COVID-19 has sparked a flurry of criminal activity across the country, with a particular increase in petty crimes perpetrated against UK healthcare facilities. Bike theft, slashed ambulance tyres and stolen oxygen canisters are just some of the misdemeanours which have significantly grown in frequency since the coronavirus lockdown began in March 2020. Given the constant, essential work carried out by health services, it’s clear the utmost must be done to protect its physical assets...
Swarm Intelligence (SI) and bio-inspired computing have attracted great interest in almost every area of science and engineering, including robotics, over the last two decades. Being an innovative manufacturer of autonomous mobile robots (AMRs), AGILOX directs most of its effort into developing one of the most unique robotic material handling features on the market - completely decentralised autonomy. AGILOX Intelligent Guided Vehicles (IGVs) are completely independent, self-controlled, and int...
As part of the modernisation of all NATO's IFF identification systems (IFF = Identification-friend-or-foe) to the new "Mode 5" standard, sensor solution provider HENSOLDT is equipping the Air Force's 90 Tornado fighter aircraft with its Mode 5-capable LTR 400 transponder. An initial order for the delivery of 42 devices worth several million euros has been placed by Panavia Aircraft GmbH - the industrial consortium for the development of the Tornado; the conversion of over one hundred further pl...
Nedap adds the multiple technology reader NVITE to their long-range identification product portfolio, for contactless driver identification. As a specialist in systems for long-range identification, Nedap is offering a wide range of solutions to identify vehicles and drivers, without delaying them. NVITE supports reading a wide range of credential technologies, such as Smartcards, Proximity cards and QR codes. The built-in Bluetooth Low Energy (BLE) and Near Field Communication (NFC) modules en...
Life has just become much easier for control room operators and security personnel with the launch of 5 new Wisenet P ultra-high definition 4K AI cameras. In addition to capturing superb quality images, the new feature rich cameras from the Hanwha Techwin Premium range are equipped with deep learning video analytics which offer a high level of detection accuracy, whilst minimising false alarms. The license-free deep learning video analytics simultaneously detects and classifies various object t...
Global security company Hanwha Techwin announces the launch of its new Wisenet P series AI cameras, beginning a new era of smarter video surveillance. With ‘AI technology’ establishing an indispensable role in the video surveillance industry, Hanwha Techwin presented its newest core lineup of state-of-the-art AI solutions including Wisenet P series AI cameras, which can be combined with Wisenet SSM and Wisenet Retail Insight v2.0, to complete the perfect security package. Reducing...
Nearly 50 security experts will walk through the latest updates and challenges of four different key topics around cybersecurity: how to deploy 5G securely, the Cybersecurity Act, insights into the new Smart Secure Platform and advanced cryptography. High level executives from global telco operators, vendors, academia, security organisations such as ENISA or the National Cyber Security Centre, other standards bodies such as GSMA or 3GPP, to name a few, will unfold their presentations, ready to answer the questions as the event goes on. Connected autonomous vehicles 5G deployment will investigate how to securely switch from a 4G or non-standalone architecture to a standalone architecture, giving recommendations for mobile operators on how to implement 5G networks. 5G security for verticals will address other sectors including campuses, factories, the medical sector or connected autonomous vehicles. Other speakers will give an update on 5G security evolution, where ETSI stands now, ongoing developments and will outline security challenges and regulatory aspects. Europe issued the Cybersecurity Act, ENISA and the European Commission will provide an update on the Act Europe issued the Cybersecurity Act, ENISA and the European Commission will provide an update on the Act. They will also introduce the future European Standard developed by ETSI on security for IoT consumer devices and its certification schemes which should help consumers make security-conscious purchasing decisions. 5G network certification will provide a status of the policy and industry actions to enable effective security and trust in 5G networks. Developing new security platform As the SIM card was standardised by ETSI, it has gone through various evolutions leading to a new Smart Secure Platform developed in the same Technical Committee. Its experts will set the scene and explain the reasons for developing this new security platform, its requirements and impact on the ecosystem as well as the current state of testing and why certification is needed. They will go into deeper technical details addressing the upcoming standards. With an undoubtedly pervasive connectivity, advanced cryptography is of essence to protect the billions of data going around the planet every day. Presentations on this topic will include quantum-safe cryptography, the technical evolution of the TETRA standard with the first performance results of Latte, or fully homomorphic encryption. Industry applications and use cases for advanced cryptography will represent the practical side of this session.
