Video motion detection
The rugged build quality of the new Invictus PTZ camera from UK CCTV manufacturing company, 360 Vision Technology, has been proven in the field during a recent road traffic incident in north London, which provided a real-world test for the camera and its ‘Attack Detect’ response feature. Built into each Invictus camera, 360 Vision’s ‘Attack Detect’ automatically responds to a detected increase in camera load (such as the camera being hit by an object). On detection...
CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centres. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of...
Neurotechnology, a provider of deep learning-based solutions and high-precision biometric identification and object recognition technologies, has announced the release of the SentiVeillance 7.0 software development kit (SDK) and the end-user oriented SentiVeillance Server solution. With SentiVeillance SDK, developers can create identification solutions that use live video streams from digital surveillance cameras. The latest version adds multiple enhancements to the biometric face recognition a...
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...
GJD, an award-winning UK manufacturer of professional external detector equipment, as well as Infra-Red and White-Light LED illuminators, is delighted to announce that it has celebrated its 10th year of partnership with Traders Warehouse Security Distribution. This decade long partnership has delivered outstanding security solutions across the UK. Carl Fletcher, GJD’s Sales Manager commented: “It has been an absolute pleasure to work with Traders Warehouse, we are looking forward to...
The Milestone Husky X series is designed to unlock the full potential of Milestone’s XProtect video management software (VMS), offering remarkable performance and low total cost of ownership. All NVRs in the Milestone Husky X series utilise hardware accelerated video decoding for server-side motion detection to further increase performance and camera capacity – all that in hardware that is customisable and can be matched to specific functional, operational and budgetary requirements....
Intrusion is the act of intruding, forcible inclusion or entry in an area that is not welcome. Track is the act of following the movements or trail of someone or something, typically in order to find them or note their course. Without staring monitors for 24/7, Intrusion Video Analytics can help partners to detect the act of intrusion and give alerts, and Track Video Analytics can help users to find the direction of moving object, give alert if the object goes to wrong direction. Most intrusion and track related video analytics on the market are available with Surveon, providing partners many options to meet different projects' requirements. Surveon provides a variety of video analytics to meet different projects' needs. They have been broadly divided into two categories - Intrusion and Track with numerous sub-categories under their ambit: Intrusion video analytics solutions Intrusion Detection - It detects malicious activities, policy violations or invasion; once detected, it will trigger alarm. It can be used in places where safety and security are top priorities, for example hard shoulders and the sensitive area in campus or airport. Forbidden Area Detection – Setting a detection zone as forbidden means there should be no trespasses in the set area; any incoming will trigger alarm. It can be applied for places where perimeter security is required such as server room and data center. Virtual Fence – Setting a virtual fence means drawing a line that should not be crossed; it will trigger alarm when the line is crossed. It can be employed in places where crossing will cause damage, for example country borderline and waiting line on station platform. Going Out Detection – By setting a detection area, boundaries and the object size, objects can move around in the set detection area but cannot cross the set boundaries, otherwise it will trigger alarm. This can be applied for attendance checking, preventing a student leaves the classroom or an employee gets off work before the schedule time. Track video analytics solutions Fisheye Auto Tracking - The windows show the movements of object with 360° surround and 180° panoramic viewing angles, which allow fisheye to work as PTZ camera, performing wider monitoring. It can be applied for place with valuable things and needs to be monitored intensely, for example boutique stores. Tailgating Detection - The alarm will be triggered when an object moves in the same direction but does not stop or stays too close to the previous one when crossing the dividing line in the detecting area. This can be used when the act of passing through needs to be charged or in access control, for example station gates, parking lots, toll booths, and the ATM. Surveon intrusion video analytics It is hard for most video analytics to accurately distinguish two objects when they pass each other. By analysing certain specific physical features, Surveon intrusion video analytics help partners to easily recognise two objects' behaviors even when they move side by side or cross to each other. With conventional solution, when an intrusion object goes through a pillar for seconds and shows up again, the system will wrongly recognise the object as a new intrusion object. With Surveon intrusion VA solutions, the system can resume detecting work automatically when the object passed a pillar and showed up again, giving partners an accurate alert for detecting unwelcome visit.
