Airbus, an aerospace, defence and security manufacturers and systems providers, attends the World Border Security Congress for the third time. The event will be held at the Sheraton Hotel & Towers in Casablanca (Morocco) from 19 to 21 March 2019 and will be co-hosted by the Moroccan Ministry of Interior and the General Directorate for Migration and Border Protection. In the exhibition hall, the Airbus stand (number 9) will show visitors maritime and border security as well as coastal survei...
Raytheon Company (RTN) and German sensor specialist HENSOLDT, both globally renowned air traffic radar providers, are on path to provide two European customers integrated air surveillance radars that combine HENSOLDT’s next-generation primary airport surveillance radar (ASR-NG) and Raytheon’s Mode S monopulse secondary surveillance radar (Condor Mk 3). World Air Traffic Management Congress 2019 As reported by both companies at World Air Traffic Management (ATM) Congress 2019 in Mad...
Surveon Technology, the enterprise NVR solutions provider, introduced its Milestone certified EonServ 7000 Series, which provides Milestone system integrators the best price-performance option for enterprise surveillance tenders. With Milestone XProtect Corporate VMS, the EonServ7000 Series supports up to 680 channel 2MP cameras with continuous recording and 436 HDDs with high density 4U 60-bay expansion enclosure. It is the perfect surveillance NVR for a wide range of industries, including air...
Las Vegas is a city that bombards you with choices: dozens of glitzy hotels and casinos, a plethora of restaurants and eateries to satisfy any craving and an endless variety of entertainment guaranteed to delight and amuse. With so many options, it’s hard to decide where to spend your time. The same goes for ISC West. Like the city in which it’s being hosted, ISC West 2019 is going to bombard you with more options than ever before. Dozens of new technologies and vendors as well as o...
Videonetics has announced the Industry’s first Artificial Intelligence & Deep Learning powered ‘No Seat Belt Detection’ technology, which aims to detect in real-time those drivers who are not wearing seat belt while driving four-wheeler, consequently violating traffic laws and putting their lives to risk. ‘No Seat Belt Detection’ technology According to World Health Organisation (WHO), about 1.3 million people die in road crashes and 20 - 50 million are injure...
Videalert, a UK supplier of intelligent traffic management and enforcement solutions, is expanding the range of services provided at its recently opened Mobile Enforcement Vehicle (MEV) engineering hub in Trowbridge, Wiltshire. The company has announced the launch of a new refit service for MEVs that will enable councils to cost effectively extend the operational life of existing assets while driving significant increases in productivity and efficiency. ONVIF-compliant HD digital cameras This...
Kinesis vehicle telematics is giving Lincolnshire Security complete visibility of its mobile operation. The recently implemented tracking system gives the Boston-based company round the clock monitoring of mobile staff for resource planning, incident response, customer reporting and health and safety responsibilities. Manned guarding and mobile security Lincolnshire Security services include alarm response and key holding, mobile patrols, static guards and special event security Offering a wide range of guarding and mobile security, Lincolnshire Security services include alarm response and key holding, mobile patrols, static guards and special event security. Integration with fuel cards from UK Fuels, Kinesis also gives Lincolnshire Security additional intelligence including driver performance data and financial transactions with a single platform for all their fleet-related data. Other benefits of Kinesis include live traffic alerts and congestion reports, improved security and asset management and better financial management. Vehicle and asset tracking “We have used vehicle tracking now for some time now,” commented Lee Revell, Account Manager at Lincolnshire Security Ltd. “So, when the time came to review the in-situ system we looked around for alternatives. Kinesis was cost efficient, functionally rich and integrated with our existing fuel cards.” Kinesis is easy to use with live location reports, updated every 30 seconds, displayed against an easy to interpret map screen" “Kinesis is easy to use with live location reports, updated every 30 seconds, displayed against an easy to interpret map screen. It’s also easy to access – available on any Internet connected device,” continued Revell. “The peace of mind provided by Kinesis coupled with the additional evidence-based reporting is critical for staff safety and customer reporting and will help us control costs as we continue to grow the business.” Kinesis integrated fuel cards Kinesis integrated fuel cards will help Lincolnshire Security reduce paperwork associated with credit card or expenses claims and improve the management of fuel consumption with accurate MPG calculations potentially assisting in decreasing costs and environmental emissions. Kinesis can also deliver driver performance data, including speeding, harsh braking and accelerating and idling, which can be used to monitor and improve driver behaviour for additional health and safety monitoring and cost control.
