test case. Their strategy was to use Opryland as the model and then upgrade their other five Gaylord hotels following its success. Installation of multidirectional cameras Working with integrator Herring Technology, Ryman Hospitality designed a solution that features a new video management system (VMS) from Milestone Systems and 400 state-of-the-art cameras from Hanwha Techwin. The Resort purchased a variety of Hanwha cameras, including 145 XND-6010 full HD cameras with video analytics, 182 Q series indoor and outdoor dome cameras with IR, and more than 20 PNM 7000 and 9000 multi-directional cameras. Deciding where to place their cameras was a relatively simple process. Pezzo explains, “We added cameras where we had high volume, where we had experienced problems in the past, and where we didn’t previously have cameras at all.” They also looked at their own data relating to theft and other incidents to help determine camera location. High-quality imaging camera The surveillance system and the cameras are helping to protect the resort against liability from potential lawsuits According to Pezzo, one of the main functions of their upgraded system is protecting the resort against false claims. He states, “From a claims perspective, this surveillance system and, specifically, these cameras are helping to protect us against liability from potential lawsuits.” He explains, “Our older security camera images are grainy or black and white, which means we could not get the level of detail we needed. But, with Hanwha cameras, we are able to capture high-quality images in real-time that show us, for example, how a guest fell: whether there was an obstruction, water on the floor, an indentation, or whether the guest simply tripped.” The ability to protect the organisation against potential lawsuits equates to significant ROI for the Resort. Easy to keep track of movement As a result of the upgrade, security is easily able to track persons of interest clearly as they move throughout the resort. Says Pezzo, “With 3000 rooms and a million square feet of property, the ability to see an individual this clearly as they move through our spaces is incredible. In the past, we would lose people in uncovered sections. They would just disappear. But that doesn’t happen anymore.” For the Gaylord Opryland Resort and Convention Center, the upgrade had an immediate impact. According to Pezzo, “On the first day after installing the new cameras, someone attempted a false claim, but we were easily able to prove that it was not our fault.” For 2021, the Resort plans to invest in more new cameras every few months as the budget becomes available.
Videosoft's adaptive low bandwidth video streaming technology has been selected and installed on the Mayflower Autonomous Ship (MAS), in order to help relay high-quality footage of the ship’s various missions, back to humans on land. On its maiden voyage this spring, the Mayflower Autonomous Ship will trace the route of the famous 1620 Mayflower ship, sailing from Plymouth, in the United Kingdom to Plymouth, in Massachusetts, USA. Only this time, there will be no human captain or crew on board, as the 15 metres, lightweight, hybrid-electric powered trimaran (multi-hull vessel) crosses the Atlantic Ocean. Real-time feedback and visuals Videosoft’s technology will help capture footage from the Mayflower's six onboard cameras at sea. Using satellite connectivity and compression technologies, footage will be transmitted back to AI developers and research scientists, providing them real-time feedback and visuals, during the mission. It will also be used to provide the media and public with updates about interesting events that occur during the ship’s ocean adventures. “The ability to receive live video feed from the ship using minimal communication bandwidth is a game changer for us,” said Don Scott, the Chief Technology Officer (CTO) of the Mayflower Autonomous Ship for Marine AI. Reliable monitoring of the live situation Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation" Don Scott adds, “Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation and give us confidence in the vehicle’s operation at sea. It has already been an invaluable tool during sea trials and we look forward to having the live feed during the voyage itself.” The international grassroots project is led by marine research organisation, ProMare, alongside IBM, which is acting as both lead technology partner and lead scientific partner, with other key design and construction partners, including MSubs, Aluship (Aluship Technology) and Marine AI. AI Captain with computer vision technology With an AI Captain at the helm, MAS is able to operate for long distances and durations at sea collecting critical data about the ocean. Powered by IBM’s computer vision, automation and machine learning technologies, the AI Captain maintains constant situational awareness and makes decisions about what to do next in line with collision regulations. Small, lightweight edge devices from NVIDIA provide local computer power for operational independence, relying on IBM Cloud connectivity when available. Cutting-edge video streaming solution Videosoft was selected for its cutting-edge video streaming solution and its ability to reliably stream video from onboard cameras and computer vision systems, which scan the horizon for hazards, as the Mayflower Autonomous Ship sails. Videosoft's software runs on IBM's platform, which skippers the vessel and is linked via satellite. Videosoft's Chief Executive Officer (CEO), Stewart McCone said, “This project is designed to transform humanity’s relationship with the ocean. To say we're totally thrilled to be involved in the Mayflower Autonomous Ship project would be an understatement.” Stewart McCone adds, “By working alongside innovative and specialist companies, who are experts in their field and have an intimate knowledge of what they are doing, Videosoft is enabling the ambitions of this multi-million-pound project. Streaming live video from ocean-going vessels is not straightforward and you really need to know what you're doing to pull it off successfully.” Intelligent transmission protocol An intelligent