Senstar, a provider of video management systems (VMS) and perimeter intrusion detection systems (PIDS), is pleased to announce its products were recently selected to protect five airports in various locations around the world. These sites join the list of hundreds of civilian and military airports currently using Senstar products. “Airport infrastructure and assets represent a vital economic engine for many cities and countries making them prime targets for vandals, thieves and terrorists...
Innovator of road blocker, bollards and vehicle barrier systems, ATG Access, has promoted Iain Moran to sales and marketing director. Having worked at ATG Access for the past 18 years, Iain is hugely experienced and has helped to shape the company’s success in the UK and internationally, including in Australia and the USA. As part as his new role, Iain will lead a team of eleven to deliver ambitious growth targets, both internationally and in the UK, as the business continues to expand an...
Sofradir and its subsidiary ULIS announce their merger and new company name: Lynred. Lynred was created to respond to a need for an all-inclusive infrared (IR) product offering to the global aerospace, defense, industrial and consumer markets. In response to increasing market requirements, the company has attained a critical mass geared to shortening the time-to-market process of new products. Its US entity remains a subsidiary and has been renamed Lynred USA. Equipment integration support Ly...
UK security fencing manufacturer Jacksons Fencing has expanded its hostile vehicle mitigation (HVM) range by adding the Impakt Defender temporary HVM barrier by Rosehill Security, renowned global provider of engineered rubber perimeter security products and ballistic solutions. Jacksons Fencing now has exclusive rights within the UK for both direct sales of the innovative barrier, as well as hire markets. Impakt Defender HVM barrier Impakt Defender is IWA-14 rated, capable of stopping a 7.2 t...
Percepto, the global market provider for autonomous industrial drone solutions, announces that it will operate and broadcast live overseas autonomous drone missions from its stand (IF2146) at IFSEC International 2019 in London. The company will also launch the next generation of its industrial and enterprise grade drone-in-a-box system solution, including new software improvements and enhanced all-weather base station. This is the first time that Percepto, which last week announced a Round A co...
ATG Access, the innovator of road blockers, bollards and vehicle barrier systems, announces a new partnership with event protection business Crowdguard. As part of the partnership, Crowdguard will be deploying Surface Guard, ATG’s latest pioneering, hostile vehicle mitigation solution, to secure temporary or semi-permanent events across the UK. Designed in response to the recent surge in vehicular attacks across Europe, a Surface Guard barrier can withstand the impact of a 7,200kg vehicle...
Tavcom Training, part of Linx International Group and IFSEC’s education partner, revealed details of the 24 free-to-attend and CPD-accredited education sessions, which will be presented at the Future of Security Theatre (Stand: IF3140), this year at IFSEC International in London. Tavcom Training has compiled an education programme that addresses many of the most talked about trends and issues amongst security practitioners. Topics being presented by Tavcom Training’s expert tutors include how to counteract the menace of cybercrime, the impact of artificial intelligence on electronics security, future-proofing CCTV networks and improving security through integration. Cybersecurity best practices guidance The BSIA will also join Tavcom Training in the theatre to provide cybersecurity best practices guidanceSessions will also be dedicated to the threat of drone attacks and available countermeasures, the hackability of autonomous vehicles, and whether the security sector is ready for 5G, as mobile operators begin switching on UK networks this year. Also, with issues regarding the use of facial recognition currently hitting the headlines and a year on from the introduction of GDPR, the challenge of running effective video surveillance that balances privacy and security will be debated. The BSIA will also join Tavcom Training in the theatre to provide cybersecurity best practices guidance, whilst the SSAIB will deliver an intruder alarm standards update involving PD6662. Learning to address the security issues Tavcom Training is proud to once again be IFSEC’s education partner and Head of Sales Andrew Saywell, comments: “This year, we have put together a packed programme of the most pertinent topics, delivered by world-leading subject matter experts. Over the three-days, we are offering security practitioners an unmissable opportunity to learn how they can address the issues affecting them today, whilst readying them for what lies ahead.” The Future of Security Theatre will open at 10.45am each day of IFSEC International with an introduction to the Certified Technical Security Professional (CTSP) Register, which is operated by Tavcom Training and supported by the BSIA and SSAIB. CTSP is a publicly searchable online Register of those fulfilling technical roles including installation, maintenance and commissioning of technicians/engineers, auditors and consultants. It is an important initiative that is helping to raise standards throughout the sector.
