Johnson Controls has updated its popular Illustra Pro camera family with a new generation of Illustra Pro Mini-Domes featuring Smart Wide Dynamic Range. Offering a choice of 2, 3, 5 and 8 megapixel models and a variety of lens options, the new Pro Mini-Domes are ideal for a wide range of deployments in both medium and large-sized facilities. Smart WDR technology This new Smart Wide Dynamic Range (WDR) technology built into the new Mini-Domes greatly improves the quality of images captured in varying lighting environments. By continuously analysing the scene, Smart WDR, without operator intervention, automatically adjusts tone mapping intensity and optimises the quality of the captured images by enhancing darkened areas, without over-saturating brighter areas. Setup times are also reduced with the addition of configuration profiles, such as auto, LPR, casino, indoor, outdoor, shutter priority and iris priority, where camera settings are automatically adjusted based on the environment, with a simple click of a button. The smart technology embedded in our latest generation of Illustra Pro cameras automates image tuning" Illustra Pro Mini-Domes “The smart technology embedded in our latest generation of Illustra Pro cameras automates image tuning and ensures that what you see is always dynamically optimised, even in changing scenes and lighting conditions. We are aiming to reduce operator setup and management costs while always delivering a perfectly configured picture,” said Ric Wilton, Director of Product Management for Illustra. “Adding intelligent, automated capabilities to our solutions, is core to our product design and the illustra portfolio.” Building off the previous generation of cameras, the Mini-Domes improve on important features such as Illustra IntelliZip bandwidth management, effective failover redundancy, cybersecurity, and video intelligence analytics. Video intelligence analytics The new Mini-Domes also offer wide field of view and narrow field of view options, and are packaged in a bubble-free IP66 environmentally sealed and IK10 vandal-resistant housing, instead of a transparent dome cover usually fitted to dome cameras. This negates the potential problem of IR diffused reflection and maximises image quality, regardless of the camera tilt angle. The new generation of Mini-Domes also have enhanced safeguards against cyber attacks The new Illustra Pro Mini-Domes feature video intelligence analytics, which means users can offload analytic streaming from network video recorders to the edge, saving time and resources. Users can select from a choice of 10 video analytics tools, including object detection, object abandoned/removed, crowd formation, dwell and perimeter protection in order to set up real-time, user-customisable event alarms which will enable them to respond quickly to any incidents and make best use of human resources. Cyber Solutions Product Security As part of the Johnson Controls, Cyber Solutions Product Security Program, the new generation of Mini-Domes also have enhanced safeguards against cyber attacks. With cyber-threat resilience in mind, the Mini-Domes feature ‘secure boot’ which prompts the installer to change the default password at the time of installation. Additional safeguard controls include an enhanced security mode which forces the use of complex, non-default passwords and encrypted communications.