Automatic Systems, an industry renowned manufacturer of pedestrian and vehicle entrance control access systems, is pleased to bring to market its Temperature Monitoring Integrated Solutions. This new introduction comes in proactive response to the COVID-19 pandemic and offers the safeguarding capabilities that fighting the virus demand. These newly developed monitoring solutions, developed for the Automatic Systems pedestrian products, detect if an individual seeking access is wearing a face mask and also verifies their body temperature while in motion. Equipped with the COVID-19 software predisposition option, Automatic Systems’ pedestrian gates deliver an automated process to help preserve social distances and ensure that public health requirements are respected. Access is granted only to authorised people when used in conjunction with the facility’s access control system. Body temperature detection When indicated for pre-identification authorisation, however, the system can monitor for mask and body temperature detection without the need for credentials. Access will be granted if these COVID-19 requirements are met. The integrated solutions can provide a visual display of the access result as well as audible and/or visual alarms when needed. Another key benefit that is especially valuable in these COVID-19 times is the ability to people count. Another key benefit that is especially valuable in these COVID-19 times is the ability to people count This allows facility management to control the number of people who pass through during any given time period. This Software management upgrade also offers Ethernet connectivity to Automatic Systems’ SmartTouch supervision system and an optional HDMI output device to help automatically control the maximum quantity of people in a designated area. This real time information can easily be viewed and shared on dedicated screens at the entrance of the area. Access control equipment “The COVID-19 pandemic has presented the need for new and unprecedented safety measures. It is the responsibility of leading manufacturers of access control equipment such as Automatic Systems to offer fast and effective solutions to help provide maximum protection for all individuals,” says David Enderle, Automatic Systems’ VP of Sales. These integrated monitoring solutions are compatible with most of Automatic Systems’ pedestrian entrance control products and turnstiles, all of which are UL2593 certified for user safety. Compatible models include but are not limited to: TriLane TL1, SlimLane, SlimLane EP and the new SlimLite. There is also a stand-alone pedestal model to retrofit existing Automatic Systems installations. The stand-alone pedestal can also be used for RevLock and ClearLock installations.
ELATEC, the manufacturers of innovative multi-frequency RFID readers, will exhibit at the Embedded World 2020 trade show being held in Nuremberg on February 25–27 (Hall 3, Booth 239). ELATEC will be presenting its universal RFID readers as well as identification solutions that are based on BLE and NFC. Special focus at the trade show presentation: services and tools for developing software and applications for ELATEC products. Radio-based identification RFID is a necessary component of our customers’ projects, but not part of their core business. “We aim to make the integration of radio-based identification as simple as possible,” explains Klaus Nagel, Executive VP Global Sales at ELATEC. With our RFID readers the manufacturer remains flexible and is prepared for future changes" “No matter which technology and RFID standard the customer selects – with our RFID readers the manufacturer remains flexible and is prepared for future changes. With our toolset, we also make software implementation extremely convenient and offer consistently competent development support and comprehensive service.” Visitors to ELATEC’s booth are invited to benefit from the company's pre-sales consulting service with a needs analysis and individual advice regarding configuration decisions. Maintenance of installed readers The modular ELATEC software package supports developers beyond the configuration and extends to the maintenance of installed readers. At its core is the AppBlaster tool as the configuration center with functions for reading cards, modifying formats, defining output formats (decimal/hexadecimal), generating output logs, selecting supported transponders, memory management, and user feedback. The reader firmware can be processed as an image or adapted via configuration cards. Since more and more smartphones are being used as identification tokens to replace or supplement classic transponders, ELATEC also offers broad support in the implementation of NFC and BLE solutions. In addition, some first projects for electric vehicle charging stations have been implemented and certified by Apple as a value-added-service. This new add-on functionality enriches the broad spectrum of Elatec reader capabilities and simplifies everyday authentication for the user.