Digitalisation technologies promise great improvements in an enormous variety of logistics processes. German manufacturer Dallmeier is particularly well positioned for the combination of systems from video technology, sensor systems, data management and intelligent use of elements of AI. At transport logistic 2019 in Munich, from June 4-7, 2019, Dallmeier will present a broad portfolio of solutions especially for customers in general cargo logistics at Stand 620, Hall A3. Dallmeier's customer base also includes the very largest logistics corporations. Logistics management systems The German manufacturer Dallmeier can look back on more than 35 years of experience in the development of cameras, recording systems and software. Solutions for customers in the logistics sector represent a primary focus of the company's corporate strategy. The portfolio includes systems for protecting property, entrance and exit areas, claims management, yard management, and a broad range of logistics management systems from real-time localisation of unit goods up to automatic volume calculation. A very recent development is their cooperation with the SAP integrator T.CON A very recent development is their cooperation with the SAP integrator T.CON. The solutions developed jointly by the two companies enable the transmission of a wide variety of valuable business data straight from video systems into SAP ERP systems and address major challenges in the supply chain, HR and compliance area. SAP standard objects To date, the cooperation between Dallmeier and T.CON has produced two solutions for the supply chain area: The ‘Digital Gate’ automates vehicle registration and consignment notes management with a self-service portal running on SAP Fiori. The system recognises vehicle classes, registration numbers, ID numbers and hazardous substance categories. Depending on the requirement, the system can be integrated in yard management and hazardous substance handling functions. The freight data in SAP is supplemented with the optically acquired data using SAP standard objects. Accordingly, it can be integrated directly in SAP TM or LE-TRA (ECC 6.0). The ‘unit good measurement’ solution enable freight items to be measured and weighed automatically by video systems and wireless weighing forks, and the data can be integrated in SAP EWM or WM. Perimeter protection The many advantages of this innovation range from the optimal use of load capacities to plausibility checks and up to coordinated warehouse storage and retrieval strategies. For perimeter protection, Dallmeier combines its patented Panomera® camera technology with a two-tier object classification system using neural networks. This places customers in the position of being able to reduce the number of false alarms to practically zero This places customers in the position of being able to reduce the number of false alarms to practically zero. At the same time, the role of the cameras is changed so not only do they function as a verification system, they can also assume most of the responsibility for incident detection, and consequently fewer systems are needed to guarantee effective perimeter protection. Optimised vehicle control The combination of the Dallmeier video technology and the proprietary, modular process management software with a sensor system offers logistics companies very many advantages. Most significant among these are systems for real-time localisation of unit goods, permanently solving the problem of misplaced or lost packages, which in many medium-size firms happens to between five and ten percent of all items handled every day. With the Dallmeier system, the position of every package is known from the moment it is received until the moment it is shipped. A similar system also enables uninterrupted package tracking for large logistics businesses and privacy-compliant theft investigation among other capabilities. Other solutions on display at the Dallmeier stand are concerned with optimising the efficiency of all kinds of processes, such as improved yard management and optimised vehicle control, e.g., through the display of loading levels, automatic gate assignment or even optimised claims management.