ThreatQuotient™, a security operations platform innovator, announces new partnerships with global distributors Ectacom, Nihon Cornet and StarLink. Following international expansions into Central Europe and Australia in 2018, ThreatQuotient’s latest value added distributor (VAD) agreements leverage an extensive network of channel partners and solution providers to broaden the reach of their security operations platform across the Middle East, Asia-Pacific, Japan and China. Additionally, ThreatQuotient has expanded its office in the UK and doubled the size of their offices in Virginia and Maryland. Actionable threat intelligence is becoming more and more critical to the success of an organisation’s cybersecurity strategy. Threat intelligence platform ThreatQuotient recognises the value of the channel, and we are committed to our partners" ThreatQuotient’s portfolio of solutions is designed with partners in mind, and will allow customers to handle incidents and reduce risk more efficiently based on their unique priorities. The ThreatQ™ platform supports multiple use cases including incident response, threat hunting, spear phishing, alert triage, vulnerability management and serving as a threat intelligence platform. ThreatQ Investigations, the industry’s first cyber security situation room, embeds visualisation and documentation in a shared environment so that teams and team members can accelerate investigation and response through collaboration and coordination. “ThreatQuotient recognises the value of the channel, and we are committed to our partners and to develop mutually beneficial relationships. We are very proud to continue our global expansion through new distributor agreements with Ectacom, Nihon Cornet and StarLink,” says Haig Colter, Director of Alliances at ThreatQuotient. Providing appropriate solutions “We continue to innovate and provide our partners with the tools they need – reliable products and programs – to meet and exceed their sales goals. ThreatQuotient is eager to continue growing and meeting international demand for security operations solutions.” ThreatQuotient’s solutions improve efficiency and response times by breaking down silos and enable teams to share intelligence and tasks easily, allowing partners to provide the appropriate solutions to the many teams within an organisation responsible for security – Security Operations Center (SOC), Incident Response (IR), Risk Management, Vulnerability Management, Endpoint and Network teams, to name a few. With the largest and most in-depth set of integrations in the industry, the vendor agnostic ThreatQ platform works seamlessly with and complements a wide range of solutions that channel partners may offer, including tools for enrichment and analysis, orchestration, sensors, SIEM and log management, ticketing and intelligence feeds. Proactively manage incidents The company was named to the CRN Emerging Vendors List for the fourth consecutive year “Traditional security systems and strategies do not have the threat-centric approach needed to truly secure today’s organisations. ThreatQuotient enables customers to accelerate their security operations and proactively manage incidents and respond with precision,” said Nidal Othman, Co-Founder and Managing Director, StarLink. “Security incidents will only continue to rise, and attackers will use the overload of alerts against enterprises they wish to target. It is a pleasure to partner with ThreatQuotient and bring their market-leading capabilities to more organisations across the globe.” In the first half of 2019, ThreatQuotient was recognised several times for leadership in IT innovation. Most recently, the company was named to the CRN Emerging Vendors List for the fourth consecutive year. Previously, ThreatQuotient was included on the 2019 Channel Chiefs List for the second time, and the 2019 Partner Program Guide for the channel program’s success to date. Additionally, ThreatQuotient’s SVP of Sales, Gigi Schumm, was named the winner of the third annual Women in Sales Executive Leadership Award by the Institute for Excellence in Sales (IES).
Honeywell announces the release of 30 Series IP Cameras, a new suite of video cameras that strengthens building safety and security through advanced analytics and secure channel encryption. The Honeywell 30 Series IP cameras are designed for use as part of video systems that comply with U.S. government procurement standards instituted under the John S. McCain National Defence Authorisation Act for Fiscal Year 2019 (NDAA Section 889). With the new cameras, end users can also benefit from lower total cost of ownership and lower risk as well as improved picture quality without increased storage needs. Telecommunication equipment Honeywell is in the business of protection – from the buildings to the data and people within" NDAA Section 889 prohibits the U.S. government from procuring video and telecommunication equipment from certain companies and their subsidiaries. Many security end users outside of the government are also looking to follow these provisions. “Honeywell is in the business of protection – from the buildings to the data and people within,” said Jeremy Kimber, video global product management director, Honeywell Commercial Security. “With the release of the 30 Series IP Cameras, we are providing advanced secure channel encryption that guards against unauthorised access and unsanctioned distribution of data and video to help end users seamlessly integrate security into any business.” Increasingly stringent requirements Honeywell 30 Series IP Cameras are available in dome, bullet, ball and fisheye models that feature: Secure channel encryption: In addition to enabling end users to follow the provisions in NDAA Section 889, the new cameras provide HTTP over TLS1.2 (HTTPS) encrypted streaming to Honeywell MAXPRO Network Video Recorders (NVR). They also adhere to the Payment Card Industry Data Security Standard (PCI-DSS). Together, these elements help meet the increasingly stringent requirements being set by IT Departments to shield businesses against unauthorised access and unsanctioned distribution of data and video – potentially saving end users up to $3.86 million, the average global cost of a data breach. Traditional motion detection Advanced motion people detection: Traditional motion detection only detects pixel changes, leading to a higher false alarm rate. Advanced motion people detection is designed to reduce false alarm rates as it will only create an alarm when the moving object is recognised as a person. A higher quality camera resolution of up to 5MP deliver exceptional images Enhanced storage space and image quality: A higher quality camera resolution of up to 5MP deliver exceptional images and comes with a user-friendly interface for secure remote viewing. The H.265 smart codec feature allows for storage of longer clips, lower bandwidth consumption and enables images to take up to 50% less storage space, which decreases operating costs. Access control management The new line of cameras are fully integrated using HTTPS encrypted streaming with MAXPRO® Network Video Recorders. They can also be used with Performance Embedded NVRs linked to the MAXPRO Cloud multi-site video and access control management platform and with the ADPRO XO range of NVRs with on-board video analytics. With its advanced analytics and encryption capabilities, Honeywell 30 Series IP Cameras offer an array of quality options for all small-to-medium businesses, entry-level enterprise and critical applications where compliance is essential such as banking and finance, government, utilities, campuses, retail and premium commercial.