Vorpal Ltd., developer of advanced, highly accurate geolocation solutions, releases a whitepaper in response to the growing global crisis facing airport operations and aviation security from commercial drones flying within controlled airspace. In order to guide effective and timely response efforts to such incursions, this document presents thoughtful analysis of the best technological solutions available for delivering complete drone situational awareness. Operational deployment Vorpal’s proven expertise in this area has resulted in operational deployment of its drone situational awareness solution, VigilAir, by discerning customers globally, and is aimed at the aviation, military, homeland security, critical infrastructures, corrections and UAS traffic management (UTM) markets. This free whitepaper examines the challenges related to drone detection, geolocation and tracking This free whitepaper examines the challenges related to drone detection, geolocation and tracking, for which radar and optical systems have proven insufficient. Instead, it identifies the requisite for a technology capable of identifying and analysing drone-related RF transmissions and waveforms in order to generate a holistic drone aerial situational awareness picture. Provide valuable assistance This includes real-time knowledge of both drone and drone operator location over extremely wide areas of coverage. It also discusses why widespread accessibility of this information to airport security – via mobile devices and web-enabled computers and workstations – is critical to ensuring immediate threat analysis and response initiation. All this must be delivered with near-zero false alarms and with high clarity and precision, without interfering with airport and aviation systems and while complying with relevant regulations. Dr. Nir Raz, Vorpal’s CEO, explains, “Drones are increasingly putting aircraft and passengers at risk, and airport security teams, worldwide, are scrambling to catch up with this security paradigm shift. We hope our whitepaper helps security professionals to clarify the many issues they should be considering when evaluating technology solutions, and demonstrates how Vorpal is uniquely positioned to provide valuable assistance.”
Ping Identity, the provider of Identity Defined Security, announces that it has made several significant updates to PingIntelligence for APIs, its AI-powered API cybersecurity solution. These latest enhancements include an AI-based cloud trial, the ability to detect new types of attacks, support for Splunk environments, and additional integration with API gateways. The lack of visibility into how APIs are consumed is becoming commonplace in today’s enterprise environment. In fact, a recent Ping Identity survey conducted among security and IT professionals reveals that 45% of respondents aren’t confident in their organisation’s ability to detect whether a bad actor is accessing their APIs. Detailed traffic information Fifty-one percent aren't even assured their security team knows about all of the APIs that exist in the organisation Fifty-one percent aren't even assured their security team knows about all of the APIs that exist in the organisation. This data illustrates that the people trusted with securing APIs don’t have enough visibility into their activity to identify abuses and attacks, which has contributed to why recent API attacks were not discovered for months. In this latest product update of PingIntelligence for APIs, three important capabilities make protecting APIs, and the data and applications they expose, even more achievable: PingIntelligence for APIs uses AI and machine learning methods to detect, block and report attacks, as well as deliver detailed traffic information for deep visibility into all API activity—which helps secure APIs and the digital assets they connect. To make it easier for organisations to experience this for themselves, Ping now provides a cloud-based intelligence trial. Blocking anomalous behaviour While traditional enterprise security solutions aren’t designed to protect against attacks targeting the unique vulnerabilities APIs present, PingIntelligence for APIs fills these security gaps by detecting, reporting and blocking anomalous behaviour and attacks on each API under its watch. These include attacks on login systems, data theft, remote application control, API-specific DoS/DDoS attacks, stolen credential attacks and more. This update now extends the ability of PingIntelligence for APIs to stop additional threats, such as data exfiltration over extended periods of time This update now extends the ability of PingIntelligence for APIs to stop additional threats, such as data exfiltration over extended periods of time, content scraping, and slow login attacks, along with delivering improved bot detection. In addition this release supports sending threat information to Splunk environments, thereby enabling teams to consolidate attack information across their full security spectrum. Emerging threats PingIntelligence for APIs enhances the security provided by any API gateway by bringing in AI-based threat detection and blocking to their environments. Adding to its current integrations with PingAccess and Axway AMPLIFY, the Ping solution now integrates with the Apigee Edge platform. “Ping is helping some of the world’s largest organisations protect against an ever-diversifying landscape of cybersecurity threats, including those against API infrastructures. Many of the recent API abuses and attacks took months and years to detect, further reinforcing the need for IT leaders to build API-security focused teams,” shared Bernard Harguindeguy, CTO, Ping Identity. “As evidenced by the new advancements to our PingIntelligence for APIs solution, we’re committed to delivering even more leading-edge technology to protect our customers’ API infrastructures against these emerging threats.”