People and vehicle access control specialist Nortech has launched its NanoQuest, a secure, single door self-contained access control system. This proximity card reader/access controller combination is small, powerful and supports up to 500 users. The NanoQuest is a compact standalone proximity card reader and access controller that is easy to install and operate, and houses both the access control electronics and the 125kHz proximity reader. Its slender and elegant compact design suits most architectural and interior design settings, while the robust construction allows it to be used in most working environments. A NanoQuest unit controls access through a single door for up to 500 authorised users and can also be used as a secure method of controlling devices such as intruder alarm panels, lighting and heating. Accessing restricting areas The unit can be armed by an external device and allows door monitoring and alarm output to external alarm devicesThe configuration of its many features and the addition/removal of user cards are made simple with a ‘Master’ card. Special ‘User’ and ‘Auxiliary’ cards can also be added to control auxiliary devices and access restricted areas and free exit input is included. The unit can also output card data in RS232 format when in 'NanoQuest' mode, and in both RS232 and 26-bit Wiegand format when in 'Reader' mode, so that it can be used as a standard card reader as part of a future migration to a larger system. The unit can also be armed by an external device and allows door monitoring and alarm output to external alarm devices. Duplicate administration card option Nortech offers a flexible range of card and fob packs. Cards and fobs can be purchased as necessary, and individually enrolled into the NanoQuest when needed. For installations with many users, card packs are supplied in filing wallets, where each card comes with a duplicate administration/shadow card option. A batch enrolment card is also supplied to enable the enrolment of a whole batch of cards in a single procedure. If a card is lost or stolen, then the corresponding administration card can be used to remove that card from the NanoQuest. Key fobs are also available with a corresponding batch enrolment card and administration cards. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that its Conekt mobile smart phone access control identification solution now integrates advantages that Apple iOS 12 delivers, such as 3-D touch, Widget and Auto-Unlock, into the Conekt Wallet App, version 1.1.0. All new improvements create increased user convenience. “These improved Wallet App features let access control system manufacturers, integrators and dealers provide their customers with the simplest to use mobile access credentials in the market,” explains Scott Lindley, general manager of Farpointe Data. Mobile access control “Our Conekt solution provides the easiest way to distribute mobile credentials with features that include allowing the user to register only once and requires only the handset's phone number. We need no portal accounts or activation features. By removing these and additional information disclosures, we've also addressed privacy concerns that have been slowing adoption of this technology.” The newly improved Widget lets the user make up to three mobile access control credentials as widgets For instance, the newly improved Widget lets the user make up to three mobile access control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as payroll, parking and cafeteria systems, directly from the smartphone's home screen. Biometric defences With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their own combination. For example, a delivery driver may gain entrance to the van parking area while the vice president gets access to the boardroom. Lastly, Auto-Unlock lets a user select a MAC as their favourite. Once designated, a little star appears in the upper right corner of the mobile access credential. As the favourite, it is transmitted immediately whenever the Wallet App is selected. All new Wallet App features are available immediately and will continue to operate securely behind the smart phone's PIN code and biometric defences.
Memoreyes, the developer of a smart, first-of-its-kind outdoor video surveillance system, is looking for qualified integrators to participate in its national dealer program. The company will provide integrators with training that centers on its patent-pending, Megapixel/HD–quality, pan-tilt-zoom camera system with machine learning. Memoreyes’ unique video offering provides an unprecedented set of advanced, almost human-like capabilities. Deter criminal activity “Integrators are a key part of our business plan,” says Memoreyes Founder and CEO John Collings. “Our Entrance System (Model 100) and All Property System (Model 360) go far beyond traditional outdoor cameras and opens up new opportunities for them to improve safety and deter criminal activity at multi-family housing, hospitals, campuses, office complexes, malls, and retail outlets and offer an entirely new category of managed services.” The Memoreyes system can quickly differentiate between authorised individuals and potentially hostile targets Thanks to this new technology, the Memoreyes system can quickly differentiate between authorised individuals and potentially hostile targets. Through machine learning (AI), it also intuitively anticipates potential risks and proactively responds to evolving situations using light, sound, and voice messages. Over time the system learns the habits and trends associated with each camera within a specific setting, enabling it to quickly identify departures from the norm. Strategically positioned cameras Collings, the original designer and founder of Uplink cellular service, says that one of the company’s biggest hurdles was to create a facility-wide WiFi system that would reliably work in an outside environment. With that solved, strategically positioned cameras now work in tandem to provide 360-degree tracking of residents, visitors, and vehicles on the property on an as-need basis. This means that the system can cover large outdoor areas with a handful of cameras as opposed to traditional systems that often require dozens or even hundreds to do the same job. While the primary objective of the Memoreyes Outdoor Video Surveillance System is to deter crime, a second benefit is the documentation of data collected before, during, and after an event has taken place. With its high-definition video, law enforcement can rely on this data for arrest purposes and a conviction in court of law. Concise license plate reading We have adopted comprehensive privacy policies, which protects owners, property managers, and residents" “We don’t rely on standard pixel-following methodology. Our sophisticated software is continually sampling the environment, analysing visual and auditory inputs against known patterns,” explains Memoreyes Co-Founder and CTO David Tattersall. “At the same time, we have adopted comprehensive privacy policies, which protects owners, property managers, and residents alike.” The complete system includes the entry/exit monitoring Entrance System that provides video of all oncoming, passing, and departing vehicles. This includes clear and concise license plate reading, even at night or in bad weather. Beyond the revolutionary technology is the price point. Because the system can cover large outdoor areas with only a handful of cameras, the cost savings can be substantial, as much as 75 percent less than alternative systems. The company offers an affordable leasing program which will save end users money in both the short and long term.