transmission protocol is required to maintain connectivity" He further stated, “An intelligent transmission protocol is required to maintain connectivity. In addition to switching between satellite and cellular networks, variable signal strength, the topography of network masts, atmospheric conditions, satellite capabilities, speed, and variables all impact the available bandwidth.” Stewart McCone said, “Videosoft, which has developed software specifically for the satellite and cellular industry, to negate the typical issues that arise when using such networks, has made it possible to have eyes on the ocean 24/7. The unique protocols that the Videosoft team has built into our software mean that any video delay from the Mayflower will be dramatically reduced, with any streamed video automatically adapting to the amount of available bandwidth, while retaining good quality.” Real-time situational awareness Stewart continues, “Even in our knowledge-rich industry, not many people realise that this can be done, but it can and is relatively simple to put in place, thanks to our easy-to-use software platform. As with CCTV, IoT and surveillance applications, Videosoft's ability to provide reliable video streams creates a real-time situational awareness that is critical to the operational success of projects, such as the Mayflower Autonomous Ship.” He further adds, “The Videosoft vision has always been to get involved in pioneering projects, such as the Mayflower and serves to underpin Videosoft's mission statement of deploying technology to solve real-world problems at the highest global level, using video and remote services, to make the world be a better, safer place. We're showing that this specialist tech does exist and that we can enable all Internet of Things (IoT) applications for the common good. If that interests you, come and talk to us.”
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimising their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling etc), people and vehicle search, object searching and colour searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimising the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
The developer of innovative behavioural recognition systems for real-time video intelligence, has recently deployed a new installation in the city of Eilat, Israel to detect, predict and analyse events of interests in real-time and alert authorities of crowding, violent/suspicious activity, traffic or crowd congestion, and more. Deployment of the unique behavioral analytics solution was fast-tracked in preparation for the large number of tourists who typically flood the city during the Passover and upcoming holiday season. viisights behavioural analytics are integrated into the city’s extensive surveillance system, which includes over 300 cameras that are monitored at a centrally located command and control centre. viisights can monitor hundreds of cameras in real-time, and upon recognition or prediction of unusual behaviour a command centre operator receives an immediate alert and can notify the authorities. Latest advancements in imaging technology viisights behavioural analytics employ AI to autonomously detect, analyse, and understand actions and events Eilat is the first city in Israel to advance Israel’s smart city “City without Violence” initiative. Avinoam Nahari, Director of the city’s information methods and systems division in charge of the project, stated that the viisights behavioural analytics solution enables the city to quickly and efficiently address abnormal events for the benefit of its residents and visitors’ safety and security. Maya Scheyer, VP of Global Business Development and Sales at viisights, stated that the company’s innovative behavioural analytics leverage the latest advancements in imaging technology to deliver new benchmarks in video intelligence that transcend traditional real-time surveillance monitoring and forensics by providing actionable intelligence to minimise liabilities and prevent incidents from escalating. Unlike conventional video analytics that use old pixel technology to recognise static objects and classify objects, viisights behavioural analytics employ Artificial Intelligence (AI) to autonomously detect, analyse, and understand actions and events. This unprecedented level of video understanding is based on a unique implementation of deep neural networks capable of analysing and defining specific activities using video streams from conventional security cameras. Maintain the public’s safety and security Eilat deployed the viisights solution to autonomously increase situational awareness and generate alerts on events of interest such as crowding events in areas and locations where COVID-19 guidelines are not being followed, predicting gatherings by monitoring traffic and people’s movement towards a certain location, and more. We’re proud of this innovative system which will enable us to maintain the public’s safety and security" Eli Lankri, Deputy and Acting Mayor of Eilat leading the Israel’s Smart City program said, “As a city that ranks high in Israel’s smart cities index, we’re proud of this innovative system which will enable us to maintain the public’s safety and security, and its health under the current COVID-19 pandemic”. Prevent the spread of COVID-19 Asaf Birenzvieg, viisights CEO added, “We’re proud to take part in this national effort and provide a critical component of the “City without Violence” project to help prevent the spread of COVID-19 and get life back on track while maintaining the COVID-19 guidelines. Given Eilat’s status as one of Israel’s most popular tourism cities, we are extremely proud to be part of this national effort.” In addition to adding to Eilat’s image as pioneering the country’s smart city initiative, the municipality is a “living lab” for new technologies in various fields. Examples include a renewable electricity system that handles 70% of daytime power needs, smart transportation, travel technologies, smart lighting and gardening systems, environmental monitoring technology with sensors located throughout the city to detect radiation, air and noise pollution, and more.
