Voice recognition systems
Over the past decade, the UK has seen an upward trend in ATM attacks. British courts are acknowledging the severity of these crimes with heavy sentences being handed down in recent years. As the modus operandi of ATM attackers evolve, so too are security innovations – aimed at increasing chances of recovery and convictions and serving as a strong deterrent. Advanced systems of sensors, pressure pads, tags, beams, and cameras are being specifically developed to address the challenges of AT...
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opport...
Almost everything in the enterprise is or can be connected and powered by the IP network. Once-disparate systems – VoIP, security, computers, WAPs, lighting, and even HVAC – are converging. AV is no exception. More and more, AV systems are being migrated to the IP network. This approach is more scalable for future growth, allows extended distances for transmission, enables PoE, and eliminates the hassle and expense of installing a separate AV-only infrastructure. Delivering error-f...
Rapid aging population, high healthcare costs, and physician shortages are creating an increasing demand for care at home, especially for seniors with long-term health conditions. The GX features a LCD display that shows clock time, temperature, GSM signal strength and sensor faults to keep users fully informed at all times. GX smart care medical alarm is an all-in-one wellness, and personal safety medical alarm solution, bridging medical health monitoring and emergency alarm to keep seniors sa...
Advanced Mobile Lite Series is a 4G/LTE PERS locator that is equipped with Wi-Fi location tracking. Leveraging industry-certified A-GPS and Wi-Fi technology, Mobile Lite has improved location accuracy especially when users are inside the buildings. In addition to both GPS and Wi-Fi positioning technologies, Mobile Lite Series has built-in fall detection (Mobile Lite-R15/R18 only), providing comprehensive care for all seniors. The positional information can be accessed via Climax’s online...
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powe...
IP Communications enabler Softil announces that its BEEHD technology has been selected by Fujitsu Spain to build the ARCONTE Trial Recording System. The multilingual, secure, modular and adaptable digital recording system will allow courts to work more quickly, transparently, and cost-efficiently. The system also ensures compliance with strict mandatory data requirements across Europe, Middle East, India and African (EMEIA) jurisdictions where courts are legally required to record and store legal proceedings. Cloud-ready system ARCONTE is already used by three out of four Spanish courts and has processed more than five million court cases to date. The cloud-ready system seamlessly integrates with other judicial applications and can store more than 500,000 hours of video per year. Fujitsu now offers courts across the EMEIA region the finest trial recording system on today’s market" “Fujitsu now offers courts across the EMEIA region the finest trial recording system on today’s market,” says Vicente Delás, Director of Justice Solutions at Fujitsu Spain. “Inevitably, our developers turned to the world’s leading IP enabler Softil for its software development kit and support teams to build the Fujitsu ARCONTE system.” Case management applications “Softil’s BEEHD technology is enabling many of the world’s IP communications providers to deliver the highest quality end-products across all sectors of human activity and Fujitsu ARCONTE is a perfect example,” adds Pierre Hagendorf, Softil’s CEO. Fujitsu ARCONTE enables courts to seamlessly and securely record audio-video, and to catalogue, store, share and electronically distribute all the documentation generated during court hearings and trials. This significantly speeds up administrative processes. For minimal disruption and added efficiency, the solution can be easily integrated with other court applications, including case management applications. Data security and integrity Fujitsu ARCONTE uses digital seals and signatures to certify recordingsAs courts move towards paperless, electronic processing, the cloud-ready solution from Fujitsu offers a reliable, powerful audio and video recording platform to replace traditional documentation methods, while offering maximum data security and integrity. Fujitsu ARCONTE uses digital seals and signatures to certify recordings, helping meet compliance requirements. The new video conferencing solution is a complement of a trial recording application based on windows PC. The application allows video and voice conferencing from the same system used to record the trial and supports H323 and SIP protocols. It replaces an earlier video conferencing solution from another IP supplier from lack of support. Development of voice and video solutions BEEHD was chosen as a replacement and Fujitsu decision has “since been validated and impressed with the quality, time to market, support received and overall experience working with Softil,” adds Vicente Delás. Softil’s BEEHD technology is a cross-platform framework designed for chipset vendors, device manufacturers, system integrators, application developers and service providers looking to accelerate development of voice and video solutions over IP.