Synesis introduced a high precision AI solution which enables regular CCTV cameras to count the number of available and occupied parking spots in the visible area in real time. Unlike existing analogues, the Smart Parking module based on the bound of deeply trained neural networks and computer vision allows to solve three major problems simultaneously: a real-time monitoring and notification, compatibility with parking lots of any scale and configuration, and minimisation of control resources. Synesis Smart Parking has a great potential for further use and is implemented both by parking space operators (city administrations, shopping and entertainment centres, hotels, parking lots, etc.) and drivers. Using computer vision, the module analyses the location and number of cars in the frame with a specified time span Accurately count parking spaces The solution works as follows: using a special software module, parking space operator allocate parking zones and their maximal capacity. Using computer vision, the module analyses the location and number of cars in the frame with a specified time span - for example, 5 or 600 seconds. The analysis performance by Synesis’ layers of deeply trained neural network and own dataset of multiple vehicle masks excludes scenario in which any other objects – people, tree crowns, etc. – can be falsely indicated as a car. Сomputer vision can accurately count parking spaces even when parking striping layout is covered with snow or when it’s absent at all. The accuracy rate of technology is significantly higher than that of similar solutions, reaching out to 95%. After testing the technology in real conditions at the streets of Minsk, Belarus, the developers’ team plan to continue the neural network training for further accuracy rate improvement. Integration into third-party services The module can be used both to improve the level of urban environmental comfort and safetyThe solution was developed as a part of Synesis’ Kipod Smart City platform. However, the software company does not exclude that in future the module can be integrated into third-party services for transmitting information to online maps, mobile applications, chatbots, etc. As a part of Kipod cloud platform, the module can be used both to improve the level of urban environmental comfort and safety. It allows parking operators and drivers to set special rules for recognising and notifying events such as a car’s unplanned departure from a parking spot, trespassing, suspicious crowding and even emergencies (smoke/fire, shooting sound, broken glass sound, etc.). Such Kipod module is widely used in the United Kingdom for autonomous management of filling station networks. Kipod’s ‘traffic’ module had also been trained to indicate parameters such as vehicle’s type, colour, speed, parking legitimacy. It allows to determinate parking and traffic violations, as well as to investigate traffic accidents as quickly as possible. It also simplifies the search of vehicles with missing or not readable license plates.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
Security Essen 2018, held in Messe Essen, Germany, promised attendees a newly modernised trade show with a simplified layout and more interactive experience. Compared to previous years, halls were reorganised by technology area, with aisles laid out to make more direct pathways for attendees. The fair welcomed 950 exhibitors and more than 36,000 trade visitors from the global security market. Several manufacturers mentioned that footfall had been lighter than expected, but that the show had delivered on its promise to welcome more international visitors, in particular from the Middle East region. Exhibitors also grumbled about higher costs for booth space. Key security industry exhibitors Exhibitors expressed concern that the absence of key players reduced overall foot traffic Exhibitors praised the bigger aisles, which made it easier for visitors to navigate the show. However, some were unsure whether this was due to a better layout or simply because the show was missing key exhibitors. Notably absent were access control provider Dormakaba, security solutions company Honeywell, and surveillance providers Geutebruck and Dallmeier. Exhibitors expressed concern that the absence of key players reduced overall foot traffic. Security Essen hosted a particularly strong access control presence. Halls 2 and 3 were home to companies from across the access control and mechatronics spectrum. Sponsorship by EVVA covered the west entrance. The locking systems manufacturer, which celebrates its 100th anniversary next year, boasted significant floorspace. Exhibitors were pleased with the large access and locking presence, commenting that London-based IFSEC International tends to be dominated by video surveillance providers. EVVA, which celebrates its 100th anniversary next year, boasted significant floorspace Deep learning and artificial intelligence The push toward artificial intelligence (AI) in physical security continues, although the tone at Security Essen seemed to be shifting beyond hype and more toward how the technology can actually add value. For example, Hikvision’s cameras boasted more intelligence and processing power, and the company emphasised faster-paced product cycles. Customers ultimately do not buy AI – they buy benefits and solutions VIVOTEK embraced artificial intelligence as the biggest trend in the industry. The company demonstrated its latest deep learning technology for crowd detection applications. For Dahua, artificial intelligence allows users to easily search metadata in a