Pelco is pleased to announce four new combination IR/white light illuminator models to the award-winning Esprit Enhanced PTZ camera product line. These new models provide IR-only and white light/deterrent modes of operation to give you the ability to overtly capture clear full colour images when using white light direct illumination or covertly with clear black and white images when in IR-only mode. The new models are ideal for performance-oriented 24 by 7 operations as well as extreme temperature environments where fast PTZ responsiveness, wide dynamic range with variable overt and covert lighting options are key requirements. Enhancing surveillance experience The IR and white light illuminator modes enhance your surveillance experience with: The ability to switch between IR and white light as needed (manually, programmed, or via alarm). Optimised security detail with colour even in the dark, and where white light counter-acts colour distortion from light sources such as high-pressure sodium lamps. A visual white light deterrent (can be configured to come on when motion is detected, VMS is required). Applications include Public transit and cities where lighting pollution is prevalent (IR option) and the risk of vandalism is greater (white light option). Perimeter of a border. Airports, seaports, and refineries that cannot afford down time. Oil and gas operations. The four new models are offered with wiper, with wiper and pressurised unit, in both 48VDC and 100-240VAC power versions.
GJD, a British manufacturer of professional external detector equipment and LED illuminators, is very pleased to announce it has been shortlisted as a UK OSPA 2019 finalist in the Outstanding Equipment Manufacturer category. Winners will be announced at an evening awards ceremony on Thursday 28th February 2019 at the Royal Lancaster London hotel. Now in their third year, the UK OSPAs serve to acknowledge the creditable and infinite contributions that companies, initiatives, teams and individuals make to the security industry and wider community. Developing innovative products “The standard of entries this year has again been really high making the judging process as difficult as ever” commented Professor Martin Gill, Founder of the OSPAs. “Those that have been selected were marked independently by the judging panel and all reached a score threshold – ensuring they represent the very best in the industry.” This nomination highlights GJD’s commitment to developing high quality innovative products" Ana Maria Sagra-Smith, GJD’s Sales and Marketing Director commented: “We are delighted and very proud to have been selected as a finalist for this prestigious award. This nomination highlights GJD’s commitment to developing high quality innovative products.” Reduce false alarms Ana Maria continued to say: “We are looking forward to attending the awards ceremony in February when the winner will be announced.” GJD has over 35 years’ experience in protecting and securing people, properties and assets. In 2017 GJD was awarded with the Queen’s Award for Enterprise for International Trade, which is the UK’s highest accolade for international business success. GJD's security solutions rapidly identify genuine alerts, reduce false alarms and optimise the callout of responders, making its product range a truly valuable asset to both people and properties in all industry sectors across the world.
Carbon Black, a provider of next-generation endpoint security delivered via the cloud, announces that it delivered zero delayed detections and zero tainted detections in the MITRE Corporation’s Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) assessment. The MITRE assessment tests the ability to quickly detect specific adversary tactics and techniques as captured in the ATT&CK knowledgebase. The evaluations for this initial testing period used a MITRE-developed APT3 emulation plan on behaviour detection, telemetry and enrichment, among other elements. In the assessment, CB Response demonstrated it could automatically detect and display adversarial behaviours without humans-in-the-loop across the entire MITRE ATT&CK Matrix, which includes: initial access, execution, privilege escalation, defence evasion, credential access, discovery, lateral movement, collection, exfiltration, and command and control. Real-world attacks MITRE has set an excellent standard for how testing should be conducted in an open, rigorous, and sophisticated way" “We’re proud to be among the initial vendors evaluated by MITRE and we’re extremely proud of these results. We attribute our very strong showing to our philosophy of building products the right way for the long haul,” said Scott Lundgren, Carbon Black’s Chief Technology Officer. “Objective, transparent and open testing is critical as a means of driving the industry forward, and the MITRE ATT&CK framework offers a critical look at how real-world attacks play out. We believe MITRE has set an excellent standard for how testing should be conducted in an open, rigorous, and sophisticated way. We thank MITRE for its leadership.” “We’re very pleased with the participation in our first round of ATT&CK-based evaluations,” said Frank Duff, MITRE lead engineer for the evaluations program. Endpoint data collection “Effective cybersecurity can’t be done alone. We look forward to continued collaboration with the industry to help vendors understand their capabilities against known adversary behaviours and empower customers to more effectively buy and deploy these security solutions.” Carbon Black’s MITRE ATT&CK feeds combine the power of Carbon Black’s unfiltered endpoint data collection and a robust collection of adversary techniques In conjunction with the assessment results, Carbon Black announced it has added MITRE ATT&CK threat intelligence feeds to CB Response and CB ThreatHunter to deliver new behavior-based threat intelligence to customers. Carbon Black’s MITRE ATT&CK feeds combine the power of Carbon Black’s unfiltered endpoint data collection and a robust collection of adversary techniques to simplify threat detection and threat hunting. Unfiltered view The new threat feeds map directly to the various attack tactics outlined by MITRE. “By adding ATT&CK threat intelligence feeds to Cb Response and Cb ThreatHunter, organisations now have an unfiltered view into all endpoint activity viewed through the lens of attack building blocks and behaviours noted by MITRE. We believe this results in more comprehensive and advanced threat hunting capabilities for security professionals,” said Lundgren. “The ATT&CK threat intelligence feeds directly integrate detection of ATT&CK tactics and techniques into the CB Response and CB ThreatHunter products, underscoring Carbon Black’s commitment to ATT&CK and other open standards and frameworks.”