IP audio and control interface innovator Barix is heading to the ISC West 2020 security industry trade show with a wide range of powerful yet cost-efficient new hardware innovations and third-party integrations. The company will exhibit in booth 19140 at the event, taking place from March 17 to 20 at the Sands Expo and Conference Center in Las Vegas. SIP Audio Endpoint hardware A centerpiece of Barix’s new product demonstrations will be the North American debut of the SIP Audio Endpoint hardware, the company’s most feature-rich SIP interface solution to date. First unveiled at ISE 2020 in Amsterdam last month, the SIP Audio Endpoint enables integrators to seamlessly and cost-effectively bridge analogue audio inputs and outputs with SIP-based VoIP (Voice over IP) telephone systems. IP Former is Barix’s newest innovation for adding IP networking capabilities to new or existing loudspeaker designs The robust yet inexpensive device supports a broad range of audio codecs including Opus, G.711, G.722 and GSM. Contact closures allow triggering from physical interfaces such as call buttons, while features such as DTMF tone dialing support maximise integration possibilities. IP networking capabilities Additional highlights at the Barix booth will include: IP Former is Barix’s newest innovation for adding IP networking capabilities to new or existing loudspeaker designs. Replacing the 70/100V transformer traditionally used with analogue loudspeakers, the PoE-powered device provides an IP network interface, audio stream decoder and amplifier front-end for a two- to eight-ohm speaker. Flexibly supporting a wide range of security applications including paging and emergency warning systems, IP Former decodes PCM, AACplus, MP3, Opus, G.711 and G.722 audio streams delivered via HTTP, RTP or UDP, and also features SIP negotiation for use with VoIP phone systems. The Barionet family of I/O, IoT sensor and interface controllers are the preferred choice of security integrators and system designers for controlling, automating and monitoring critical systems in both in commercial and residential environments. The openly programmable Barionet devices provide robust bridges between IP-based security platforms and physical interfaces such as distress buttons, fire alarm panels, motion sensors, light switches, door activators and more. Barix will display Barionet models ranging from the base Barionet 50 to the latest-generation Barionet 400. Barix will also highlight new integrations and interoperability between the above offerings and enterprise-class mass notification systems including Singlewire Software’s InformaCast, Syn-Apps’ Revolution and Honeywell’s Unified Notification Platform (UNP), enabling users of these platforms to benefit from the reliability and cost-effectiveness of Barix hardware endpoints. Audio across IP networks Barix supplies simple and reliable solutions and components to systems integrators and end users worldwide “Barix continues to develop innovative hardware solutions that deliver exceptional reliability and value for security applications in their own right, but we also recognise that their benefits are further unlocked as part of complete, unified ecosystems,” said Reto Brader, CEO of Barix. “We look forward to showcasing not only our new solutions also our new integrations and partnerships to ISC West attendees.” Show attendees can receive a free ISC West expo pass courtesy of Barix by registering via the link. Barix supplies simple and reliable solutions and components to systems integrators and end users worldwide. They move high-quality audio across IP networks, adding value to customer solutions for nearly two decades with hundreds of thousands of devices installed worldwide. Advertising insertion for retail shops Background music distribution with dynamic advertising insertion for retail shops, bars and hotels; public address solutions for schools and public spaces; and intercom and entry systems for facility surveillance, protection and security are among the many applications of Barix solutions. Barix also supports OEM projects for a number of Global 500 listed companies serving many industries worldwide.
Matrix COSEC Time-Attendance Solution promotes a smart and productive workplace. It is a one-stop solution for managing and controlling the attendance data. Time-attendance solution The Time-Attendance Solution is designed to meet the diverse requirements of any organisation by offering a superlative range of flexibility in attendance policies, configuration, integration and report generation. Additionally, it offers features like automatic calculation of overtime and much more! Key Features of the Matrix COSEC Time-Attendance Solution include: Multiple Credentials - Mobile, Biometric, RFID Cards Real-time Monitoring Comprehensive Reports Real-time Alerts and Notifications Seamless Integration with Payroll, ERP or HRM Software Security and Telecom solutions expert Established in 1991, Matrix is a globally renowned company in the field of Security and Telecom solutions for modern businesses and enterprises. As an innovative, technology driven and customer focused organisation, the company is committed to keep pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance Systems as well as Telecom Solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints.