Nedap Identification Systems is excited to share the upcoming OSDP upgrade within Nedap’s long-range RFID reader portfolio for automatic vehicle identification. The portfolio will be upgraded and compatible with V.2.1.7 of the Open Supervised Device Protocol (OSDP) standard. This upgrade supports the interoperability of the company’s reader portfolio with a growing number of access control and security products. Over the last few years, an increasing number of access control panel manufacturers is supporting OSDP technology and this upgrade enables seamless integration supported by a highly secured communication standard. Nedap will make OSDP V2.1.7 available for both its TRANSIT and uPASS long-range RFID product line. Automatic Vehicle Identification specialist Nedap is specialised in advanced solutions for Automatic Vehicle Identification for over the past decades Open Supervised Device Protocol (OSDP) standard OSDP has been developed by the Security Industry Association (SIA). According to the SIA, OSDP offers high security and advanced functionalities. The protocol enables bi-directional and encrypted communication based on Secure Channel Protocol (SCP). In addition, for example, OSDP enables monitoring wiring to protect against attack threats. Due to the fact that OSDP is offering secure and bi-directional communication between the reader and third party controller platform, the OSDP upgrade enables security professionals to simplify secured vehicle access. Nedap is specialised in advanced solutions for Automatic Vehicle Identification for over the past decades. A unique portfolio is developed by Nedap full with high performance long-range RFID and Licence Plate Recognition systems. Vehicle access control Nedap has been at the forefront of simplifying secure vehicle access for decades, while keeping the high accuracy in mind. Security and Parking professionals have been able to improve their operations by benefitting from the latest automatic vehicle identification solutions, by choosing Nedap technology. Nedap Identification Systems encourages technical specialists to order a demo kit and validate OSDP in vehicle access control applications. For the security professionals OSDP compliancy offers a great opportunity to talk to the technician’s customer base about the relevancy of OSDP in security and access control. In case of any queries, Nedap also encourages to make contact with their team. To give the users a complete picture of the opportunities of their updated RFID reader portfolio, Nedap Identification Systems organises a webinar on the 14th of May, 10.00 AM (CEST). Long-range RFID portfolio Within this webinar, Ido Wentink (Proposition Manager) and Hans Rappard (Product Specialist), will present in 30 minutes all ins and outs about Nedap’s OSDP upgraded long-range RFID portfolio. Readers who would like to attend the webinar can register using the link given on the company’s official website.
With the introduction of the AIDA Traffic Management platform, LILIN has transformed Intelligent Traffic Systems from expensive, often inaccurate, and inflexible computer-vision solutions into a new simplified platform with embedded Artificial Intelligence (AI) that learns, adapts and detects every detail of street-level vehicle activity. Engineered for seamless integration into LILIN Windows®-based VMS products including Navigator Control Center, Navigator Corporate, and Navigator Enterprise, AIDA Traffic Management installs on the edge and uses metadata to bring real-time traffic data to organisations and municipalities. Enforcing parking and traffic violations AIDA is purpose-built for a flexible range of ITS applications, making each user-selected function completely automated and cost-efficient. For example, AIDA can extract data from vehicles traveling on multi-lane highways or urban streets, allowing municipalities to better enforce parking and traffic violations, recover stolen cars, or assist law enforcement in Amber Alerts. AIDA can recognise 12 licence plates per second on vehicles traveling up to 125 miles per hour AIDA can recognise 12 license plates per second on vehicles travelling up to 125 miles per hour, casting an astonishingly wide net. Police can store and later access this data, enabling investigators to zero in on a suspect's whereabouts and behavioural patterns. Besides monitoring cars, trucks and motorcycles, AIDA can detect pedestrians loitering or entering restricted areas. Capturing vital operational data In a parking lot, AIDA can compare licence plate data to pre-defined lists of allowed or excluded vehicles before taking an appropriate action, such as opening a gate or generating an alert if an unauthorised vehicle enters an area as a value-added service. It can also locate available parking slots and broadcast this information to incoming cars. In addition to its security role, AIDA can capture vital operational data about parking infrastructures, including the number of cars served by time, day, and length of stay. This data can then be applied to help optimise a staffing schedule and maximise the profitability of a parking lot's rate structure. AIDA removes the hassles of traditional computer vision techniques that require extensive, CPU-draining image processing. In contrast, AIDA software incorporates an AI engine that is instructed to learn what to look for and is able to run multiple models on distributed AI CPU, GPU, and VPUs.