Hanwha Techwin has further strengthened its premium Wisenet P series with the introduction of the ultra-high definition PNM-9320VQP which, with 4 sensors and a separate integral PTZ camera, is designed to provide a highly cost-effective solution for detecting and tracking objects over wide open areas. Ultra HD megapixel camera The option of exchangeable 2- and 5-megapixel lens modules enable the camera sensors built into the H.265 Wisenet PNM-9320VQP to work together to seamlessly capture 360-degree images of up to 20-megapixel resolution. In addition, the PNM-9320VQP’s 2-megapixel 32x PTZ camera element is automatically triggered to zoom in and track a moving object or move to a user-configured preset position, when the motion detection function of the multi-directional camera detects activity. “By placing a PTZ camera at the centre of the PNM-9320VQP we are able to provide a highly affordable and efficient solution for city and wide area surveillance applications such as car parks, shopping centres and warehouses,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “As well as installation and maintenance costs being significantly lower, end-users are able to avoid incurring the higher capital costs of using 5 separate cameras to cover an area and achieve the same level of functionality.” PTZ cameras The IK10 vandal and IP66 weather resistant PNM-9320VQP is equipped with a Gyro sensor which offer accurate stabilisation The PTZ camera benefits from the world’s best Wide Dynamic Range (WDR), which performs at up to 150dB to accurately produce images in scenes that simultaneously contain very bright and very dark areas, as do the 2-megapixel lens modules. The 5-megapixel lens module options come with 120dB WDR. The IK10 vandal and IP66 weather resistant PNM-9320VQP is equipped with a Gyro sensor which offer accurate stabilisation when a camera is disturbed by wind or vibrations, resulting in more stable images. Additional key features include 5 built-in SD card slots to help keep data safe in the event of network disruption, defog, which makes corrections to blurry images which are captured in foggy conditions and Lens Distortion Correction (LDC) compensates for the image distortion that can occur with wide angle lenses. WiseStream II compression technology The multi-streaming PNM-9320VQP supports H.264, H.265 and MJPEG compression. Bandwidth efficiency is improved by up to 99% compared to current H.264 technology when H.265 is utilised with WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression according to movement in the image. Hanwha Techwin has also just introduced the Wisenet PNM-9000VQ multi-directional camera, which with 4 exchangeable lens modules that together seamlessly capture 360-degree images of up to 20-megapixel resolution, shares many of the PNM-9320VQP’s features, but does not have a built-in PTZ camera.
Ava Group, a provider of risk management services and technologies, announces new enhancements to its FFT Aura Ai-2 advanced fibre optic detection controller, which offers superior intrusion detection location accuracy together with extended range performance. The system is perfect for monitoring pipelines, perimeters and communications networks. Mark Horton, Global Sales and Marketing Director at Ava Group comments, “The Aura Ai-2 is our next generation controller and was released to industry acclaim last year, being recognised for its ground-breaking performance. However, the system has had further performance upgrades and now offers monitoring of optical distances of 80km for perimeter fence detection or 110km for pipeline or covert buried detection.” Fence mounted application “Accuracy has also been enhanced, the system can now pinpoint an intrusion location down to within +/- 2m metres on a fence mounted application. The controller is also able to cover different applications simultaneously, for example, fence mounted and covert buried detection. This essentially offers two units in one, saving on both procurement and operational costs.” The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels. Dependent on the application these cables are either: laid adjacent to a pipeline, attached to a perimeter fence or buried along a perimeter boundary. Minute disturbances cause changes in the scattered light and the Aura Ai-2 controller automatically analyses this reflected light to detect, locate and report disturbances. Reduces nuisance alarms Advanced optical signal processing algorithms, combined with artificial intelligence, accurately and reliably analyse the reflected light to discriminate between intrusions and other causes of disturbance. This significantly reduces nuisance alarms whilst maintaining full awareness of any situation. When wired in a redundant loop configuration the two-channel controller provides cut resilience and continues to provide detection in the event of a deliberate or accidental cable cut. Dr Jim Katsifolis, CTO at Ava Group Technology Division comments, “As is the case with any fibre optic system, the key to increasing performance over distance is to maximise its optical power budget, that is, the maximum allowable optical signal loss the system can tolerate while still maintaining proper operation. We have enhanced our Aura Ai-2 platform by designing new ultra low-noise detection electronics that significantly increase its dynamic range (and consequently its optical power budget).” Protection solution for critical infrastructures “When combined with other design improvements that minimise noise while increasing detected signal strength, the Aura Ai-2 now has an industry leading power budget of 13.5 dB. We’ve achieved higher signal-to-noise ratios across the whole sensor, maximising the signals detected from both the near and far ends of the sensing fibre.” Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines As it utilises the sensitivity of fibre optic technology, Aura Ai-2 is also perfect for monitoring fibre optic communications networks. The system can monitor for tapping and tampering by connecting spare (dark) fibres inside each network cable to Aura Ai-2. Network cable disturbances, including removal of protective layers, attempted tapping or cable movement, will be instantly detected and generate an alarm indicating the location. Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines as they traverse often remote and inhospitable locations. It is also perfect for protecting long boundary perimeters alongside railway lines, airports and ports. Perimeter fence project Mark Horton added, “In the key terms of distance and accuracy, Aura Ai-2 easily outperforms its competitors and has already proven to be highly popular in the market. The system has already been chosen for a large Middle East pipeline and perimeter fence project, with the protection of both assets conveniently controlled from just one controller. In another project, the system has also been employed to monitor and alert of any rockfalls or landslides near a rail line that could endanger people or rolling stock.” Since its launch, Aura Ai-2 has already won awards including at the Securex Poland International Security Fair Awards in relation to its perimeter protection capabilities. With a combination of performance, reliability and flexibility, Aura Ai-2 is finding new and innovative uses as Mark Horton concludes, “This powerful solution has many potential uses and is already being utilised to protect the security of vital government facilities, military installations, critical infrastructure and custodial facilities.”
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalise the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly competitive landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved customer engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance traditional security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased market growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide status updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetising smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and ASSA ABLOY (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions and consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasising the impact of consolidation Emphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specialising in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New avenues of growth" The early days of new ownership is opening fresh opportunities for both organisations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organisation, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance Search The company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The growth of the cannabis market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalised in dozens of U.S. states, and Canada is on the verge of legalising the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Axis Communications, the global provider of intelligent surveillance technology, yesterday held the official launch of the new Axis Experience Centre in Luton. The event was a chance for Axis’ partners to meet with the senior management team and explore how the new centre operates, all the while celebrating the company’s 20th anniversary over a glass of champagne. The centre was officially opened by Axis Communications co-founder Martin Gren, along with Bodil Sonesson, the company’s VP of Global Sales. The toast was led by Atul Rajput, Regional Director, Northern Europe. As one of Axis’ first ever employees, Rajput was particularly well placed to thank partners for their collaboration over the last twenty years. As celebrations continued, SourceSecurity.com was lucky enough to join Axis’ partners in a tour of the new facility. Exploring the Axis Experience Centre What immediately became apparent was that this was no ordinary showroom. In contrast to open-space demonstration rooms traditionally favoured by the security industry, the Experience Centre takes end users on a flowing tour where they can experience Axis solutions in a variety of environments simulating real-world problems. The tour typically takes two hours, and is designed for small groups of people to allow in-depth discussion of the difficulties end users are facing. Atul Rajput (Regional Director, Northern Europe), Bodil Sonesson (VP, Global Sales) & Axis Communications co-founder Martin Gren officially open the Experience Centre Axis open platform solutions One highlight of the experience is the AXIS Camera Application Platform (ACAP), which allows partners to solve specific customer problems by downloading third-party applications to Axis IP cameras and encoders. Typical end user problems highlighted by the tour include queue management, people counting and intrusion detection. The solutions are all fully interactive – on passing through a gateway, an audio alert notifies participants that they are trespassing, while three participants standing in a given space can trigger air conditioning and ambient audio. The most immersive part of the experience is the ‘dark room’, which simulates all kinds of challenging lighting conditions including the intense backlight that may be experienced at a building entrance or window. On leaving the room, participants are shown how Axis’ WDR cameras capture extremely detailed images despite the challenging illumination. Other highlights include the networking centre, which demonstrates Axis hardware and third-party switches, and the VMS control room, which features a new user interface and can be integrated with intercoms, speakers, and access control systems. Smart solutions for businesses and cities The overriding theme of all areas of the tour is the emphasis on applications, not products. Rather than being directed to a particular product to suit a given vertical market, end users and installers are encouraged to discuss the real-world challenges they face, and explore how Axis solutions could work for them. In this way, enterprises, small-to-medium businesses and Smart City providers can all be catered for. The concept is already proving successful – over the last month, the facility has been in use every day!