FIME has been accredited to test biometric components in line with FIDO Alliance’s Biometric Component Certification Program. The accreditation enables device manufacturers and solution providers to ensure the quality and performance of biometric authentication solutions including fingerprint, facial, voice, and iris recognition. "In an age dominated by cumbersome passwords, biometric authentication delivers stronger security while improving UX. And in a post-PSD2 world, it’s a compelling option for the payments world to meet new Strong Customer Authentication (SCA) requirements,” comments Stephanie El Rhomri, Vice President of Services at FIME. Usability of biometric authentication FIME offers a broad portfolio of biometrics services including consultancy, customised test strategy development, and expertise on use of biometric ISO standards. “Expanding our existing biometric offering is an important strategic move for us. FIDO Alliance is leading biometric authentication standardisation efforts and we’re proud to be sharing our support and expertise that we are developing with insights from two research projects to help advance its success.” continues El Rhomri. “The Biometric Component Certification Program is the first of its kind in the industry, enhancing the security, interoperability and usability of biometric authentication methods," Dr. Rae Hayward, Certification Director, FIDO Alliance said. “Support from testing experts such as FIME is invaluable to the continued success and adoption of our standards and, in turn, moving us closer to our goal of removing reliance on server-side passwords to authenticate users.”
Viking’s K-1900-712L-IP panel phone is durable, easy to use, and provides added strength to hold up under heavy abuse. “The shortened, reinforced armored cable increases safety for users and may discourage potential abusers.” – James Catt, Engineer, Viking Electronics. The K-1900-712L-IP vandal resistant VoIP SIP panel phone is equipped with a short 12-inch armoured handset cable to reduce the risk of users harming themselves, their surroundings, or the phone itself. Protection against environmental factors The armoured handset cable is reinforced with an internal steel lanyard to withstand abuse from users pulling and tugging on the handset. Key features include a vandal resistant handset and cable, plus a heavy-duty stainless steel faceplate. Viking’s Enhanced Weather Protection option is available for added protection against environmental factors. The K-1900-712L-IP is PoE powered and compatible with a wide array of VoIP SIP phone system providers Each K-1900-712L-IP phone offers a built-in 4 number auto dialler which cycles through pre-programmed numbers on a busy signal or no-answer. An onboard relay can be programmed to trigger security devices or access control when the phone is in use or when a correct touch tone code is entered by the called party. The K-1900-712L-IP is PoE powered and compatible with a wide array of VoIP SIP phone system providers. Security and communication products Viking Electronics engineers and manufactures over 500 security and communication products in the USA. Products include emergency phones, entry systems, paging interfaces, mass notification systems, hotline phones, autodiallers, enclosures and more. In addition to their extensive analogue line, Viking offers a large selection of IP products that are SIP compliant. Based in Hudson, Wisconsin, Viking’s legacy of reliability and electronic innovation spans 50+ years. Viking builds products that are designed to last and they also offer many of their products with enhanced weather protection. Offering free lifetime product support they also back their products with a two-year limited warranty.
Discreetly place emergency calls at the touch of a button with reliable emergency communication provided at fingertips of users with the PB-3-IP Panic Button from Viking Electronics. “This is what people have been asking for – it’s quick, it’s discrete, it’s reliable. People know they can trust the PB-3-IP when it counts.” said Greg Yocom, Engineering Manager, Viking Electronics. PB-3-IP Panic Button The PB-3-IP is designed for VoIP SIP systems and is PoE powered. The panic button can be programmed using Viking’s IP Programming software and receives automatic firmware updates. The versatile PB-3-IP also features an on-board relay for activating security cameras, emergency lighting, or any other device triggered by a dry-contact.The panic button can be programmed using Viking’s IP Programming software and receives automatic firmware updates The PB-3-IP panic button is designed to mount under a desk or countertop and place discreet emergency phone calls when activated. A built-in auto dialer will roll through up to 5 phone numbers until the call is answered. Silent monitoring After answering, a prerecorded location announcement is delivered to the called party and one-way audio is sent from the PB-3-IP for silent monitoring. The called party can easily engage in two-way communication after the call is connected by pressing touch tone “#”. Viking Electronics engineers and manufactures over 500 security and communication products in the USA. Products include Emergency Phones, Entry Systems, Paging Interfaces, Mass Notification Systems, Hotline Phones, Autodialers, Enclosures and more. In addition to their extensive analog line, Viking offers a large selection of IP products that are SIP compliant. Enhanced weather protection Based in Hudson, Wisconsin, in USA, the company’s legacy is of reliability and electronic innovation that spans 50+ years. Viking builds products that are designed to last and they also offer many of their products with Enhanced Weather Protection. Offering free lifetime product support they also back their products with a two-year limited warranty.
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system Educating the smart home consumer Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app. Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities. Smart technology is increasingly becoming the new norm in terms of home security Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. Secure homes through smart technology Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door. It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course. In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi. "Smart" security on the move The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change. Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock. Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore Holiday rentals and smart home tech ASSA ABLOY research published in 2017 forecasts continued growth in the European holiday rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travellers. A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built holiday rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. Travellers use their phones and an app to unlock their apartment. For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.
Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution Global terrorism is on the rise. For many years, the West felt immune to these incidents, often asserting that these were problems felt only in countries with heated conflicts, such as Syria, Iraq, Israel and Nigeria. However, recent terror attacks have taken place in both Europe and the United States: Belgium, France (Paris and Nice), Orlando, various cities in Germany, Turkey, and the list goes on.The intelligence community is constantly looking for a single-point “source” to help prevent the next terror attack. However, in my experience serving as Head of Military Intelligence of the Israel Defence Forces, and through my work with the international intelligence community, I have learned that such a single source does not exist. There is no simple solution to terror prevention.Proactive and combined approachBut taking a proactive approach can help the fight against terror. To be proactive, the intelligence community must create an ecosystem of information—a network of interconnected sensors that combine to provide a clearer picture of the situations that security agencies must assess to prevent attacks from happening. The intelligence community must create an ecosystem of information—a network of interconnected sensors that combine to provide a clearer picture When it comes to preventing terror, this network might include an array of sensors: signal intelligence, cyber intelligence, visual intelligence—not only from satellites—surveillance balloons, drones, special forces, human intelligence, interrogations and others. Any of these sources alone would not get the job done; combined, however, they provided a clear picture of the security landscape. Intelligence agencies collect all these single points of information and fuse them together. Almost in real-time, this fusion creates actionable intelligence for end-users (special forces, air force, any actor who can utilise the intelligence). This combining of sources we employed in my career led me to understand the power of fusion.The power of fusion is the key to effective preventative security.Global megatrends and demand for convenient securityThere are two relevant megatrends in the world right now: Urbanisation and the rise of the megacity, which inevitably leads to rising crime rates The need to prevent terrorism With these two relevant trends, increased security has become a necessity. However, there is a misconception that increased security means increased inconvenience for people. As such, there is a need to create systems that provide the high level of security necessary in today’s world, given the aforementioned megatrends, while still maintaining the convenience and pace in our everyday lives. Biometric technology provides an answer to this. If we can quickly and securely identify individuals before they enter a building—or prevent them from doing so—many security crises can be prevented before they take place. Power of fusion and multi-modal biometricsThis is where the power of fusion comes into play. Any biometric sensor on its own – facial recognition, fingerprints, iris recognition, voice recognition—cannot provide the accuracy, speed, or ease of use needed for strong security that is also convenient for the public.Developing an effective biometric technology for secure access requires us to build a new intelligence ecosystem—a fusion of technologies that provide speed and accuracy, and are simple for the end-user. The most secure and convenient biometric technologies for identity verification must use the power of fusion. We find these types of solutions in multi-modal biometric technologies. Multi-modal biometrics allow people to move freely, yet securely, through their daily lives Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution. This can include software that uses a fusion of biometric technologies, smartphones that require access via a fingerprint and PIN code, or access through voice and facial recognition, to name just a few. The primary advantages of such systems are the heightened levels of accuracy and security, as well as greater levels of accessibility and flexibility for users.The industry is trending towards adoption of multi-modal biometrics. This is because stand-alone biometric technologies, such as iris scanning, face recognition, fingerprinting or otherwise, are exposed to a) questions of accuracy and b) the ability for fraud to attempt to trick the system. But, by fusing a number of technologies such as face, body and voice, we can create a system that is highly accurate. In cases in which in-motion identification is part of the technology, a user may not even be required to stop for identification. This fusion of sensors allows us to identify a person in real-time, with high accuracy and speed. By employing the power of fusion, neither security nor convenience need be compromised. Adoption and real world use of multi-modal biometrics The use of multi-modal biometrics is expanding, and is being sought after by some of the largest companies in the world to secure facilities. Market research firm Technavio predicts that the global advanced authentication market (multi-factor and biometrics solutions) will experience a CAGR of 17 percent between 2016 and 2020. Lead analyst Amrita Choudhury commented that threats in the realm of digital security in retail, healthcare and the banking and financial services industry are driving companies toward multi-modal biometrics. According to Choudhury, multi-modal biometrics will likely gain widespread acceptance over the next four years. The use of multi-modal biometrics is expanding, and is being sought after by some of the largest companies in the world to secure facilities While we often see multi-modal biometrics in homeland security, military and law enforcement applications, more often, these technologies are being deployed for consumers. For example, certain smartphones, such as the Samsung Galaxy 5S, utilise face and voice biometrics for greater authentication accuracy. We can also see these technologies in banking apps and cloud platforms focused on the enterprise security market.However, multi-modal biometrics are certainly not limited to the digital/cyber realm. In fact, physical locations – buildings, healthcare facilities, corporations, schools and universities, stadiums and airports could all benefit from more secure and more convenient access made possible by multi-modal biometrics.We live in a world in which we contend with new threats created by rising crime and terror. By applying the power of fusion to physical secure access technologies, we can increase the level of security that is necessary without feeling that we live in a police state. Multi-modal biometrics allow people to move freely, yet securely, through their daily lives, providing access to those we recognise, and allowing the power of fusion to prevent access to those who are unfamiliar. In this way, we can practice proactive preventative security without encroaching on the pace of life.
Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this strategy is outdated, similar to how watching silent movies is now obsolete. A security team who solely uses video to evaluate a situation is left with data that is limited and many times inconclusive. Only with the integration of audio into existing security systems is a security officer able to fully understand the gravity of a situation and be better equipped to respond to the danger. Many leaders in the education sector have begun to emphasise the importance of adopting audio in monitoring programs and security protocols including Guy Grace. Grace is an industry veteran with over 31 years of security experience. He is a Steering Committee Director for PASS, the Partner Alliance for Safer Schools, as well as the Director of Security & Emergency Preparedness for Littleton Public Schools. “Sound and sight are the new dynamics in school surveillance so to say,” Grace said. “I look at it as we need both.” The security director also affirmed that audio monitoring, especially when conducted through two-way solutions, is a great tool to provide accountability. “All of your first customer service interaction between your office staff and your visitors starts there at that intercom. Sometimes in very rare situations, it can get volatile,” Grace explained. “So it’s good to have, for those types of situations, the ability to hear and record what’s going on at your key customer service points.” Benefits of audio on campus When audio is paired with video, security needs are met and additional evidence is gained. Integrating microphones with cameras gives staff access to more details about a suspect or scene. Voices, names, languages spoken and directives are just a few examples of what information can be aggregated. This additional data is crucial for first responders as they assess the suspect’s intentions and threat level. When audio is paired with video, security needs are met and additional evidence is gained Video cameras are effective surveillance tools, but they are not able to capture everything. A small school may only have a few cameras installed throughout their grounds, creating surveillance blind spots for select buildings or areas. Meanwhile, a large entity, such as the Los Angeles Unified School District, which has over 900 schools, has hundreds of cameras. These cameras cannot be monitored at all times. In both cases, deploying audio solutions would automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Dissuading young offenders Beyond detection, audio monitoring creates opportunities for prevention. In a situation where a rowdy teen walks onto school property after hours, a two-way audio unit allows security to speak to an individual remotely in real-time. Having the ability to communicate in real-time can be a powerful warning that dissuades a trespasser from vandalising the property or committing other offences. Conflict resolution Conflict resolution is another key benefit of audio monitoring. Bullying is one of the most prevalent issues concerning school communities today. According to the National Centre for Education Statistics, about 22 percent of students ages 12-18 reported being bullied at school. Installing microphones at a school’s key traffic or interaction points provides accountability by documenting what is said, which can then be used to resolve disputes or placate verbally hostile individuals. Audio analytics for aggression detection In addition to audio monitoring equipment, school administrators should also consider deploying audio analytics solutions. Specifically, aggression and gunshot detection are some of the best security tools in the campus security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. "Audio analytics solutions are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security" A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. Audio monitoring: Privacy best practices The benefits of integrating audio monitoring and sound detection into a school security solution are clear, but before any administration implements these systems, they need to understand the correlation between monitoring and privacy. The federal law indicates that when there is no expectation of privacy, such as in a public place, monitoring is supported. What school administrations need to focus on as they deploy surveillance solutions, is removing the expectation of privacy. Here are few best practices. Post clearly visible signage stating that audio and video surveillance are taking place on the premises. Typical places for mounting these signs can include school fences, main entrances and the main office. Notify students that the school is under surveillance by stating it in the student code of conduct. This increases awareness and reduces a school’s liability should an individual claim he or she did not see a sign on campus. Remind school staff of the purpose of the monitoring equipment. Reiterate that security personnel will only use audio to investigate and resolve wrongdoings so as to enhance the safety of staff and students. Conclusion Audio monitoring is quickly gaining attention in the education sector. It is a technology that is a cost-effective add-on to an existing system, making it an affordable solution. Moreover, audio yields a high return on investment, and for that reason, we will likely see schools across the country continue to adopt it.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalised service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client data storage and backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data centre in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric circles of security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the centre of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data centre(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorised badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-tonne truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data security process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorisation Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behaviour and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analysing body recognition factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognising the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analysed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognised. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behaviour and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognise people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorised to be a passenger in their car (to identify possible car-jacking scenarios).
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
Founded in 1927, the University of Houston (UH) is the renowned public research university in Houston and the third largest university in Texas. In 2018, UH enrolled 46,324 students per semester in 261 undergraduate and graduate academic programmes — both on campus and online. The UH System comprises four universities and six multi-institution regional campuses that offer degrees in partnership with the universities. The University of Houston is the largest and most comprehensive institution of the UH System. UH System UH has grown to service the city of Houston and beyond through their extensive educational offerings, partnerships UH has grown to service the city of Houston and beyond through their extensive educational offerings, partnerships, and contributions to the community. A recent market analysis supported a demand for UH programs in the Sugar Land and Katy communities, and the UH System responded with constructing one new building on each campus. The University’s Sugar Land location serves about 2,200 students and offers a variety of classes that lead to undergraduate and graduate degrees from UH, including a Second Degree BSN program. The new College of Technology building at Sugar Land is a 100,000 sq. ft. facility with state-of-the art features. The three floors include classroom space and research labs, auditoriums, student lounge areas, faculty and staff offices, and a greenhouse area. University campus security The expansion of UH at Sugar Land will offer greater opportunities to prepare career-ready students poised for leadership in technology. The new instructional building at UH at Katy is an 80,000 sq. ft. facility and houses programs from the UH College of Nursing and the UH Cullen College of Engineering. Class enrollment at the University of Houston (UH) at Katy is more than 600 students. American Direct was chosen to provide its advanced access control solution, AccessNsite for the Sugar Land campus and American Direct’s partner, Skyhawk, was chosen for the Katy UH campus. According to American Direct Vice President of Sales, Todd Neely, ”American Direct was able to provide significant savings to University of Houston because, instead of considering product mix for two different buildings individually, they were able to use similar product mix on both buildings and reduce the amount of coordination time to manage both projects”. AIPHONE IXSeries VoIP intercom The mix included hard wired, card-based, Mercury panels and IN-120 and IN-220 battery-powered WiFi locks. Sugar Land also uses AIPHONE IXSeries (VoIP, Voice over Internet Protocol intercoms) at the entrances to the building and on each floor near the elevators. Integrating with existing systems, like AIPHONE, is possible because of AccessNsite’s multi-layer security integration. This flexibility component is a significant contribution to the complete access control solution. Proximity card readers The card readers are proximity readers where the user just taps their card on the reader American Direct and AccessNsite staff consulted with the general contractor, Tellepsen Builders Construction, to discuss if all doors should have card readers and who should be granted access. The card readers are proximity readers where the user just taps their card on the reader or gets close enough to the door so that the lock picks up the credentials. A card swipe is no longer needed with proximity readers. Providing Division 8 and 28 products and services for the same client on one job is extremely efficient according to Todd Neely. He adds, “It eliminates the scope gap and the possibility of trying to identify the area of responsibility, should an issue occur. For example, if there is an issue with a door opening, then we take care of that issue as the total openings solution provider.” Secure door access control solution Neely further stated, “Providing doors and access control together for one client involves massive internal coordination with the entire team from the onset of the project. “We have meetings very early on to talk about what we need to do to meet all of the requirements of the project. This makes it easier to coordinate shop drawings and submittals and determine what needs to be included.” Tellepsen Project Manager, Cameron Carter recalls a great working relationship with American Direct Procurement (AccessNsite access control solution provider). Cameron said, “The University of Houston (UH) changed a few things near the end of the construction process and American Direct and AccessNsite were in direct contact with them about the changes. On a project like this, you can easily run into issues late in the game, either with the security or door people, and find out that an installation needs adjusting. We were able to minimise those kinds of issues by using American Direct and AccessNsite for all of the access control. It was a smooth, fluid process.” AccessNsite access control technology Finding a balance between securing buildings and keeping a friendly campus feel is not easy, but the right openings solutions can help. Advanced access control technology, like AccessNsite, can give campus security teams more control over their environment. AccessNsite is a total access control software solution with powerful systems interoperability and automation configurable to a building’s distinct and specific needs. This ultimately goes a long way in ensuring that students and staff feel safe as they move in and out of classrooms throughout the day. The University of Houston (UH) is full steam ahead in student growth. It is likely that the growth of UH campus buildings will follow. American Direct and AccessNsite will be ready to provide the total openings solutions.
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualisation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfil project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customised alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilised or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realise independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
One of the world’s most famous hotel-chains, DoubleTree by Hilton, part of Hilton Worldwide, has selected a high-performance fire system from Advanced Fire Systems Inc. at their eight-storey, 366 room hotel in Boston, Massachusetts. The challenge was to replace an existing system, integrate speakers to all guest rooms and ensure that all audio messages and strobes were fully synchronised across the hotel, in the event of a fire situation, without the need for costly re-wiring. Advanced audio system The Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync" An Advanced audio system was specified by the stylish, four-star, DoubleTree by Hilton Boston North Shore as it met regulatory requirements for the low frequency 520 Hz warning tones necessary for the sleeping areas of the hotel and its award-winning emergency communications system, PerfectSync, synchronised tones and digital messages to ensure compliance with local codes. Christopher Whitmarsh, President at Hayden Systems, Inc., commented: “I was confident that the Advanced equipment could meet the application requirements based on my knowledge and experience with the equipment. In this case, the Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync, ensuring the hotel adhered to strict guidelines. The system integrated seamlessly into the fabric of the building and provided the client with a solution that met their needs as well as satisfying the rigorous demands of the local fire authority.” PerfectSync emergency communications system PerfectSync automatically synchronises audio, voice and strobe signals across Advanced’s Axis AX fire alarm networks dynamically, as conditions change. Synchronisation of audio and visual signals across multiple notification zones, floors & areas, prevents confusion in an emergency situation and aids in meeting intelligibility standards. Using high performance, distributed, digital amplifiers that come standard with an integral backup amplifier and power source, should a fire spread to an adjacent floor or area, audio and visual indicators come on immediately, and the audio messages will quickly synchronise with any identical audio message on the system. Advanced’s Axis AX fire alarm system Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format, offering a vast range of configurations, control and interface options all with simple set-up and operation. The Axis AX systems includes easily networked panels, audio panels and command centers, DynamixSmoke smoke control and a huge range of peripherals, devices and interfaces that make it ideal to suit almost any fire and life safety application. Advanced fire systems Mike Troiano, President and CEO of Advanced in the USA, said: “Advanced fire systems are specified in some of the most famous and prestigious hotels across the world and it was a pleasure to work with our customer Hayden Systems, Inc. to provide a system that will meet the rigorous standards required and ensure that the DoubleTree by Hilton’s staff and guests alike are safeguarded.” “PerfectSync insures synchronisation of audio, paging and strobe signals without the need for special wiring or programming, it’s all done automatically by the Axis AX system. Since its introduction in 2014, Award Winning PerfectSync has built a solid reputation with engineering firms and fire authorities alike for its ability to deliver superior performance. The end result is a technologically advanced, easy to use audio and visual communications system that improves life safety for all of the occupants of a building in an emergency situation.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control centre in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfils the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Round table discussion
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?