One of the largest universities in the capital, London South Bank University, commissioned Optyma Security Systems to upgrade its access control database with SALTO SPACE management software. London South Bank University (LSBU) is one of London’s largest and oldest universities. Since 1892 it has been improving the lives of students, businesses, and the local community. As a cosmopolitan university with over 18,000 students, it draws people from over 130 countries. Incumbent security specialists The university has two Campuses and four Halls of Residences, these being: Southwark Campus based at Elephant and Castle and consisting of numerous separate buildings and Havering Campus in Essex. They also have a third campus opening in September 2021 in Croydon. Optyma have been the incumbent security specialists providing maintenance Following a site review, it was recommended that the current SALTO system should be upgraded to the latest versions. Optyma have been the incumbent security specialists providing maintenance and reactive repairs for the CCTV, access control, and integrated intruder alarms across the whole campus since 2017. They also provide support with the integration of the access control and student enrolment/service databases. Potential blacklisting problems For this exercise, the principal aims were to: eliminate any potential blacklisting problems; bring the existing technology up to date; future proof the system, and install a web-based solution to allow for easier access. To achieve this, work was carried out at LSBU during the lockdown period to ensure downtime was kept to a minimum, with SALTO extracting all information required to be replicated in the new database and then incorporating and rebuilding a new database for the customer. SPACE was installed on the new SALTO server and connected to the rebuilt database. Optyma engineers then carried out the initialisation of all hardware and re-enrolment of user cards across the campus. Access control technology SALTO’s SPACE smart access control technology platform is a fully integrated electronic locking and software solution that brings seamless access to every door in any building in an efficient, safe, secure, and accessible way. It provides an intuitive user-centric software interface that makes it simple and secure to incorporate access control It provides an intuitive user-centric software interface that makes it simple and secure to incorporate access control for any type of building size or user need. It’s powerful and flexible software allows each system operator to set up their own preferences: capabilities and security level, language settings, and others. It also offers several ways to integrate with third-party systems. This includes interfaces and APIs for connecting SALTO smart lock technology to video surveillance, vehicle access, biometrics, time & attendance, escape door control systems, intrusion alarm, and more. Ensuring seamless integration The new database now enables the university to easily manage and secure its access plan across all its facilities from a single point if needed. Their new SALTO SPACE software is designed to be easy and intuitive to use, allowing system administrators to manage doors and user keys in just a few easy steps, and in real-time. Optyma’s Managing Director, Ian Broadbridge, says: “Optyma are proud to continue to help keep our major educational establishments such as LSBU, safe and secure. Our team of skilled engineers and highly trained technical support staff worked closely with them, as our valued partners in the education sector, to ensure seamless integration and a fully functioning system without disruption to the universities essential work.”