Immersive Display Solutions, Inc. (IDSI) announced that it has selected the Barco F70 for its advanced dome display project. Using thirteen F70-4K6 projectors per dome and featuring the powerful Barco Pulse electronics processing platform and unique Single Step Processing (SSP) pixel-shifting technology, the integrated solution from IDSI will support high-performance fast jet pilot training. This selection continues the successful relationship which has been built between IDSI and Barco over many years and has produced some of the highest quality display systems in the industry. Barco F70-4K6 display projector The F70-4K6 is a high performance, robust laser-phosphor projector with sealed optics and minimal number of moving components inside. This construction enables rugged performance that ensures stability and predictability over the 60,000-hour lifetime of the product. 4K resolution is achieved using the high bandwidth Barco Pulse electronics platform and the proprietary SSP technology. All this leads to the delivery of exceptionally sharp and detailed dynamic imagery allowing trainees to detect moving objects at long distances and totally immersing them into the perfect simulation experience. The team at IDSI is well-respected throughout the industry for their precision, quality, and low-risk approach to program requirements “Our relationship with Barco is built on performance, support, and trust,” says George Forbes, President and founder of IDSI. “When we decide on which projector to use for a project, we consider much more than the technical performance- which has to be there. We know we can rely on Barco, and that the entire Barco Simulation team from top-down is behind us, and that is a big factor in who we choose to partner with.” IDSI-Barco partnership “The team at IDSI is well-respected throughout the industry for their precision, quality, and low-risk approach to program requirements,” says Dave Fluegeman, VP, Simulation at Barco. “Our teams have always integrated very well, and when there is a seamless approach and singular focus to a project, the likelihood of success is always very high.” Recently IDSI won the ‘Small Business of the Year’ award after careful selection by the MS&T judging panel and votes by the simulation and training industry. The honor was awarded for their way of leveraging human capital, innovation and agility to grow and meet client needs, all while cultivating and growing technical and social influence in the community. The Barco F70-4K6 in turn received an honorable mention as an Outstanding Innovative Product that has positively impacted the client’s ‘way of doing business.’
Located in the middle of the deep forests of Småland in the south of Sweden, the Strandudden Gated Community has been designed to provide a safe environment for homeowners who wish to enjoy a high quality of life. The first phase of the development has seen the construction of 18 apartments which have stunning lake views. The materials and features of each apartment have been carefully selected to ensure sustainable energy consumption. When the development is completed, over 100 Wisenet cameras manufactured by Hanwha Techwin, will enable security personnel to closely monitor the movements of people and vehicles as they enter and move around the public areas of the gated community. Ensure strict compliance Equally important, the massive processing power of the chipsets of the open platform cameras means that our client is able to run specialist applications" 6 Wisenet cameras were initially installed during the construction of the apartments. These have been used to ensure strict compliance with the site’s healthy & safety regulations and to keep a close eye on valuable plant and machinery. “We evaluated products from a number of different manufacturers, but the superb quality of the images captured by the Wisenet cameras made it a very easy decision for us to recommend that they should be deployed throughout the Community,” said Henrik Carlsson, CCTV Product Manager for Elajo, one of Sweden’s electrical, mechanical, engineering and energy installation companies who were awarded the contract to manage the project. “Equally important, the massive processing power of the chipsets of the open platform cameras means that our client is able to run specialist applications, such as licence plate recognition (ANPR), in order to control vehicle access to the Community.” High quality images The Hanwha Techwin Europe pre-sales and technical teams have worked closely with Elajo to ensure the best camera types have been specified for each of the carefully chosen camera locations. 