Johnson Controls announces Tyco Cloud, a new cloud-based security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organisations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet. Accelerating digital transformation Tyco Cloud empowers this digital transformation with on-demand security management" Tyco Cloud allows users to protect lives, assets and facilities through management of access control, video surveillance and other security operations using secure cloud services and connected devices such as cloud cameras and controllers. Cloud solutions from Tyco run on an open and modern microservices architecture to ensure fast, scalable and secure services. “Our customers worldwide are embracing and accelerating digital transformation to make their businesses more intelligent, agile and cost effective,” said Martin Renkis, general manager of Cloud Solutions, Global Security Products at Johnson Controls. “Tyco Cloud empowers this digital transformation with on-demand security management that enables organisations to securely and cost-effectively customise their video surveillance and access control solutions based on site-specific and enterprise-wide requirements.” Multiple recording parameters For video surveillance, organisations can enable Tyco Cloud with any Illustra Cloud Camera or leverage existing camera systems using Tyco Cloud Gateways, which will automatically locate existing cameras from dozens of different manufacturers on a network and enable secure cloud management of those cameras. Tyco Cloud enables video storage in camera, in gateway, in low latency cloud, in high latency cloud or a hybrid combination to support unlimited flexibility and cost effectiveness. The intuitive interface allows users to customise multiple recording parameters, such as which cameras to record and for how long, video resolution, as well as create unique upload schedules to minimise bandwidth consumption. The service also offers Cold Cloud video storage for cost effective, high latency online archiving. The new Hyper View feature enables users to search through 24 hours of recorded video from up to 100 cameras within 60 seconds. Smartphone based mobile credentials Tyco Cloud ioSmart was cloud first designed to deliver convenience, cost savings and advanced security Tyco Cloud surveillance also supports powerful analytics such as heat mapping, object detection and crowd formation to name a few. For access control, the new ioSmart solutions from Tyco Cloud empower smartphone based mobile credentials and smart key managed access control for companies to securely allow personnel to conveniently access facilities using their smartphones without the security risk of lost, stolen, or cloning of legacy card technologies. Tyco Cloud ioSmart was cloud first designed to deliver convenience, cost savings and advanced security for access control. The Tyco Cloud Enterprise Manager portal provides users with a comprehensive view of their entire security solution through a single interface. Proper password management It provides real-time status and management of every connected device on a clickable global map. This simple dashboard also enables tracking and management of users, bandwidth utilisation, cloud storage and device firmware. Additionally, Tyco Cloud secures all data from any device to the cloud and to the end user. Every connected device as well as the cloud platform are supported by the Johnson Controls Cyber Solutions Product Security Program, which delivers enhanced safeguards against cyber attacks, including additional controls for proper password management and end to end encrypted communications.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command centre technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations centre, which will contact law enforcement in real time when unauthorised intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analysed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralised management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organisation. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
School shootings, especially in the United States, present an ongoing tragedy and a challenge to the security industry. We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings. A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand (as reported in Education Week). “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.” Role of early detection Early detection of weapons in the school environment can minimise the impact of school violence Early detection of weapons – and their users – in the school environment can minimise the impact of school violence. For example, ZeroEyes is an intelligent video analytics platform, powered by artificial intelligence (AI), to detect weapons and recognise faces in real time. The company’s goal is to provide school administrators and decision-makers with a simple, intuitive situational awareness platform that gives first responders a tactical advantage. Data capture form to appear here! An emerging tool in campus security is audio analytics: Aggression and gunshot detection are some of the best security tools in the campus security market when it comes to detection, intervention and deterrence. Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification. Emergency response technology CLASS [Crisis Lockdown Alert Status System] by Sielox is an incident and crisis management solution Emergency response in also important, and technology can play a role. For example, physical security company Sielox has adapted the idea of using a colour scheme to characterise an emergency situation into its electronic security system. CLASS [Crisis Lockdown Alert Status System] by Sielox is an incident and crisis management solution that uses a variety of colours to designate the emergency conditions in various parts of a school building – red to alert to a crisis condition and green to designate "safe/secure". Colours are displayed on a schematic of the building, and new colours have been added, too, such as yellow for “unaccounted individual", orange for “disturbance” and blue to designate a medical emergency. CLASS offers five different alert levels and eight different colours that are configurable to denote a wide variety of emergency or non-emergency situations (such as maintenance or homeroom check-in status). Emergency response in also important, and technology can play a role Non-lethal methods to suppress active shooters in schools are also emerging. For example, one remotely deployed threat suppression system drenches a perpetrator with a repulsive water-based solution, thus impairing their ability to enact violence. The solution irritates eyes, throat, lungs and skin, but does not cause permanent injury. Cleanup is easy using water and detergent. The solution is manually deployed in predetermined zones, which limits the affected areas in a building. Touch-screen control enables rapid deployment, which can also be integrated with Threat Alert buttons and/or gunshot detection. ShotSpotter gunfire tracking Gun violence is also an issue in the neighborhoods where schools are located Beyond the schools themselves, gun violence is an issue in the neighborhoods where schools are located. ShotSpotter, Inc. released data tracking gunfire in and around public K-12 school communities within ShotSpotter coverage areas during 2017. The data revealed more than 4,800 gunfire incidents occurred during school hours within a one-half mile radius of public K-12 schools and within the coverage area. There are 2,320 public K-12 schools and over 1,079,700 students within ShotSpotter coverage areas in 77 cities in the United States. The ShotSpotter study tracked and analysed data on the number of gunfire incidents that occurred at or near those schools across the time period from 7 a.m. – 5 p.m. local time, Monday – Friday, including summer and holidays. On a positive note, awareness of high-profile school violence has prompted action. Schools and universities are most certainly safer than ever before. High-profile incidents, especially active shooters tragedies, have increased collective security awareness. Heightened awareness leads to safer practices, improved emergency preparedness and security technology innovations. Collaborative efforts that involve stakeholder groups, such as administrators, responders and students, are the key to a safer learning environment. Investing in technology advances in 1) access control (e.g. electronic access, visitor management) and 2) communications (e.g. duress capabilities, mass notification) is the most effective way to protect people.
Abu Dhabi is a major cultural and commercial centre in the United Arab Emirates (UAE), accounting for roughly two-thirds of the UAE’s economy. While oil and natural gas make up a large portion of its GDP, Abu Dhabi has positioned itself as a premiere tourist destination, with major investments in luxury resorts and business hotels. Consequently, public safety is a top priority — and FLIR Systems is playing a critical role in the city’s long-term safe city initiative. Recently, the Abu Dhabi Monitoring and Control Center (ADMCC) was tasked with integrating all public access cameras onto a single platform to provide fully uninterrupted coverage of the city. This is in compliance with the Safe City 2030 vision of His Highness Sheikh Mohammed bin Zayed Al Nahyan, Crown Prince of Abu Dhabi and President of the UAE. As part of this initiative, ADMCC launched the Falcon Eye project, where surveillance cameras and sensors would be installed across the city to enable real-time situational awareness, threat detection, data collection, data sharing among public safety organisations, and crime prevention. Updating video management system To manage such an extensive system under the Falcon Eye project, ADMCC needed to update its VMS softwareFalcon Eye expands Abu Dhabi’s existing surveillance system to thousands of license plate recognition cameras and surveillance cameras, with cameras equipped with video analytics and/or facial recognition capabilities. To manage such an extensive system under the Falcon Eye project, ADMCC needed to update its video management system (VMS) software. ADMCC sought a VMS that would provide enhanced image quality, as well as increased storage and integrity of streamed video. The VMS also needed to be able to incorporate current, emerging and future technologies, such as Big Data, cyber protection, smart cameras, analytics at the edge, and automated camera management. Additionally, ADMCC required a cost-effective VMS that would seamlessly integrate with the existing physical security management information (PSIM) without compromising any data or operations from subsystems. Reliable software solution for video surveillance Previously, ADMCC had a strong relationship with FLIR, having deployed an older FLIR United VMS version for several years. After careful research and evaluation, ADMCC chose to continue partnering with FLIR as the industry leader in advanced video solutions in the safe city sector. ADMCC selected the most recent FLIR United VMS release as its VMS for the Falcon Eye initiative. FLIR United VMS is a reliable, enterprise-level software solution for video surveillance supporting an unlimited number of cameras over IP networks. Complying with ONVIF Profile S, Latitude ensures greater compatibility between cameras and the VMS Part of FLIR’s award-winning United VMS platform, Latitude features enhanced cyber security protocols. Its distributed server architecture enables unlimited scalability, multi-site deployments and sophisticated network topologies. Latitude’s open platform functionality provides advanced edge device integration, bringing together hundreds of third-party technologies. Complying with ONVIF Profile S, Latitude ensures greater compatibility between cameras and the VMS. Integrating Latitude and PSIM solution ADMCC upgraded to the recent United VMS version in June 2017. With special support from the FLIR team, the integration of Latitude and ADMCC’s in-house PSIM solution was successfully completed without any data loss. Adding value to the integration was the presence of an in-house FLIR engineer, who provided insight and guidance throughout the process. “FLIR is considered one of ADMCC’s trusted vendors, delivering regular upgrades and specialist support to our operations when needed,” said His Excellency Saeed Al-Neyadi, Director General at ADMCC. “The on-site FLIR engineer provided an immeasurable value to ADMCC.” Ensures maximum integrity and reliability One of the defining characteristics of United VMS is its simplicity and easy user interface. United VMS offers simplified access in managing and controlling video operations for the support staff. For all safe city projects, the preservation and availability of data is paramount. United VMS ensures maximum integrity and reliability with exceptional failover, disaster recovery capabilities" “The use of actionable information through data collection is vital in running such a huge scale operation such as Safe City initiatives,” Mr. Khalfan Al Hassani (ICT Director) said. “United VMS ensures maximum integrity and reliability with exceptional failover, disaster recovery capabilities, and 24/7 redundant recording.” Day/night safety of city and residents ADMCC oversees one of the world’s leading safe city solutions that utilises license plate recognition, facial recognition, video analytics and video management from over 45,000 sensors spread across the Emirate. United VMS serves as the central operational platform for all data of this unified platform, providing an efficient combination of video software and server hardware. By utilising the state-of-the-art technologies and subsystems brought together by United VMS, ADMCC ensures the safety of the city and its residents at all hours of the day and night. “United VMS has given ADMCC a reliable, stable, robust and secure platform for the past six years,” said Al Hassani. “It underpins a custom PSIM solution that supports various government agencies in Abu Dhabi helping the city to be ranked the ‘Safest City in the World.’”
In a highly visible, and competitive sport like Formula One racing, it’s not hard to understand why an organisation like Aston Martin Red Bull Racing attracts people who want access to their factory, and all the secrets contained within. Intrusion from unwanted visitors or vandalism is something that the people at Milton Keynes headquarters, in Buckinghamshire, England, want to avoid at all cost. Asset protection “Our Milton Keynes facility contains valuable technology and intellectual property,” says Mark Hazelton, Chief Security Officer. “At the same time, we are located alongside a public road, close to a residential area with high footfall. That is why it is critical for us to have high-performing security processes and systems in place, so we can effectively protect our assets as well as the people who work here.” The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing. Crafting the next Formula One challenger is done on the engineering site with a variety of buildings, including many office spaces, an R&D facility, manufacturing and storage areas. The design, testing, building and assembling of thousands of parts required to construct each race car all happen in house. About 750 people are employed at Milton Keynes and some parts of the factory are operated on a 24/7 basis. Site and facility security “As our site has grown, our previous CCTV system was no longer sufficient to provide adequate security monitoring,” says Caroline Tierney, Infrastructure Project Manager at Aston Martin Red Bull Racing. “Our CCTV installation was no longer state of the art and we wanted to ensure that we made best advantage of the improving technology available. We were also looking to make it easier to retrieve information from the system.” Aston Martin Red Bull Racing started to look out for an updated CCTV system, investigated different options and ultimately selected FLIR Systems as their technology provider through a local IP security system integrator. Quasar HD and 4K cameras The facility is now equipped with some 120 cameras, both visual and thermal, that cover the entire area 24/7. Cameras on site include FLIR’s visual Quasar HD and Quasar 4K, the latter presenting four times the resolution of the HD camera and, therefore, able to cover larger areas with less cameras. The facility also makes use of the Quasar Hemispheric Mini-Dome, which provides 360° immersive viewing, and of the thermal FLIR FC-Series ID camera, which includes onboard video analytics capable of classifying human or vehicular intrusions. The entire camera network is managed by FLIR’s Latitude Network Video Management System (VMS). FLIR thermal cameras The image quality that we get from the new range of visual FLIR cameras is truly impressive" “The image quality that we get from the new range of visual FLIR cameras is truly impressive,” says Zoe Chilton, Head of Technical Partnerships at Aston Martin Red Bull Racing. “It’s amazing what kind of image quality can come out of such a compact camera unit.” The FLIR thermal cameras have powerful video analytics on board, which makes them extremely useful as intrusion protection devices at several strategic locations across the Milton Keynes site. With the FC-Series ID camera, you can set custom trip lines and regions of interest that will trigger alarms for human or vehicular intruders, even at night or in poor weather conditions. Upon the detection of an intruder, an alert is sent over to security personnel via email. FLIR Latitude VMS The FLIR Latitude video management system is the backbone of the system, allowing Aston Martin Red Bull Racing personnel to easily view, playback, search and export video from a scalable number of cameras. “In the past, when we wanted to investigate a particular incident in more detail, it used to take a long time to actually retrieve the information we needed from our video recordings, but with the new FLIR Latitude VMS, this is much more straightforward and we save a lot of time,” says Tierney Comprehensive camera network The cameras used in the network around the Milton Keynes site are relatively small in size. And there’s a very good reason for that, according to Chilton. “Of course, it’s important to have the best image quality possible, but on the other hand, we don’t want our cameras to be too large and imposing either.” The Milton Keynes headquarters receives visitors, customers and partners every day. For Aston Martin Red Bull Racing, it’s important that everybody feels welcome: “While we need our site to be secure, and the cameras are of course important, we don’t want them to be the first thing visitors see when they arrive to visit us, " said Chilton. "I think that the FLIR cameras strike that difficult balance between security and subtlety really well.” The cameras can also be used to check whether visitors are using the parking lot correctly FLIR security monitoring system Other than the security aspect, there are other practical benefits of having a comprehensive camera network, as well. The cameras can also be used to check whether visitors are using the parking lot correctly, to track contractors around the site, and just for general site management purposes. The selection of the FLIR security monitoring system fits into a long-standing technology partnership between FLIR and the Aston Martin Red Bull Racing team. Since 2014, the team has been integrating FLIR cameras for a wide variety of uses around the factory and track, from electrical maintenance, test rigs and security on site, to tyre temperature assessments in the garage. High product quality The high product quality and innovative approach FLIR takes to developing new solutions for the challenges of Formula 1 makes a great fit with Aston Martin Red Bull Racing’s desire to push the boundaries of available technology for developing their cars.