Managing dozens or hundreds of expensive mobile assets is a tough job. Fortunately, today's fleet managers have plenty of software and hardware options to make it easier, from sophisticated in vehicle telematics systems to back-end scheduling and logistics software. These tools help fleet managers control costs, reduce risks and improve driver accountability. All of these benefits depend on the ability to correctly identify individual drivers or users and control who has access to vehicles, equipment or systems. Municipal transportation systems The fleet management market encompasses not only commercial trucking fleets but also government and public utility fleets, car share/bike share services, municipal transportation systems, material handling equipment for warehouses, and specialty markets such as airport service vehicles. All of these market segments can benefit from easy, effective user authentication and access control systems. User authentication is the ability to correctly identify an individual user and match their information to the vehicle, equipment or systems they are using. Access control is the ability to ensure that only authorised users are able to gain access to an asset or system. Protecting valuable physical assets User authentication and access control solutions help fleet managers protect valuable physical assets User authentication and access control solutions help fleet managers protect valuable physical assets, monitor driver safety and productivity, and streamline compliance activities. At their simplest, they ensure that the right driver is accessing the right vehicle or equipment. But they can also link driver identities to scheduling, time and-attendance, behavioural management, and compliance systems. For many applications, the simplest solution for user authentication and access control starts with something most company employees already carry: an ID badge equipped with a radio frequency identification (RFID) tag. RFID systems are easier to manage and more secure than physical keys or password/PIN systems. Physical key management RFID-enabled user authentication and access control systems can help fleet managers improve security and enable tracking for a broad range of devices and software systems. RFID readers enable drivers to unlock a vehicle with their ID badge rather than a physical key. The ignition key can simply be stored in the glove compartment. This improves security and significantly reduces administrative time and headaches associated with physical key management. Doors can be set to unlock only for the driver assigned to the vehicle that day or to managers with override authorisation. Have a last minute switch in drivers of vehicles due to a driver's illness or a mechanical breakdown? No problem—access rights can be switched instantly from a central software system, with no need to track down drivers to swap physical keys. These systems are ideal for environments where vehicles or equipment are shared among many users, such as warehouses, airports or car share/bike share services. Fleet management industry Telematics systems allow fleet managers to track the movement of vehicles in real time using GPS In-vehicle telematics systems have transformed the fleet management industry over the last 20 years. Telematics systems allow fleet managers to track the movement of vehicles in real time using GPS. In addition to tracking, they may be used to enable remote vehicle diagnostics, fuel management and dynamic scheduling. When driver identities can be accurately confirmed and linked to the vehicle, they can also be used to monitor driver behaviours. Behavioural management systems linked to telematics data improve driver safety and accountability and allow companies to determine when additional training or disciplinary measures are needed. Alternatively, they can be used to incentivise positive behaviours. User authentication systems Fleet managers must ensure that their companies are in compliance with federal and state regulations for commercial drivers. User authentication combined with telematics data can be used to monitor individual driver compliance with Hours of Service (HOS) rules and other regulations. Compliance systems can also ensure that drivers whose commercial licenses have expired or who have not completed required training are not able to access vehicles or equipment they are not currently authorised to operate. User authentication systems can replace manual reporting of hours worked for payroll and attendance purposes; when the driver access the vehicle with his ID badge, he is also checked in to HR systems as present and on the job. Time-and-attendance and telematics data linked to individual drivers can be used for productivity analysis and employee reviews.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 deaths. The organisation recommends that automobile manufacturers install a ‘kill switch’ that would disconnect a vehicle from the Internet in an emergency to mitigate the threat. Protecting transportation system Automakers are keeping the public in the dark as they market new features based on Internet connections"Consumer Watchdog contends that the vulnerability of automotive computer systems, and the possibility of a cyberattack, has been communicated privately to investors but not widely to consumers. “Automakers are keeping the public in the dark as they market new features based on Internet connections,” says Consumer Watchdog. “Connecting safety-critical systems to the Internet is an inherently dangerous design,” says Jamie Court, President of Consumer Watchdog. “American car makers need to end the practice or Congress must step in to protect our transportation system and national security.” Future designs should completely isolate safety-critical systems from infotainment systems connected to the Internet or other networks, according to Consumer Watchdog. By 2022, at least two-thirds of new cars on American roads will have online connections to the cars’ safety-critical systems, putting them at risk of deadly hacks. Updating vehicle software over-the-air One economic motive of connecting vehicles to the Internet is the ability of car manufacturers to update vehicle software over-the-air rather than having to recall a vehicle. Systems also enable collection of valuable data on how fast a car owner drives or where he/she shops. Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin. Software may be written by third parties and/or include contributions from hundreds or thousands of different authors around the world, with little accountability for flaws. The ability to update software ‘over the air’ without touching the vehicles lets automakers cover up safety problems and sloppy testing practices, contends Consumer Watchdog. “Allowing consumers to physically disconnect their cars from the Internet and other wide-area networks should be a national security priority,” says Court. “If a 9/11-like cyber-attack on American cars were to occur, recovery would be difficult because there is currently no way to disconnect our cars quickly and safely. The nation’s transportation infrastructure could be gridlocked for weeks or months. Mandatory ‘kill switches’ would solve the problem.” Understanding the risks of connected cars In addition to more attention to cybersecurity, there also needs to be more transparency to enable consumers to understand what is at risk and the choices they make. For example, a group of more than 20 car industry engineers and insiders helped to prepare the Consumer Watchdog report, but many of them remained anonymous for fear of losing their jobs. Consumers have a right to understand the risks they are taking and how they can minimise them. In the Internet of things, cybersecurity dangers extend to almost every device in the connected world, from cars to smartphones to medical devices. Increasingly, we will be asked to weigh the convenience of cranking our car with a smartphone, for example, against the possible risk in the form of vulnerability to cyberattack.