video, including age and behaviour. Dahua demonstrated its solution for the transportation market, which is able to learn if a bus or train driver is falling asleep at the controls. However, some manufacturers chose not to focus on artificial intelligence. Representatives from Brivo and Eagle Eye Networks highlighted that customers ultimately do not buy AI – they buy benefits and solutions. Historically, video analytics were oversold and underdelivered, and the same could happen to AI if the term is overused in marketing security solutions. VIVOTEK embraced artificial intelligence as the biggest trend in the industry The German market & GDPR While the fair welcomed an increase in international visitors, many stands offered a distinctly German flavour. Exhibitors catered to German customers’ preference for data protection and high levels of privacy. Visitors were welcomed to the show by banners from Genetec, emblazoned with the slogan “Privacy matters… So, remember to forget me.” The video security provider’s stand demonstrated this concept more tangibly, via its Privacy Protector Module. The surveillance software, which is certified with the European Privacy Seal (EuroPriSe), monitors events while automatically pixelating people and vehicles in real time. If an incident occurs, an authorised operator can securely access the unaltered video. Visitors were welcomed to the show by banners from Genetec Other companies also acknowledged issues of privacy and cybersecurity. Hikvision noted that Europe is more regulated, which limits the implementation of the company’s products compared to those used in China. Dahua emphasised that its data for the German market is stored in Frankfurt to meet demands for data protection. IDIS made a point of saying there are no backdoors to their products. The deep learning products are easy to use and 96% accurate, says the company. FLIR has developed a cybersecurity hardening document, and strives to be transparent about cyber issues, including a web landing page where customers can raise any concerns. Vanderbilt is also pushing the cloud as a way forward with its ACT365 cloud-based access and video solution. Users are not intimidated by the cloud anymore since we all use it in our personal lives, says the company. Also on the access control side, EVVA were clear on the security of their AirKey mobile access system, which uses technology based on internet banking, double encryption and high-quality hardware. As well as demonstrating its SAROS thermal camera, FLIR strived for cybersecurity concerns to be addressed by customers Taking a broader view Nedap views security as being about allowing people to focus on their daily lives and work, safe in the knowledge that security is being taken care of. At the show, Nedap launched its new slogan ‘Security for Life’, stating that “true security is when you don’t have to think about it”. Nedap’s global client program represents a long-term commitment to projects. They are having more discussions with clients about risk management through standardisation and centralised policy.Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it Clients remain with Nedap because they keep investing in the platform, constantly updating the code and simplifying it to improve scalability for organisations, says the company. Nedap had one of the few double-decker booths at Security Essen. Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it. HID Global touted their extensive use of partnerships to provide solutions. SeeTec highlighted their move away from products to a more solution-based approach. FLIR, perhaps best known as a thermal camera company, were pushing their solutions approach to markets including intelligent traffic, smart city, video management and PSIMs. Nedap had one of the few double-decker booths at Security Essen Vertical markets in focus As vertical markets go, retail was big, and several players were offering some type of retail solution. Retail – along with banking, finance and transportation – was among Hikvision’s vertical markets of choice. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server SeeTec’s retail solution combines EAS with business intelligence and heat mapping. Dahua’s retail offerings include people counting and emotion detection, which can correlate with weather data, for example. Genetec also showcased a range of retail solutions. Technology improvements announced at Security Essen include FLIR's more robust FB6 series thermal line, Promise Technology's SMARTBOOST technology improved playback performance, and Videotec's cameras with better night performance. The extended 50m range of Optex's intrusion detection laser sensor reduces the need for cameras. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server. The Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart Signs of the U.S. congressional ban There were signs at Security Essen of an impact of the recent U.S. ban on use of Hikvision and Dahua equipment in government installations, although both big Chinese manufacturers maintained a high profile at the German show. For example, the Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart. Chinese camera manufacturer Uniview were keen to stress that they are not owned by Chinese government (neither is Dahua). Uniview’s all-IP camera line offers high resolution, low-light, multisensor and fisheye options, and AI software provides facial recognition, object detection, and fire and smoke detection at the edge. The company aims to increase its global presence with more international branch offerings and international factories.