Over 1,600 Wisenet cameras manufactured by Hanwha Techwin have been installed at Asia’s largest mega hub terminal in order to help operators monitor the movement of parcels and vehicles, as well as keep employees and visitors safe. With its nine decades of endless innovation, Korea’s logistics service provider, CJ Logistics, is leaping forward to become a pioneer by expanding its global networks to over 94 locations and entering the Thailand, Malaysia, China and Philippines markets. Video surveillance solution In June 2018, CJ Logistics opened Asia’s largest mega hub terminal in Gonjiam, Gyeonggi-do, South Korea. The terminal, which comprises two buildings with four floors above ground and two underground, occupies approximately 300,000sq metres, almost the size of 40 football stadiums. The total length of the facility’s conveyer belts is almost 43km, long as a full-course marathon The total length of the facility’s conveyer belts is almost 43km, which is as long as a full-course marathon. The terminal also has a state-of-the-art automation system, the first of its kind in Korea, which has increased the company’s daily handling capacity to 1.72 million parcels, four times higher than its competitors. CJ Logistics looked for a top-notch video surveillance solution which could match the terminal’s grand scale and the technically advanced automated facilities. Providing periphery monitoring After testing cameras from different manufacturers in the market, CJ Logistics chose Hanwha Techwin as its supply partner and have subsequently installed around 1,660 Wisenet cameras throughout the terminal. Wisenet X series IR PTZ cameras have been installed along the building exteriors, providing periphery monitoring 24/7 and auto tracking that enables precise monitoring across long distances, while IR illumination provides visibility even at night. Inside the buildings, around 1,400 Hanwha Techwin’s Wisenet Q series cameras were installed on the terminal’s ceilings and walls. The cameras are able to help detect any problems occurring to the automated conveyer systems which have a constant flow of parcels on them. They also oversee the movement of over 1,500 vehicles in and around the terminal and help create a safe working environment. Highly accurate recognition Wisenet X series bullet cameras, running license plate recognition (ANPR) software onboard, have been installed at the main gate of the terminal to enhance security at the entrances and exits, providing highly accurate recognition of license plates. These cameras enable effective vehicle monitoring within the terminal where cargo moves in and out around the clock, and are particularly useful in monitoring the main entrance. Both camera types are equipped with 12x optical zoom and 150dB WDR Wisenet X series bullet and PTZ cameras have been installed at indoor staircases and corridors of the office building. Both camera types are equipped with 12x optical zoom and the World’s best 150dB Wide Dynamic Range (WDR) which ensures clear images are captured from scenes that contain a challenging mix of bright and dark areas, normally causing overexposed or underexposed images. Intelligent video analytics As part of the Wisenet X series, these cameras feature intelligent video analytics and offer movement, loitering and intrusion detection. They are also equipped with audio analysis functionality which recognises critical sounds such as gunshots, explosions, screams and broken glass. “Thanks to the Hanwha Techwin’s Wisenet security solution, we were able to build a safe video surveillance system that can match the size and the cutting edge facilities of Asia’s largest logistics terminal,” said an official at CJ Logistics. “Now we can safeguard every corner of our terminal including vehicles, parcels, and personnel, not to mention indoor and outdoor spaces.”
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalises the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customised set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
How to choose the right solution for video data to enhance security and operational intelligenceDownload