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announces that Bradley Air National Guard Base in East Granby, Connecticut., has installed a Delta Scientific HD300EM shallow mount wedge barricade system at the home of the ‘Flying Yankees,’ the 103rd Airlift Wing, the third-oldest Air National Guard unit in the country. Installed by American Barrier and Controls LLC, Foxboro, Massachusetts, the ‘Stop Control Safety’ ACP (Access Control Point) provides security at this constrained location with a relatively low traffic volume of less than 800 vehicles per hour per lane. Extensive history of electronic integration "Security forces and the engineering firm at Bradley chose the Delta Scientific HD300EM because of Delta's proven leadership and quality in the vehicle barrier industry," explains Dave Abromson, vice president of American Barrier and Controls. "They chose American Barrier and Controls LLC as the installer of the barrier and ACP system because of our 20-plus years as a Delta installer and service provider and our extensive history of electronic integration at such facilities as the US Army, US Navy, FBI field offices and multiple NASA locations." With only a 24 in (61 cm) foundation and a fully electric control unit, the HD300EM barrier stops a 15,000 lb (6800 kg) truck impacting at 50 mph (80 km/h) dead in its tracks with zero penetration. Fibre optic communication lines The HD300EM obviates the concerns of interference with buried pipes Upon impact, the barrier remains in its foundation and the opening stays blocked, providing a multiple hit capability. The barrier is independently test lab certified to 1 million cycles. In its M50 crash test, the HD300EM completely disabled the test vehicle, causing severe damage to the occupant compartment and power train. The maximum penetration recorded was an outstanding -1.8 m. A solid road plate design permits multiple hits and will handle low speed bumps and corner strikes for day to day reliability. The design is ideal for heavy vehicle traffic as it is rated at 66,000 lbs per axle load. The HD300EM obviates the concerns of interference with buried pipes, power lines and fibre optic communication lines. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. Total protection against dust The HD300 is perfect for high water table locations and areas with corrosive soils. It provides low maintenance as all components are accessible from the sides or top of the barrier. For increased security, the HD300EM leverages Delta's proprietary counter-balanced technology to provide a 1.5 second emergency fast operation (EFO), responding to attacks very quickly. The electric actuator provides IP67 protection, meaning that the unit is totally protected against dust and the effect of immersion between 15 cm and 1 m. The HD300EM barricade provides foundation space in which maintenance personnel can easily work. There is space for heaters and sump pumps. Access is available from either the top plate or front.
Nottingham-based manufacturer and supplier of protective systems, Hardstaff Barriers announced that it has completed the installation of a hostile vehicle mitigation system at the site of the Nightingale Hospital in Harrogate, North Yorkshire. The hospital is one of a series of temporary facilities which have been built around the United Kingdom to add additional bed capacity to the NHS (National Health Service) during the COVID-19 pandemic. Linear surface-mounted concrete security barriers Appointed as part of its role as the designated National Barrier Asset delivery partner, Hardstaff Barriers, which is part of the wider HS Security Group, has installed temporary linear surface-mounted concrete security barriers, as well as a gated access system, across the site. The system, which was installed overnight, is designed to especially mitigate threats such as hostile vehicle attacks and protect against reckless or accidental damage from vehicles to the site’s workforce and buildings. Hostile vehicle mitigation system installed Fellow HS Security business, ATG Access was also recently commissioned to protect the Nightingale Hospitals The project at the Harrogate Nightingale Hospital is the latest in a series of related developments for HS Security Group, a group of the UK’s renowned physical security specialists, owned by Hill & Smith Holdings PLC. Fellow HS Security business, ATG Access was also recently commissioned to protect the Nightingale Hospitals at both the London ExCel and the Cardiff Principality Stadium. Enhanced security for Nightingale Hospitals Kathryn Cooper, Service Manager at Hardstaff Barriers, said, “The NHS is doing a fantastic job of caring for and protecting the people of the country at this most extraordinary time.” She adds, “Naturally, we are tremendously proud to have been able to play a small part in the delivery and operation of this hospital. This is a time for the whole nation to pull together and do everything they can to protect our collective wellbeing.” The Nightingale Harrogate has been set up within the Harrogate Convention Centre in the North Yorkshire town and provides 500 additional beds.