Videonetics has announced the World’s first AI & Deep Learning based ‘Detection of Use of Cellphone While Driving’, an ultra-smart video-based technology aims to detect in real-time those drivers using cellphones while driving four-wheeler, consequently violating traffic laws and putting their lives to risk. According to World Health Organisation (WHO), road crashes kills 1.25 million people and permanently disable another 50 million every year. At present, India accounts for highest number of road deaths in the world. Amongst various, distracted driving behavior, mobile phone usage has been identified as a primary source of driver distraction as it can induce drivers to take their attention off the road, thus making vehicle occupants more vulnerable to road crashes. AI technology to detect driving violations Powered by patented AI & Deep Learning framework, Detection of Use of Cellphone While Driving technology is trained with real-time video data of over five years Powered by patented AI & Deep Learning framework, Detection of Use of Cellphone While Driving technology is trained with real-time video data of over five years, thereby ensuring highest level of precision in identifying the most dangerous driving risks even in tough environmental conditions, including night time. The cutting-edge solution is well-competent to analyse gesture movement of the driver who is driving any type of four-wheelers including private car, taxi, jeep, lorry truck so on. After capturing the license plate of the violating vehicle with ANPR, the system generates an alert with the video evidence. Additionally, events will be stored for later analysis. Detection of Use of Cellphone while Driving can seamlessly integrate with Integrated e-Challan Management Software to generate challans/e-tickets with details such as violation image, time stamp, date and vehicle number etc. Videonetics Intelligent Traffic Management System The enormous potential of the solution empowers Videonetics Intelligent Traffic Management System (ITMS) suite to enhance real-time traffic monitoring, identify & process traffic offences, eventually it further modernising the traffic management solution and establishing traffic regulation and enforcement across the city. Expressing on the launch, Dr. Tinku Acharya, Fellow IEEE, Founder & MD of Videonetics said, “This is indeed a proud moment to launch World’s first AI & DL based Detection of Use of Cellphone while Driving Solution Technology, that promises to inculcate traffic discipline amongst citizens, increase road safety, build traffic management more robust, curb road accidents, eventually to make country smarter and safe.” Our R&D team is continuously innovating state-of-the-art technologies for challenging environment" “Our R&D team is continuously innovating state-of-the-art technologies for challenging environment with indigenously developed Intellectual Properties. Our intellectual property and trailblasing initiatives have won us several accolades, patents and recognitions from renowned platforms” he further added. ANPR and RLVD traffic violation detection systems With this latest addition, Videonetics expands ITMS portfolio that encompasses Automated Number Plate Recognition (ANPR) system, Red Light Violation Detection (RLVD) system, No Helmet Detection, Triple Riding Detection, Free Left Turn Block Detection, Over Speed Detection, Traffic Congestion Detection, Wrong Parking Detection, No Parking Detection, Smart Dashboard, Data Visualisation to name a few. ITMS is successfully deployed at many cities such as Kolkata, Ranchi, Indore, Bhopal, Bangalore & many more; that has achieved benchmark in replacing tedious manual processes to track, regulate and analyse vehicle movement on roads, and to enforce traffic rules for safety of citizens towards success of national Smart City mission.