Madrid’s South Bus Station is the second-largest long-distance bus station in Europe. It occupies over 350,000 square feet with 65 docks in operation, 300 garage spaces, retail businesses and services, ticket sales, and offices. The building is integrated into the Méndez Álvaro Transportation Interchange, connecting to the network of subways and nearby RENFE trains. It is owned by Madrid Town Hall and for the past 17 years has been managed by Avanza, an ADO company. "Herta facial recognition helps us prevent theft, detected the author when entering the Station, thus preventing crime," says Miguel Ángel Gallego, Security Manager. Incident management Operating 22 hours a day, 365 days a year while handling 20 million people, it is impossible to have no incidents occur. Thus, the security team’s objective was to constantly gather visual evidence of everything happening at the station to identify individuals involved in incidents. The scenario had 3 main challenges: entrances with high backlighting crowded space and multiple cameras to analyse. IP video surveillance system A new control centre and emergency evacuation facilities were created, and docking areas were closed off A makeover of the station began in 2014 and security systems were updated. A new control centre and emergency evacuation facilities were created, and docking areas were closed off to enhance the safety of travellers boarding the buses. As part of these improvements, Segur Group suggested migration in phases to an IP video surveillance system – and the use of cameras from Axis Communications – for the deployment of a facial recognition system running BioSurveillance NEXT software from Herta, specially designed to immediately identify subjects in a multitude of environments and while in motion. The station’s Security Department works in conjunction with state Security Authorities and also relies on the consulting and systems integration services of Segur Group. After discussion with the Director of Security, the group suggested the installation of Herta facial recognition Software (BioSurveillance NEXT) analysing simultaneously nine IP cameras from Axis Communications, which adapt to scenarios with backlight. Fire prevention systems The building features a closed-circuit television system consisting of over 100 fixed cameras As a result of these improvements, the security of the station and its users has increased considerably. The number of incidents have been reduced from five per day to just one per month. In addition, they have streamlined collaboration with Security Authorities and are able to provide them with the information and images needed to complete investigations generated by incidents at the station. Madrid Bus Station South is the busiest bus station in Spain, serving 1,500 domestic destinations and another 500 throughout Europe and Morocco. It is an environment with a massive influx of people that during Holy Week in 2018 alone received more than 40,000 passengers and 1,500 vehicles of all types. The building features a closed-circuit television (CCTV) system consisting of over 100 fixed cameras. In addition, the facility relies on anti-intrusion and fire prevention systems that, along with surveillance services, serve to protect the infrastructure. In addition to relying on personnel who interact among the workers at the station, the facility also receives the support of local and national police. Facial recognition system As a result of the cameras’ image quality due to WDR, the facial recognition system responds precisely With unique capabilities, such as delivering 60 fps, corridor view (9:16), and true colour, security personnel have managed to overcome many of the difficulties they had encountered with other systems. “When I joined the security department 9 years ago, we had 5 incidents per day. This year, we have only had 9 incidents in 7 months. We can say it has helped us a lot,” says Miguel Ángel Gallego, Security Manager. As a result of the cameras’ image quality due to Wide Dynamic Range, the facial recognition system responds precisely even with partial concealment of a face, changing facial expressions, and moderate rotation. Currently, the accuracy level is greater than 99%. The integration of a facial recognition system, collaboration with state Security Authorities and the sharing of database information have resulted in a significant reduction in the number of incidents and an improvement in the overall level of security.
Round table discussion
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyse that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
Surveillance systems: Manufacturers & Suppliers
- Dahua Technology Surveillance systems
- LILIN Surveillance systems
- Hanwha Techwin Surveillance systems
- Bosch Surveillance systems
- Vicon Surveillance systems
- Visionhitech Surveillance systems
- Panasonic Surveillance systems
- Pelco Surveillance systems
- Videotec Surveillance systems
- VIVOTEK Surveillance systems
- Bolide Surveillance systems
- Avigilon Surveillance systems
- Hikvision Surveillance systems
- Axis Communications Surveillance systems
- DRS Surveillance systems
- Arecont Vision Surveillance systems
- LTV Europe Surveillance systems
- UltraView Surveillance systems
- Oncam Surveillance systems
- Geutebruck Surveillance systems
Protecting your data against physical threatsDownload
Six things to look for when adding AI cameras to your operationDownload
Best practices guide: analogue video to cloudDownload
Achieving true situational awareness in operation centres with computer vision & AIDownload