Manufacturer of road blockers, bollards and vehicle barriers, ATG Access, has committed resources to protect hospitals across the country from external threats amidst the ongoing COVID-19 pandemic. Through its partnership with deployment partner, event protection business Crowdguard, ATG’s hostile vehicle mitigation (HVM) solution, Surface Guard, has been installed to protect the temporary 500-bed London Nightingale Hospital built at the ExCel Centre, London. Potential security vulnerability After having originally having been alerted of a potential security vulnerability to vehicle attacks at the ExCel Centre, Crowdguard were quick to respond, successfully installing 40 metres of ATG Access’ Surface Guard across three locations on-site within 36 hours. The solution is fully pedestrian-permeable, and Crowdguard has also deployed a separate Authorised Vehicle Access Unit in front of the hospital, ensuring that hospital operations remain entirely unaffected by the new measures. Following the successful initial installation of Surface Guard, ATG Access has now also been commissioned to secure the 2,000-bed capacity field hospital built by a temporary conversion of Cardiff’s Principality Stadium, from Monday 20th April. All necessary security products, once again deployed by Crowdguard, have been donated free of charge to ensure the hospital, staff and patents are fully protected from attack. Minimising disruption to event operation A Surface Guard barrier can withstand the impact of a 7,200kg vehicle travelling at 32kph Furthermore, Hardstaff Barriers, part of the wider HS Security Group, has also been enlisted to protect the Nightingale Hospital in Harrogate. Both Hardstaff Barriers and ATG Access are part of HS Security, a group of the UK’s physical security specialists owned by Hill & Smith Holdings PLC. Designed in response to the surge in vehicular attacks across Europe in recent years, a Surface Guard barrier can withstand the impact of a 7,200kg vehicle travelling at 32kph and has been tested twice in accordance to the IWA 14 crash test standard. The barrier’s lightweight and modular design means that it can be deployed quickly and efficiently by four men in under an hour, minimising disruption to event operation and the surrounding area. Implementing the necessary solutions We wanted to ensure that people don’t have to worry about security during these difficult times" Iain Moran, director at ATG Access, said, “Now, as ever, the public’s safety remains top priority and, to this end, we wanted to ensure that people don’t have to worry about security during these difficult times.” “We have a long-standing relationship with the ExCel Centre, having worked to protect the venue across a number of high-profile events in the past, so we knew what security measures would be needed for the temporary hospital. Due to Crowdguard’s expertise and unparalleled deployment network, we were able to work together to implement the necessary solutions rapidly and effectively, keeping key workers and critical infrastructure safe in these challenging times.” Deborah Ainscough, operations director at Crowdguard, said, “We are proud that, through innovations such as Surface Guard, we are at the forefront of securing the nation’s hospitals and, through this, ensuring that both vital key workers and patients affected by COVID-19 are kept safe.”
Desert Highlands, the acclaimed luxury golf club and community in the stunning Sonoran Desert of North Scottsdale, has updated the community’s security system, installing the state-of-the-art Avigilon Surveillance System. The upgraded security system at Desert Highlands includes 55 new IP cameras installed throughout the property. Other features of the system include new technology that allows the Desert Highlands security team the ability to locate vehicles or people with specific description criteria, and an appearance search feature that can recognise individuals based on various descriptions. High quality video surveillance footage Avigilon Security Solutions are designed as easy-to-use software and hardware IP network products that include image capture, analysis, storage, transfer and playback of high quality video surveillance footage with visually lossless compression (no perceptible loss of visual detail), and electronic access control management. Typically, a luxury club and its community homeowners’ association’s security systems are not connected. With the Avigilon Surveillance System at Desert Highlands, the two security components are completely integrated with one another, which provides additional security measures and more proficiency. Safe and comforting Desert Highlands’ energetic lifestyle consistently draws discerning families and active Boomers in equal measure “We wanted to transform our surveillance system at Desert Highlands to something more sophisticated and efficient, and the highly touted Avigilon surveillance system matched our needs,” says General Manager Monty Becton. "Providing our residents and members peace of mind and ensuring the Desert Highlands experience remains safe and comforting are our ultimate priorities.” Desert Highlands’ energetic lifestyle consistently draws discerning families and active Boomers in equal measure, golfers, tennis enthusiasts, pet lovers, and health and wellness enthusiasts. A full social calendar allows residents to also fully enjoy this peaceful community. New irrigation system During the Coronavirus pandemic, Desert Highlands offers a pantry for its members and residents, where they could buy essentials (paper items, disinfectant, bread, milk, cheese, deli, proteins, beverages, etc.) from the club without leaving the confines of the community. The club carefully packages the items and either has them delivered to their houses or places the groceries