Wellington is the southernmost capital city in the world and is the centre of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organisation employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centres, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilising a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardise our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilising Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorised entry, to the integration of panic buttons at each site, WCC is utilising Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
Comelit has ensured future residents at Kebbell Homes’ new luxury Aubury Place development can experience smart door entry with the installation of its latest Mini Handsfree monitors. Set in Chiswick, London, Aubury Place is a new gated community of nine four, five and six bedroom homes. Every element of the design is focussed on creating an exceptional first impression, right from the bespoke touch screen entrance panel. Comelit’s Specification team, together with chosen installers Wheeler Electrical, was involved with Kebbell from the initial design process, through the works programme to project completion. Door entry requests Kebbell was instantly impressed with the capability of newly launched Mini Handsfree Wi-Fi Monitors Whilst originally, Comelit’s stylish Icona monitors were considered, Kebbell was instantly impressed with the capability of newly launched Mini Handsfree Wi-Fi Monitors. The new Comelit system would enable new residents to respond to door entry requests from any compatible mobile and benefit from video memory, to record missed calls. Says Andrea Fawell Sales and Marketing Director at Kebbell Homes: “The aim with Aubury Place, as with all our developments, was to offer families spacious home options in prime locations. The ideals of luxury, convenience, comfort and understated elegance were all of paramount importance, and seeing everything from our resident’s point of view, to ensure our homes allow natural flows in tune with daily living.” Mobile connected lifestyle “Every small detail has been carefully considered and this is where Comelit latest options for door entry fitted our requirements. It means our residents can benefit from the latest technology, seamlessly installed, enabling them to instantly respond to door entry requests, with video, from wherever they are. And we can achieve this without compromising on the style, look and feel of this beautiful collection of homes.” Kebbell Homes is well-known for meticulously planning and creating homes of exceptional quality" Ed Wheeler, Director from Wheeler Electrical added: “Kebbell Homes is well-known for meticulously planning and creating homes of exceptional quality. When it came to door entry at Aubury Place, Comelit was the specification of choice and the new Mini Handsfree Monitors exceeded expectation, even over an initially approved specification. It has proven itself more cost effective and a better fit for today’s increasingly mobile connected lifestyle choice.” Powerful security solution Each home at Aubury Place has been fitted with a Mini Handsfree monitor complete with integrated WiFi, operating through Comelit’s innovative VIP system. At the striking gates to the development is Comelit’s premium stainless steel flush mounted 316 Touch entrance Panel, branded to Kebbell Homes. The system enables new residents to grant access through the vehicle gates or adjacent pedestrian gate using the 4.3” internal monitor or a dedicated mobile app. And up to fifteen smart devices can be connected to each and every property’s individual WiFi monitor. Daniel Wood, Southern Sales Manager at Comelit UK concluded: “Comelit worked closely with Kebbell Homes to ensure the door entry system installed, achieved the desired balance between timeless style and latest technology. The combined solution, completed using our very latest app enabled monitors, provides aspiring residents with a powerful security solution and the convenience of audio and visual communication, together with ease of use in everyday life.”