6 different Wisenet models have been selected to ensure high quality images can be captured day or night and that there are no blind spots. Among these is the Wisenet IP network PNP-9200RH 4K PTZ dome which has built-in IR illumination. The PNP-9200RH, which is IP66 and IK10 rated for vandal-resistance and outdoor use in the harshest environments, utilises Progressive Scan technology to provide sharp edges on moving subjects and vehicles. The PNP-9200RHs which have been installed at the entrance to the Community are equipped with the Wisenet Group ANPR solution which provides the opportunity to automatically control the movement of white listed cars through barriers via camera relay outputs. Drag and drop tool Images from all 100 cameras will be displayed in the Community’s control room via Wisenet WAVE video management software (VMS) Developed by Hanwha Techwin in partnership with analytics experts, FF Group, the solution uses camera-to-camera IP communication technology to enable up to 4 Wisenet Group ANPR cameras to work together, with data from each simultaneously transmitted to a single web based display. Images from all 100 cameras will be displayed in the Community’s control room via Wisenet WAVE video management software (VMS). An intuitive ‘drag & drop’ tool makes it extremely easy for operators to set up a display of live and recorded images on a single screen or video wall, with customisable layouts and sizes. Other key features include a virtual PTZ which, with just simple clicks of a mouse, enables operators to zoom in to see close up detail of any suspicious activity, whilst motion detection and video analytics support can be configured to generate alerts when user defined incidents occur. Auto-discover feature “Wisenet WAVE has proved to be extremely easy to use and it is a significant bonus that, with minimal training, operators are able to take maximum advantage of its wide range of innovative features,” said Henrik Carlsson. “It has also helped reduce installation costs as it has an auto-discover feature which means connected cameras can be addressed and set up within just minutes.” In addition to the images being displayed in the Community’s control room, should an incident occur that needs a rapid response, security personnel on patrol will be able to remotely view any activity via a smartphone or tablet with the help of the secure Wisenet Mobile App. PNP-9200RH: Wisenet P 4K PTZ IR dome camera PNM-9020V: Wisenet P 7.3 megapixel multi-sensor 180˚ Panoramic camera PNV-9080R: Wisenet P 4K Vandal-Resistant IR dome camera PNO-9080R: Wisenet P 4K IR Bullet Camera QND-7080R: Wisenet Q 4 megapixel IR dome camera XNO-6120R/FNP: Wisenet X ANPR camera
New security and surveillance upgrades have been announced at Manchester Arena, with the first phase expected to be complete by mid-autumn. The system upgrade includes the installation of next generation camera technology combined with cutting-edge access control and is set to be rolled out ahead of a number of high-profile events that are being staged at the arena this autumn. Following the installation of the latest state-of-the-art security cameras, developments include super high definition 4K resolution images and enhanced video analytics with appearance search, plus self-learning analytics with presence/absence detection and the ability to detect unusual motion events. Similar effective solutions Reflex systems was chosen by SMG Europe having looked at similar effective solutions designed and installed by them at the award-winning Leeds The new facilities will also see an improvement in data management and delivery, and form part of an expanding security network which enables remote monitoring off-site at venues across the UK. The large-scale upgrade will be implemented by South Yorkshire-based firm Reflex Systems, a security system installer whose previous projects include providing deployable security systems for the G8 Summit, as well as work at off-park venues at the Olympics, Wimbledon, and Wembley Stadium. Reflex Systems will be leading on the Manchester Arena upgrades. The specialist firm was chosen by SMG Europe having looked at similar effective solutions designed and installed by them at the award-winning Leeds first direct Arena and other large capacity public venues. Intelligent video stream Lee Sinnott, senior facilities manager at SMG Europe, said: “The scope of the project was to deliver a powerful scalable end-to-end surveillance solution over an IP network, employing the latest HD/4K cameras, video analytics at the edge and through an intelligent video stream data management system.” Results allow us to actively monitor & effectively manage large crowds in differing light conditions both in real time and forensically “The challenge to find the right surveillance system with state-of-the-art technology that operates in a harsh light environment was realised through a detailed study and product testing with temporary camera deployments during Arena events. The results allow us to actively monitor & effectively manage large crowds in differing light conditions both in real time and forensically, post event. Providing video evidence of the highest quality was an important deliverable on the project.” Public venue applications “The planned installation of an expanded access control solution with system integration into the CCTV was a key part of the project. The electronic access control system will now provide us with the capability to respond to national threat levels and dynamically deploy a range of security measures through a powerful user interface.” John Pye, managing director of Reflex Systems, said: “Some of the technology involved in the upgrades at Manchester Arena is very new in terms of its features, and is a convergence of security with IT and advanced management software.” “We have significant experience in the area of public venue applications, and through our expertise and technology partners we deliver solutions which allow venue owners, whatever scale, to provide safer and more secure environments for everyone.”