Videonetics, World’s first AI & DL powered Unified Video Computing platform development company, has announced that it ranked 107th on the Deloitte Technology Fast 500 Asia Pacific 2018, a ranking of the 500 fastest growing technology companies in the Asia Pacific region. AI-driven security platform firm Commenting on the achievement, Dr. Tinku Acharya, Fellow IEEE, Founder & MD, Videonetics, “It is a prestigious honor to be recognised in Deloitte’s Technology Fast 500 Program. This recognition validates our drive for high performance, innovation, differentiation and global scalability. Videonetics is preparing itself for global expansion and this award will surely help expediting the global expansion plan.” "Making the Deloitte Technology Fast 500 is commendable in today’s highly competitive, fast-changing technology industry," said Toshifumi Kusunoki, DTTL Leader, Deloitte Technology Fast 500 Asia Pacific Program. "We congratulate Videonetics on being one of the 500 fastest growing technology companies in the region." Deloitte Technology Fast 500 list To qualify for the Technology Fast 500, entrants must have had base-year operating revenues of at least US$ 50,000 In addition to ranking on the Deloitte Technology Fast 500, Videonetics ranked eighth position on the Deloitte Technology Fast 50, which is a ranking of the 50 fastest growing technology firms in India Overall, companies that ranked on the Deloitte Technology Fast 500 Asia Pacific 2018 program had an average growth rate of 600 percent—the highest average growth rate since 2008. The Technology Fast 500 list is compiled from the Deloitte Asia Pacific Technology Fast 50 programs, nominations submitted directly to the Technology Fast 500, and public company database research. To qualify for the Technology Fast 500, entrants must have had base-year operating revenues of at least US$ 50,000. Entrants must also be public or private companies headquartered in Asia Pacific and must be a “technology company,” defined as a company that develops or owns proprietary technology that contributes to a significant portion of the company's operating revenues; or manufactures a technology-related product; or devotes a high percentage of effort to the research and development of technology. Using other companies' technology in a unique way does not qualify.
Data Management, Inc., owner of Visitor Pass Solutions, launches with a new name and confirmed focus, further planting their flag in the security industry. The company will now go by the name ‘THRESHOLD,’ a term evocative of their expertise in visitor management systems. With the new tagline, ‘the gateway to stronger security,’ the company emphasises its function as the first line of defence for their clients, as they manage the traffic entering and leaving their clients’ facilities. THRESHOLD will continue to provide cutting-edge visitor management systems to its clients in a variety of industries, including: healthcare, education, corporate, and third-party distributors. Cutting-edge products “We discovered that serving the security markets is both our passion and where we bring our customers the most value,” said owner and CEO, Dan Hincks. “It was time to adopt a name and a brand identity to match that promise.” “Our team could not be more excited about our new global brand identity as we hone our focus on innovating within the security industry,” added THRESHOLD President and COO Brian Gallagher. “We look forward to simplifying companies’ visitor management systems, providing the broadest range of cutting-edge products and technology, and supporting our customers’ security protocols to the fullest extent.”
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organise and regulate. Integrating drones in existing regulatory ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS measures and regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones European c-UAS legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorisation act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating counter-drone legal infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-driven decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis and application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyse data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant access to connected devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyse this data is of imperative importance. Real time data storage availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing stored data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilise surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
ASIS 2017 was off to a strong start on Tuesday, presenting a new wave of innovation to the U.S. security end user community. Many attendees to the Dallas show are well-placed in their companies to influence or direct the purchase of security products and equipment, and exhibitors sought to impress them with a range of new and enhanced options. Moving from integration to unification In general, the ASIS show has a quieter, less frantic feel than the spring ISC West show in Las Vegas. Conversations are more "intimate" than those common at integrator-focused shows. "End users are very honest about the challenges they are facing," observed Derek Arcuri, Product Marketing Manager of Genetec. "The challenges we are hearing are a symptom of similar problems we hear in conversations with other users. It's more than just technology, it's planning out the strategy and showing them how they can slowly inch toward their vision by investing in a platform that is open and unified." Unification is a buzzword you hear more and more often in the security industry, and unification means something beyond integration. In the case of Genetec, unification summarises a strategy that leverages an identical technology approach underlying every facet of a broad-based solution, including video, access control and other technologies. Arcuri says customers should commit to a unified platform and then use integration to accommodate existing installed products and enable a gradual transition to a systemwide unified system as costs allow. Among Genetec's current and future offerings highlighted at ASIS 2017 are vertical-focused product lines such as Airport Sense, Retail Sense and Traffic Sense, which offer specific capabilities and are all built on the Genetec unified platform. Johnson Controls accelerates product development A year after the headline-making acquisition of Tyco, Johnson Controls kicked off the first day of the ASIS 2017 exhibition with a press event revisiting the big story one year later. Johnson Controls says they are making significant investments in engineering to ensure accelerated introduction of products in the video, access control and intrusion categories – around 100 engineers have been added to the product development team, a 15 percent increase. A press conference by Johnson Controls kicked off the ASIS 2017 exhibition, about a year after their headline-making acquisition of Tyco "As we have come together, all the positives have been realised," said Brian Young, Johnson Controls Senior Vice President of Global Sales and Marketing. The complementary nature of the two businesses -- a prime motivator promoted when the acquisition was announced last year -- has been realised in many ways, including how the technology platforms work together, and even the sales cycles (Johnson Controls typically has a longer sales cycle, while Tyco's business moves faster.) "We are starting to deliver real value," says David Grinstead, Global Vice President and General Manager of Security Products. Johnson Controls executives estimate the overlap of the two businesses is about 15 percent, which translates into 85 percent of new opportunity for crossover business to enhance both operations. March Networks transitions to video software Companies are changing as the market changes. March Networks is transitioning from being a hardware provider to developing software reporting tools that can increase the value of video and data by correlating the two. "Video is becoming more of an operational feature that every institution wants to have. We are more of an information company than ever, focused on software and services," says Peter Strom, President and Chief Executive Officer. "We are seeing how video can play a role beyond security." For example, March Networks' new Searchlight for QSR (quick service restaurants) combines video with various data points, such as those provided by point of sale (POS) systems, to provide a "dashboard" to help a business owner track his business (with data tied into video to enhance the value). Video is stored locally, and data is stored in the cloud; the service is provided for a monthly fee. The company has similar data-driven products in other verticals: Searchlight for Retail and Searchlight for Banking, both providing a "360-degree view" of a business. March Networks has historically emphasised the importance of cybersecurity - driven by demands of its financial and retail verticals Cybersecurity in the video surveillance market March Networks also has historically emphasised the importance of cybersecurity -- driven by demands of the financial and retail verticals they play in. Their cybersecurity approach predates by a decade or more the current concerns in the market, says Strom. March Networks is among the companies that see video taking a new, higher profile among customers -- and not just for security applications. Two verticals that March Networks is active in -- financial and retail -- have been especially impacted by the transition to broader use of video in a company. At ASIS 2017, March Networks is also announcing integration of Patriot One Technologies' covert weapons detection solution with video. The cognitive microwave radar technology detects concealed handguns and other types of weapon, and sends real-time alerts to security. The system is "trained" and continues to "learn" after deployment, getting better and smarter at detecting hidden weapons with each screening. Arecont Vision emphasises ease of use Arecont Vision continues on its theme of making it easier for integrators to install products. They have extended "no-touch" remote setup to the MegaDome G3 Series. A vari-focal motorised lens can be set up remotely in any position with pan, tilt, focus and zoom. The remote setup avoids a technician having to stand on a ladder to adjust and fine-tune the image, which takes extra time and can be hazardous. The MegaVideo 4K 8.3 megapixel camera also has multiple motorised lens options for remote setup. Arecont Vision plans to carry the approach through its entire product line over time, expanding ease of installation to an ever-broadening array of products. This is just a sampling of what I saw and heard on the first day of ASIS, with plenty more still to come. Read SourceSecurity.com's Day 2 coverage here
Apstec Systems announces that its Human Security Radar (HSR), the first fully automatic real-time mass people screening solution, has been selected by Esenboga Airport, Ankara, to significantly boost security in land side areas. Chosen following a rigorous selection process, including a pilot installation, HSR will be installed at the terminal entrances as part of ongoing security enhancement measures by the Turkish State Airports Authority. It will enable people screening without slowing down the flow of traffic, with each system capable of scanning up to 10,000 individuals per hour. The technology was deployed in partnership with local distributer AKBA. Cost-effective solution The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism. Since these events there has been global interest in securing the land side of airports, but traditional aviation style security checkpoints or manual searches, which scan one individual at a time, are not suited to purpose and result in large queues of passengers, which are vulnerable to attack in their own right. With existing approaches to security screening providing impractical, inconvenient and expensive to operate, terminals have remained susceptible to attack, or are subject to intrusive and disruptive security screening regimes. HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in such high footfall scenarios. Enhanced security measures The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. The walkthrough system uniquely combines unparalleled high throughput, speed and accuracy, simultaneously screening multiple subjects in real-time for threats, without the need for an operator to inspect suspect materials. With 40,000 passengers traveling through Esenboga Airport every day, the deployment of HSR will be instrumental in improving security for millions of people. Through deploying HSR as part of its commitment to terminal safety and enhanced security measures" “HSR constitutes a major breakthrough in the way airports protect the land side of terminals,” commented Osman Aksoy & Sirzat Balin,Co-Founders, AKBA. “Through deploying HSR as part of its commitment to terminal safety and enhanced security measures, the Turkish Airport Authority has taken a major step to prevent the reoccurrence of terrorist attacks.” Mass transport hubs Esenboga Airport’s uptake of HSR is the latest major deployment of the technology, which is currently utilised by some of the world’s largest airports, as well as sports stadiums, entertainment venues, mass transport hubs and networks, places of worship, hotels and high-end retail and entertainment centres. “HSR is proven to dramatically improve safety in crowded public spaces, and enables venue owners to close a critical security capability gap,” added Gregory Labzovsky, CEO, Apstec. “We’re therefore delighted to be working with Esenboga Airport to enhance safety for millions of travellers. AKBA, our distributor in Turkey, were instrumental in helping the Turkish Authorities understand the potential of HSR.”
Stadshavens Medemblik operates five busy ports in the Netherlands – at Pekelharinghaven, Voorhaven, Middenhaven, Westerhaven and Overlekerkanaal – and it also has two bridges under its control, as well as the thriving Westerhaven lock. The company has grown by around 30% each year since 2015 and the efficient, friendly welcome provided by the operations team is an important factor in this success. Under the leadership of Wijnand Baerken, Stadshavens Medemblik wanted to plan for further growth and it identified improved video surveillance capability as a key requirement. Van der Laan was confident in recommending IDIS IP video technology, which is flexible and robust enough for all conditions, and which would allow the old analogue infrastructure to be adapted. Multi-standard infrastructure Without the need for extended cabling or civil works and associated planning permission the installation was quick and efficient A complete observation plan was drawn up, with Van der Laan and IDIS collaborating closely, identifying the best locations for cameras based on viewing angles, lighting conditions and the control features required. Much of the existing cabling has been retained, thanks to the IDIS Center multi-standard infrastructure, and the system has been extended to new areas with both wireless and fibre links. Without the need for extended cabling or civil works and associated planning permission the installation was quick and efficient. The old analogue video system already installed at Stadshavens Medemblik was outdated, with the cameras no longer able to cope with the challenging waterside environment. In poor-visibility conditions - including rain, fog, and glare - images were unusable. The system was also inflexible, making it hard to adjust or add cameras. Enabling greater efficiency Another major challenge was to improve observation of water and road traffic at Medemblik, with a bridge located above the lock preventing a direct view from the port office. To tackle these problems, the trusted technology systems provider Van der Laan was asked to design and install a solution using the best available technology. The new solution is not just preventing crime but enabling greater efficiency and control across all the port’s operations Cameras including award-winning IDIS PTZs have been placed at all strategic locations, on the bridges, the lock, the ports and importantly at the entrance from the IJsselmeer. All integrated and controlled through intuitive IDIS Center video management software, the new solution is not just preventing crime but enabling greater efficiency and control across all the port’s operations. Competitive systems "From the harbour office operators utilising IDIS surveillance can immediately ascertain the size of boats as they enter the port, check where there is mooring place and send the skippers directly to the right location. The IDIS mobile app is proving particularly convenient as it allows us to see exactly what’s happening day and night and enable the operations team to offer immediate assistance if needed." Stadshavens Medemblik, Wijnand Baerken, Director. "The IDIS platform is perfect for combining various IP and analogue systems. Moreover, it is more secure than competitive systems. IDIS systems use proprietary protocols and the way in which data is processed makes them very difficult to hack." Van der Laan Techniek. Dennis Selbach, Account Manager. Looking to the future, plans are being developed to enlarge the port significantly, and Van der Laan and IDIS look certain to be involved.
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximise opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical key system The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-effective package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled automatic locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
Redcar and Cleveland Borough Council has taken delivery of a new CCTV enforcement vehicle from Videalert, one of the UK’s leading suppliers of intelligent traffic enforcement and management solutions. The new Mobile Enforcement Vehicle (MEV) has an unattended operating capability and will be used to enforce school locations where illegal parking on the yellow ‘keep clears’ has been identified as putting children’s lives in danger. School and students’ safety Councillor Bob Norton, Redcar & Cleveland Borough Council’s Cabinet Member for Economic Growth & Highways, said: “We know that measures to tackle parking are often controversial and seen by some as a ‘cash grab’ but that is simply not the case. This is all about safety! Three accidents involving school children in one year is three too many and we won’t allow this continuing risk to the safety of children in our schools. Our message is clear: Don’t want to get fined? Then don’t put people at risk when you park.” Videalert ANPR cameras Videalert has supplied a white Renault Kadjar equipped with two roof-mounted ANPR cameras and two colour cameras to capture contextual video evidence Videalert has supplied a white Renault Kadjar equipped with two roof-mounted ANPR cameras and two colour cameras to capture contextual video evidence. Used in conjunction with the latest video analytics, the system delivers the highest productivity at the lowest operating cost even in the highest density traffic environments. The on-board systems are controlled by the operator manning the vehicle using a dashboard-mounted touchscreen. All contravention evidence data is transferred to Videalert’s Digital Video Platform in the parking office at the end of each shift. The Videalert system automates the construction of video evidence packs which are reviewed by trained council operatives prior to sending confirmed offences to the back-office processing system for the issuance of PCNs. Mobile Enforcement Vehicle (MEV) Redcar and Cleveland’s new mobile enforcement vehicle is also equipped with a complete suite of Videalert software applications enabling it to be used for a wide range of traffic and parking management applications in the future as required. “In recent benchmarking trials, our MEVs equipped with four cameras have proved to deliver industry-leading capture rates whilst consistently outperforming vehicles from other suppliers. This new generation of multi-purpose MEVs will give councils greater flexibility in the enforcement of a wide range of moving traffic and parking contraventions,” added Tim Daniels, Sales and Marketing Director at Videalert.
Further augmenting its global surveillance network, VIVOTEK, the IP surveillance provider, has deployed its video surveillance systems across multiple retail locations of the television, internet, and telephony service provider, SBB in Serbia and Montenegro. The latest deployment has been conducted via VIVOTEK’s Serbian channel partner Netiks, and has equipped SBB with advanced video analytics capabilities and proactive surveillance. About 50 of VIVOTEK’s FD8166A ultra-mini fixed dome network cameras, featuring sophisticated design and built-in IEEE 802.3af compliant PoE technology, are a part of the current deployment and will closely monitor more than 450,000 visitors for various use cases, including security and business intelligence. Ultra-crisp and clear images The network cameras are set up alongside an easy-to-use VAST 2 software Leveraging their CMOS sensors, these network cameras can capture 2-megapixel images with 1920x1080 resolution at 30 FPS (frames per second), and deliver ultra-crisp and clear images even in extremely bright and dark environments through WDR enhancement and 3D Noise Reduction. The all-weather cameras can also aptly function in adverse weather conditions using their defogging capabilities. The network cameras are set up alongside an easy-to-use VAST 2 software, which also is VIVOTEK’s top-of-the-line IP Video Management Software (VMS), to make everything work in perfect unison. But all of this merely serves as the groundwork for the specialised, people-counting solution that delivers valuable bi-directional data comprising critical insights in real-time to SBB. Cost-effective cameras These insights include number of incoming customers, length of stays, peak times, and frequency of customer visits, which will help SBB in deriving significant value through Business Intelligence and a more optimal human resource management. Also, counting and monitoring data is directly computed by VIVOTEK systems, eliminating the need of a dedicated computer for the process. The solution has achieved 98 percent accuracy in counting people, despite the challenging areas that it has to cover Till date, the solution has achieved 98 percent accuracy in counting people, despite the challenging areas that it has to cover. The system stores the data for as long as 90 days and issues push notifications to the designated authority or relevant operators. In order to ensure uninterrupted access to information on security and flow, the cost-effective cameras also support H.264 compression. Traffic monitoring projects This significantly reduces data size and minimises post-deployment costs by minimising network bandwidth requirement and enabling real-time monitoring of all camera systems across the company’s retail scene. VIVOTEK has successfully deployed innumerable global video surveillance solutions including UNESCO-recognized National Library of Latvia, traffic monitoring projects in India, Warplane Heritage Museum in Canada, and one of the world’s seven wonders, the Ancient City of Jordan, now also adding SBB to its globally burgeoning video surveillance network.
Ulaanbaatar is the capital and the largest city of Mongolia, with a population of over 1.3 million, which is almost half of the country's total population. Over the past decade, the number of vehicles in Ulaanbaatar has risen by more than 300,000. As the political and cultural center of Mongolia, the increasing number of inhabitants and vehicles within the city has caused a series of social, environmental, and transportation problems. Dahua’s sophisticated ITS (Intelligent Transportation System) solution has integrated advanced software and hardware including sensors, information and data processing and physical electronics and communication technologies to assist the transportation department of Ulaanbaatar, in enhancing the safety and efficiency of its transportation system. Intelligent Transportation System In recent years, the government of Ulaanbaatar has prioritised the improvement of traffic management and has identified the need of a cost-effective solution towards speeding, traffic light violations and other road safety related issues, to create a more secure environment for citizens. Due to the high-latitude geography of the city, this project is particularly demanding on the monitoring equipment withstanding harsh environments. Based on advanced intelligent algorithms, Dahua has provided the city with its cutting-edge ITS solution consisting of the ANPR (Automatic Number Plate Recognition) system for 28 main roads, the E-police system for 8 junctions, 2 mobile speed measurement systems as well as 15 high spot PTZ surveillance units. The project took only three months from the initial analysis of the client’s demands and solution design to, the final delivery, overcoming various tough issues along the way. The Dahua team worked in collaboration with a partner to customise a Mongolian license plate recognition algorithm ANPR system As there are no current systems for license plate recognition in Mongolia, the Dahua team worked in collaboration with a partner to customise a Mongolian license plate recognition algorithm. This was then integrated into Dahua’s traffic cameras, achieving a reliable recognition rate, much to the satisfaction of the client. Dahua’s traffic cameras installed at the significant main roads of the city, are able to function between a temperature of - 40 ℃ ~ + 80 ℃ and a 10%~90% humidity environment. The cameras will actively monitor and inspect each suspicious vehicle, and automatically capture their license plates in real time, sending out an automatic alert when blacklisted vehicles pass by. E-police monitoring system The monitoring equipment set up at the eight junctions can help the Ulaanbaatar transportation authorities in making quick responses to traffic accidents that are caused by running red lights. When a violation occurs, the Dahua all-in-one capture camera takes a series of images of the vehicle’s license plate number, along with the status of the traffic signal and an aerial image of the scene as evidence. Afterwards, the DSS management and storage platform collects the data from each camera and distributes it to operators for further processing. The mobile speed measuring system detects vehicles that surpass the speed limit in all weather conditions Mobile speed measuring system The mobile speed measuring system detects vehicles that surpass the speed limit in all weather conditions. The system features an all-in-one design, making it easy to use and install at different locations at a moment’s notice. This portability allows traffic police to move the system to different places whenever necessary. It consists of an 8MP CCD camera with a multi-target tracking radar, allowing for an accurate instant speed measurement of each passing vehicle and crystal-clear imaging. The IR flash lamp also ensures excellent imaging capabilities even during the dark of night. Technical security training To better serve the client, Dahua’s team has provided the operators of the local transportation department, with relevant technical training and demonstrated to them, the installation and deployment of devices. Additionally, all three systems are unified on a single platform within the control center, further enabling the end user to more efficiently monitor and manage road safety. Dahua’s ITS solution facilitates road safety and keeps the traffic flowing smoothly, raising the safety awareness of drivers, resulting in a more pleasant journey for drivers. Advanced technologies such as LPR and fuzzy search, actively reduces manpower demands on the police force, while increasing the efficiency of current enforcement. Furthermore, Dahua’s solution has assisted the government of Ulaanbaatar to finance a sustainable, growing, and well-maintained system of security and safety.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”