The new vibration-proof Wisenet TRM-410S and TRM-810S NVRs manufactured by Hanwha Techwin are designed to be at the heart of video solutions for transport applications. Wisenet NVRs With a footprint of just 250mm x 210mm and offering two-way audio communication, the two new robust NVRs are EN50155, EN-50121 and EN-61373 certified. This makes them particularly suitable for deployment on buses and trains where they can be used to record video of passenger activity, as well as video of the road or track ahead, in order to provide evidence of any incidents. The new NVRs, which support H.265, H.264 and MJPEG compression, offer 4TB onboard video data storage, with the TRM-810S also offering the option of RAID. PoE/PoE+ support Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch Both of the new Network Video Recorders (NVRs) have a built-in Power over Ethernet (PoE and PoE+) switch, making them ideal for mobile applications as there is no need to install separate power supplies for cameras and monitors. Designed to offer the stable recording of event and location data as well as video, the two new devices complement the sixteen channel TRM-1610S and TRM-1610M NVRs and the three compact Wisenet X mobile H.265 dome cameras which were launched in 2018. Cost-effective video solution “Our two existing sixteen channel NVRs are proving to be popular among train operators who wish to record images captured by a large number of cameras installed in train carriages,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The introduction of the four and eight channel NVRs means that we now have cost-effective solutions for bus, coach and truck type applications.”
Ports of Jersey operate the island’s busy harbours and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harbouring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totalling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doors To drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
Pengsheng Industrial Park is the first investment project by a Chinese private enterprise in Uzbekistan that has been acknowledged and ratified by the governments of the two countries. Located in Uzbekistan's Sirdaryo state, the Pengsheng Industrial Park is the biggest non-energy cooperation project between China and the Central Asian country. At present, there are over 10 workshops covering various fields with a total number of more than 1,500 employees. As a model project of China-Uzbekistan cooperation, it has contributed to a large number of job opportunities and high output value for local economic development. High-end monitoring system The expansion of the production scale of the park brought inconvenience to management and the current simple front-end camera plus back-end storage video surveillance system cannot meet the growing production management and modern monitoring needs any more. Dahua provided the park with a complete, high-end monitoring system that contain over 500 HD cameras, 100 IP camerasDahua provided the park with a customised complete, high-end monitoring system that contain over 500 HD cameras, 100 IP cameras, central management, central storage, third-party contact as well as display and control system all around factory, fence, outdoor and indoor areas to protect the whole park. To better secure the access between the network of video surveillance system, the data is gathered from front-end devices by PON transmission to establish looped network for video surveillance and to ensure reliability. Advanced technology solutions This project is the first general contracted project with great significance in Uzbekistan. Dahua is not only the supplier of the equipment, but also responsible for the whole project life cycle including construction, delivery, system documentation, technical support, operation training and long-term maintenance. The solutions have effectively reduced the difficulty during production process, which greatly improved the management efficiency for customers. In the future, Dahua will continue to provide more advanced technology solutions such as face recognition, personnel and vehicle management IT systems, industrial machine vision, etc. for the Peng Sheng industrial Park.
Delta Scientific, global manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that, on February 14, a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the North Gate of the Naval Air Station - Corpus Christi. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed. Delta MP5000 portable barrier Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers carry a K8 rating "The charred SUV was seen in Navy photographs on top of the MP5000," related Greg Hamm, Delta vice president of sales and marketing. "One photo shows the front of the SUV suspended in the air. Parts of the vehicle are on the ground." Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers carry a K8 rating (M40 ASTM rating), stopping 7.5-ton (6400 Kg) vehicles traveling 40 mph (64 kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed, and the barriers are towed away. Temporary, portable barriers Last year, six of the Associated Press (AP) top-10 football schools stayed one step ahead of terrorists and errant drivers on their campuses by identifying vulnerable areas and securing them within minutes with Delta MP5000 temporary, portable barriers. In many situations, such as at the air base, the temporary barriers provide more flexibilities than a permanent solution. Delta always keeps an inventory of the MP5000s for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. In many cases, they are needed for events that come up quickly, such as politician or celebrity visits and other unexpected incidents.
Round table discussion
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate into business for security companies of various types. But should security companies seek to capitalise on these opportunities? We asked this week’s Expert Panel Roundtable: Is it fair game for manufacturers or marketers to leverage recent violent incidents or terrorist attacks to promote sales of security systems or products?
There's no doubt that the security technology buying decision is a complex one. There are several factors to consider, and no one application will have the same exact needs as another. This is generally where security consultants come in - to help out with the security buying process and help the end-user decide on the best technology to suit their specific needs. But more specifically, what is their exact role in the security technology buying decision? Let's take a look at what our Expert Panel think.