Sonitrol, the provider of verified electronic security, announces the successful implementation of a Sonitrol TotalGuard system for 4EverReady Home Care, located in Cincinnati and Dayton, Ohio. TotalGuard, innovated by 3xLOGIC, has alarm verification capabilities that detected an incident outside the premises, which led to a successful resolution of a potential false alarm situation. 4EverReady Home Care is a privately-owned home care agency based in Dayton, Ohio. The organisation is committed to providing clients with the highest quality care possible, while allowing them to maintain both freedom and independence in the comfort of their homes. Incident triggered alarm 4EverReady has two locations, in Cincinnati and Dayton. Late on a recent evening, surveillance video from inside the Cincinnati location showed a person standing outside the office when suddenly a car drove by the intersection. The person in the video made a hasty retreat from the building and crossed the street. What had happened? “We recognised the man in the video, he’s often in the neighbourhood and because our offices are all glass looking out to the street, we can observe him and others walking up and down the nearby sidewalks,” recounted Lisa Roberts-Rosser, Executive Consultant for 4EverReady. “Because this incident triggered an alarm from our system, Sonitrol of SW Ohio brought the video to my attention, I was the first person called. I knew the man in the video, and I’d never seen him move that fast.”Sonitrol operator was able to quickly determine that the offices were not in danger of a break-in, therefore, this was not an active alarm Area under protection The Sonitrol operator was able to play the video with the related audio to figure out that the passing car had actually fired (turned out later) a paintball gun at the man in front of 4EverReady’s offices, causing him to flee. More importantly, the Sonitrol operator was able to quickly determine that the offices were not in danger of a break-in. This incident occurred outside the area under protection; therefore, this was not an active alarm so no further action was necessary. “We installed the Sonitrol TotalGuard system back in April and our system’s two cameras give us all the visibility we need. Our office is essentially one big room and the cameras give views in the office and through the windows into the immediate neighbourhood,” Roberts-Rosser explained. Motion detection technologies In addition to video surveillance with video and audio alarm verification, the TotalGuard system includes glass break detection and motion detection technologies. 4EverReady has also installed a Sonitrol Cloud Access, which provides key fob entry through the office main entrance. Roberts-Rosser and any other staff with privileges can remotely arm and disarm the TotalGuard system with a smartphone through the available Sonitrol mobile app. “TotalGuard provides us complete alarm verification capability, and the mobile app definitely works well for us,” she explained. “If there is a time that someone has forgotten to arm the system upon exiting at the end of the day, I can arm the system from home or wherever I am.” Legitimate alarm situation 4EverReady has a consultant that uses the office space for meetings after hours, to prevent any interruption of the normal daily work flow. Roberts-Rosser can program the TotalGuard system from anywhere, at anytime, to grant the consultant access when it is needed. The sensitivity of our system is impressive, when it was first installed it was alarming because of loud music outside, cars backfiring, and other loud noises In addition to TotalGuard picking up an incident outside the area of protection, Roberts-Rosser said there has been a process to calibrate the system to be as effective as possible. “The sensitivity of our system is impressive, when it was first installed it was alarming because of loud music outside, cars backfiring, and other loud noises. Once a neighbourhood child pulled on the door while horseplaying around and that definitely caused an alarm. Working with Sonitrol, we’re able to verify all of these incidents to make sure we are only contacting the police when it’s a legitimate alarm situation.” Highly-effective system As is becoming abundantly clear in recent years, police forces are not unlimited resources. Sonitrol TotalGuard has proven to be a highly-effective system in cutting costly, even dangerous, false alarms. “TotalGuard is a technology package no other company is offering security customers, it is a genuine game changer, and this incident proves the technology goes above and beyond in protecting customer’s property, even if the action is well outside the area under surveillance,” said Alison Shiver, Marketing Manager, Sonitrol of SW Ohio.
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about 22% of which is recovered by law enforcement agencies. Other nations have similar results. Acts of violence are committed in about four percent of the robberies, with employees suffering the most injuries; other countries are not immune and the rate varies around the world. Small banks and branch offices of banks are typically targeted nearly 47 times more often than main offices are in large institutions worldwide. The continuing deployment of IP megapixel camera technology is leading to more identifications and apprehensions of criminal suspects thanks to improved image quality delivering outstanding live video and forensic recording. Panoramic megapixel cameras provide undistorted, high-quality video with 180-360° coverage, non-stop indoors and out. Bank & finance applications Deter internal and external theft Overall security with enough detail for customer and staff ID and vehicle/license plate ID Megapixel provides the ability for facial detail Improve staff productivity Resolve staff and customer disputes Protect staff, customers, equipment and assets Ability to cover more with less (instead of manpower to control PTZs, panoramic cameras can cover it all of the time) Increased detail equals better forensics and reduced time from police and security professionals in post event investigations Monitor daily business Forensic documentation to build cases Provide security, situational awareness, life safety Prevent fraudulent claims Quantifiable return on investment What Arecont Vision Costar's customers say Omar Valdemar, CPP, VP – Manager, Security Solutions, City National Bank, comments: “When City National Bank began integrating high quality megapixel security system solutions, Arecont Vision Costar was among many cameras that were tested. Arecont Vision’s high resolution and WDR technology made their cameras instrumental tools in City National’s security design.”Alex De Barros of AV Enforce (integrator for ABSA Bank, South Africa) says: “Arecont Vision Costar outperforms all the current competitors. The price compared to analogue cameras is better considering the fact that you gain so much. We were able to capture images for the bank that were never achieved before.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that Frederick Douglass High School (FDHS) has deployed a highly-successful video surveillance installation that helps ensure two points of alarm verification to sharply reduce false alarms. In the summer of 2017, Sonitrol of Lexington and Bates Security completed one of the companies’ most innovative installations. The project includes verified audio detection, verified video, and an advanced access control system. FDHS, located in Lexington, KY, comprises 350,000+ sq. ft. with over 90 staff and hundreds of students. The video surveillance system utilises 192 3xLOGIC HD and IP camera models with analytics software for verification and network health monitoring WDR HD and IP cameras for clear pictures The video surveillance system utilises 192 3xLOGIC HD and IP camera models with analytics software for verification and network health monitoring. Sixty cameras are deployed outside the building and 130+ are located inside throughout the facility. The system features wide dynamic range cameras that automatically adjust to environmental lighting and allow the end user to see clearly out of a sun-lit window or in pitch-black darkness. The cameras record to six 3xLOGIC V7300 servers. “Every door has a strike and motion detection, every lower level room has an audio sensor,” explained Sean Moberly, Sonitrol of Lexington Project Manager, who designed the system. “Every entry has a sensor and panic buttons, and we have Sonitrol access control for 12-15 doors. We concealed the door readers with built-in pockets, so the reader is not exposed but still effectively reads cards. We have video verification at every entry door.” Easily accessible security system Moberly continued, “School staff and Law Enforcement are extremely pleased with 3xLOGIC and the technology the company offers. They love the image clarity and the range of coverage it provides with the zoom feature. They appreciate the ability for easy access with cell phones and laptop computers and told us how user friendly the system is. Upon receiving an audio detection alarm at the central station, the Sonitrol operator also receives video footage for every camera connected to that alarm point “This technology allows the user to conduct faster, more efficient searches, and it enables staff to narrow searches to one area, such as a specific door, and find out quickly what you need to know. The school is so pleased they are considering migrating from their current VMS software to 3xLOGIC VIGIL. In fact, we’re talking to multiple schools who are interested in moving to VIGIL for their existing VMS.” Double verification with audio and video detection The installation features verified audio detection operating in conjunction with the verified video system. Upon receiving an audio detection alarm at the central station, the Sonitrol operator also receives video footage for every camera connected to that alarm point. This ensures double verification before alerting police dispatch and provides responding officers with up-to-the-minute intelligence on what they’ll face upon arriving at the high school. Law enforcement and the administration stated that they use it all the time to recover property from thefts or for situations where an item was lost or mislaid. FDHS administration reported that they once used the camera system to help figure out what staff propped a door open over one weekend so they could address the issue directly with that person. The ability for Sonitrol to monitor the system in real time helps ensure there will be fewer incidents of cameras and recorders being down for any length of time VIGIL Central Management monitoring software Another unique and valuable service Sonitrol of Lexington provides the high school is 3xLOGIC’s VIGIL Central Management (VCM) or health-check monitoring software. Before the client is even aware, Sonitrol of Lexington can detect and repair camera failures, as well as server and hard drive issues without even going on site. The ability for Sonitrol to monitor the system in real time helps ensure there will be fewer incidents of cameras and recorders being down for any length of time. In the long term, VCM keeps the facility much safer and reduces repair costs. The system eliminates troublesome, costly false alarms with its two points of verification. The entire system can be conveniently managed by any device with internet access or via the 3xLOGIC mobile app, View Lite II. Bates Security and Sonitrol of Lexington recently received a SAMMY Installation of the Year award for this powerful, highly-effective security system.