in front of the clubhouse for pick-up. Stretching to over 7,100 yards, the Desert Highlands golf course recently underwent a $7 million renovation project that included refurbishing every bunker, restoring the 13th hole to its original design, installing a new irrigation system and updating cart paths. Premier tennis tournaments The splendid golf course offers a challenging, but fair test, and striking views of Pinnacle Peak and the lights of the Valley spread across the horizon in the distance below. Noted ATP player Nick Kyrgios considers Desert Highlands’ grass courts “better than Wimby" Desert Highlands was the first design in Arizona by Jack Nicklaus, and immediately set the bar for desert golf experiences, not only in Scottsdale but statewide and nationwide. Nicklaus, Gary Player, Arnold Palmer and Tom Watson have walked these fairways, as Desert Highlands was host site of the first Skins Game in 1983. Just as impressive is Desert Highlands’ Racquet Club, which sports 13 tennis courts featuring all three Grand Slam surfaces, grass, clay and hard. The Racquet Club annually hosts one of the premier tennis tournaments found anywhere, the USTA Southwest Grass Court Classic. Noted ATP player Nick Kyrgios considers Desert Highlands’ grass courts “better than Wimby [Wimbledon].” State-of-the-art security system Desert Highlands also boasts a 7,700-square-foot Wellness Centre, an 18-hole professionally designed putting course and a spacious dog park. Inside, the club provides residents peace of mind with a state-of-the-art security system, professionally trained security personnel, visitor control and access, and other protection amenities. Among the acclaimed residential services that truly pamper residents and meet their specific needs, shipping and transportation assistance, pool and spa maintenance, auto detailing and other customised services.
Southeastern Rail Network operates train services between London, Kent and parts of East Sussex. It is one of the busiest networks in the country, transporting 640,000 passengers each weekday on its 392 trains, which are temporarily housed in 12 depots situated around South-East England. Some of these depots are unmanned, and therefore require intelligent security solutions. Bosch Security System’s Integration Partner, Taylor Technology Systems, were tasked with upgrading the entire video surveillance system across the 12 depots. The legacy analogue surveillance system had come to the end of its service life and was overdue for an upgrade. A state of the art IP based system was required to deliver upon the clients requirements for all the depots to be fully monitored 24/7. Tracking train arrivals departures A fully integrated solution was required that could provide all of this while also reducing costs An upgrade to an IP camera solution can provide vastly improved image quality, wider coverage and wireless capability, along with Intelligent Video Analytics and high levels of data security encryption. The primary challenge that needed to be solved by the video surveillance solution was securing the 5 unmanned depots. Some of these sites had previously been subject to thefts due to unauthorised entry via the main entrances. All access gates therefore needed to be monitored 24/7, ensuring that all personnel, or vehicles, entering the sites are tracked and reported. This includes all deliveries to onsite buildings as well as tracking all train arrivals and departures. A fully integrated solution was required that could provide all of this while also reducing costs. High clarity video in low-light levels A critical factor was that the video surveillance solution had to be able to work unimpeded throughout the night. The installed video technology therefore needed to provide high clarity video in low-light levels, whilst also still ensuring that the Intelligent Video Analytics worked as required. The camera portfolio installed across the 12 depots included FLEXIDOME IP starlight 7000 VR, DINION IP starlight 7000 HD and AUTODOME IP starlight 7000 HD cameras. These cameras are all equipped with Bosch’s Intelligent Video Analytics solutions ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Network surveillance systems Some surveillance cameras are using a digital trip wire to identify movement at perimeters These analytics solutions allow video surveillance to go further than just security applications, using statistics in the form of metadata for purposes such as perimeter control and vehicle tracking. Using Camera Trainer, a built-in machine learning capability, surveillance cameras can also be taught to recognise and detect stationary objects or certain situations instead of being triggered by motion alone. As an integral part of this end-to-end Bosch solution, all recording from the depots is remotely managed using DIVAR IP all-in-one 7000 recorders – an all-in-one recording, viewing and management solution for network surveillance systems. To combat unauthorised entry to unmanned sites, the IP cameras are using Intelligent Video Analytics to prevent security breaches before they occur. Some surveillance cameras are using a digital trip wire to identify movement at perimeters. In-built Intelligent Video Analytics If movement is detected, an alert is sent to security personnel who are able to view the recording and respond straight away. Intelligent Video Analytics from Bosch are able to differentiate between genuine security events and false-triggers, meaning that security alerts are dependable and reliable. In-built Intelligent Video Analytics went further in this application; to monitor train movements, track deliveries inside the depot and provide access to staff. Taylor Technology Systems carried out the installation and configuration of this solution The AUTODOME IP starlight 7000 HD cameras were installed on gantries over train tracks and were the ideal PTZ solution, as they can continue tracking while panning, tilting or zooming. All cameras with starlight technology continue to deliver full intelligent analytics at night and in low light levels. The cameras installed around the depots are able to provide colour filtering down to 0.0077 lux or deliver detailed monochrome images where other cameras show no image at all. Expert installation and integration Taylor Technology Systems, a member of our Installer and Integrator Partnership Programme, carried out the installation and configuration of this solution. They expertly delivered the installation project at active depots while keeping the legacy system working. The team worked with Southeastern to arrange complex line blockages so they could install the equipment safely without affecting the day-to-day operation of the railway. To complete the project, engineers from Taylor Technology Systems completed comprehensive training courses on the Bosch Video Management System, allowing seamless management of the digital video across IP Networks. This ensured that the Bosch technology was installed exactly to specification. Ensuring site safety The Taylor Technology engineers worked to a professional high standard by ensuring site safety" Taylor Technology Systems have been awarded a Bosch Outstanding Achievement Award for their work on this project. “Taylor Technology Systems deployed a full suite of servers and IT equipment with Bosch CCTV Platform across several sites to ensure security was enhanced due to end of life equipment. With full in-depth training, the Taylor Technology engineers worked to a professional high standard by ensuring site safety was paramount during the 6 month project that was on time and within budget", says Steve Martin, Project Manager, Southeastern With built-in analytics in all cameras, this end-to-end Bosch solution lowered costs for the end-user. Installation, configuration and maintenance were also eased, as pre-configured default settings can be used in applications such as vehicle tracking and perimeter detection. The guaranteed top build quality from Bosch, combined with expert installation, ensures that this is a long-term solution for Southeastern.
Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation. The airport contains three runways, two of which are used by commercial aircraft. The airport offers ground transportation, free parking, a Subway restaurant, and many other services such as hangar space and flight training to name a few. Previously, Valdosta Regional Airport operated a legacy Matrix access control system. The proprietary system, including the readers, panels and software, was outdated, making it difficult and expensive to obtain replacement parts. Building automation systems Looking for an open solution, Valdosta Regional Airport turned to Allcom Global Services for their expertise and upgraded to AMAG Technology’s Symmetry SR Retrofit Access Control system with HID readers. “Symmetry integrates into various video, intrusion and building automation systems,” said Kevin Cioffi, vice president, Allcom Global Services. Valdosta has more freedom to research competitive pricing and alternative options" “By choosing an open system, Valdosta has more freedom to research competitive pricing and alternative options. We are thrilled they have chosen Allcom. We gutted all the circuit boards and changed them to the Symmetry panels,” said Tim Register, operations manager/airport security coordinator, Valdosta Regional Airport. “We kept the antennas and how the data was transmitted. All the mounts stayed the same; we just swapped in Symmetry and it worked.” Integrating different technologies Symmetry controls access to the perimeter of the airport including the vehicle access gates and all outside doors facing the Security Identification Display Area (SIDA). The SIDA includes all areas that have access to the commercial apron and tarmac. The SIDA also requires a reader with a PIN-plus-card swipe to open, which make up 75% of the airport’s readers. The remaining Airport Operations Areas (AOA) require only a proximity card swipe to open, which are mostly internal doors and the main entrance. Thirty-two new HID proximity card readers were installed in total. To get the open system the airport required, Valdosta Regional Airport replaced older panels with Symmetry SR panels. As the Symmetry system changes or expands, integrating different technologies or adding more readers will be easy and less expensive. More economical approach The simple job of creating a badge for a user was cumbersome and time consuming with their old system The security operators found Symmetry much easier to learn and use, saving money and hours in training time. The simple job of creating a badge for a user was cumbersome and time consuming with their old system. With Symmetry, badges are created on demand, onsite, with no hassle or extra charge. “Symmetry provided us a more economical approach to facilitate the same thing we used to do with a more expensive, proprietary system,” said Register. “It is much easier to create a badge with Symmetry.” Life flight helicopter Airport authority employees, TSA, airline employees, fixed based operators, life flight helicopter and fixed wing aircraft are all protected by Symmetry. In addition to the perimeter, Symmetry controls access to all work areas within the airport and to the hangars located inside the perimeter fence. “An incident happened one Sunday morning where a car hit a pole and brought the power down,” said Tim Register. “If we were operating the Matrix system, it would have been down for hours. Our Symmetry system was only down minutes.”
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload