Vanderbilt Intercom: Audio, Video Intercom Systems(9)
Browse Intercom: Audio, Video Intercom Systems
- Vandal Resistant
Intercom System products updated recently
Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorized to enter? Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or invite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds. Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents. Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous challenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open. COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service. The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.
Across the world, the impact of the current pandemic has majorly disrupted how we function in our everyday lives, as a society, and the ways in which we do our jobs. Throughout, our personal safety and wellbeing, as well as that of our families, neighbours and colleagues, has been paramount - and adapting our day-to-day lives to meet social distancing measures has been a learning curve for us all. As we start to reassemble normal life, precautionary measures will continue to be put in place to achieve the universal aim of mitigating the spread of the virus as much as possible. As different countries reach new stages of this process, some parts of the world continue to live and work in lockdown, while some are beginning to open up. This means governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection as more people begin to return to the outside world. Tracing the spread of COVID-19 Of course, this will need to be driven by higher-level support from leaders in government, healthcare and technology to develop innovative ways of tracking and tracing the spread of COVID-19. From contact tracing solutions, to self-reporting apps and thermal screening cameras – governments and businesses across Europe have a new responsibility to seek and reinforce the most effective ways to ensure people’s safety. These measures are particularly pertinent to those reopening their doors as lockdown eases, and those returning to a daily routine of commuting to and serviced office spaces. As more and more people begin to move through public and commercial areas, we will rely more on technology to run in the background to ensure safety and wellbeing is monitored - much like that of the everyday CCTV camera. Thermal temperature screening cameras One piece of technology that we can expect to see as more commonplace is the thermal temperature screening cameras and monitoring system. An example of this kind of device, is D-Link’s recently launched all-in-one, intelligent fever screening kit – which includes a dual-lens thermographic camera, blackbody calibrator, as well as integrated management software. Governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection The premise of temperature screening cameras like this one, is to harness thermal imaging technology coupling it with AI to identify if a person is experiencing elevated temperatures, and raise the alarm automatically when someone at risk of spreading is detected. To monitor the progression or depletion of COVID-19, technologies such as AI facial recognition will play an important role in mitigating the risks of the virus spreading. Thermal cameras that use AI can easily capture and manage employee’s temperature and stop their entrance if a fever is detected. For this reason, such devices are normally installed in a doorway or entrance to a building to quickly detect and identify those displaying symptoms before entering a building. This type of surveillance will be detrimental to the management of COVID-19 in the world of a ‘new normal’ – as companies feel their way out and learn as they go along with people’s health and wellbeing continuing to be center of the mind. Just as lockdown has had an impact on physical as well as mental health, so too will the adjustment to living life post-pandemic. Not only in getting used to and dealing with the emotional and mental pressures of life on the ‘outside’ as they leave lockdown, but they also face the very real risk of contracting the virus and the worries they may have of spreading it. Appropriate installation of temperature screening Companies and organizations have a responsibility in these times to play a supportive role towards employees, such as allowing them to continue working from home until they feel comfortable to work in an office setting. Equally, as restrictions ease, employers have a duty to make the workplace a safe place that is able to uphold the wellbeing of staff, which is where, as we wait for a vaccine, we must make use of the available technology. However, in the case of the thermal camera, in order for it to deliver effective results, it must be installed appropriately. To support this, we have outlined some key points to consider when deploying a temperature screening camera here: Choose a solution that features a blackbody calibrator – a vital part for any temperature screening device. A blackbody calibrator is the basis for accurate calibration of infrared thermography devices and allows the device to accurately detect a fever. Check for facing windows or doorways and heat sources such as radiators as these increase the risk of stray heat or cold sources throwing off readings according to the ISO standard associated with this type of equipment Be wary of weather and changes in climate as the device will need time to acclimatise – in order for readings to be clear individuals coming in from outside must wait five minutes before being screened When mounted, the camera must face individuals head-on and in parallel with their face to capture the inner eye area which is crucial for temperature reading Consider an option using AI which will automatically recognize individuals based on photos in the system Check applicability and legality of temperature screening cameras before deploying There’s a long way to go before life will fully return to normal. In the meantime, and to help everyone along the way, it’s essential that the right measures are in place to protect the physical and mental wellbeing of those we are responsible for. For anyone who is exploring options, know that there is help out there to provide guidance and expertise on the solutions that will be right for you and your business - now, as we go through the remainder of lockdown, and as we slowly move back into everyday lives.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based solution, but also offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. API Integration In addition to DCLT’s security requirement, OLS also realized ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. Game-changer security solution According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. Cloud-based off-premise solution The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively. Commenting on the project, Oliver (Ollie) Law, Managing Director of Oliver Law Security (OLS) Ltd., stated “We didn’t hesitate to recommend the Vanderbilt ACT365 system. As a Vanderbilt Gold Integration Partner, this is our go-to product, and for Doncaster Culture and Leisure Trust, the flexibility and scalability of the product was best placed to grow with their business.” He adds, “We are fully committed to working and growing with Vanderbilt, and we look forward to other projects of this nature in the future.”
The integration developed between Vanderbilt’s ACT Enterprise access control software platform and Hanwha Techwin’s Wisenet WAVE video management software (VMS), means operators are now able to instantly visually verify access control activity and events directly from ACT Enterprise. ACT Enterprise is a role-based software platform which streamlines the monitoring and management of ACTpro access control systems comprising web-enabled door controller interfaces and MiFare and/or DESfire card readers. The integration removes the need for control room operators to use two separate software platforms to visually verify access control events. Instead, operators are able to conveniently view live streams or recorded video associated with a door, directly in ACT Enterprise. Wisenet WAVE If, for example, a door has been forced open, an operator can simply right-click on the event listed in ACT Enterprise, to immediately replay the relevant recorded video made available by Wisenet WAVE. With an auto-discover feature which enables connected cameras and third-party IP network devices to be addressed and set up in just minutes, Wisenet WAVE makes it almost effortless to monitor high-definition video streams. Wisenet video surveillance and ACT Enterprise systems are increasingly being specified for the same projects" Key features include a virtual PTZ which, with just a click of the mouse, enables operators to zoom in to see close-up detail of any suspicious activity. The latest version of WAVE, 4.1, also features push notifications of user defined alarm events which can be sent to mobile devices. Support for Wisenet AI cameras allows the attributes of classified objects or people to be forensically searched by filtering recorded metadata. Technology partnership “Wisenet video surveillance and ACT Enterprise systems are increasingly being specified for the same projects. With this in mind, we have worked closely with the Vanderbilt team to ensure our respective solutions seamlessly interact,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “This is an excellent example of two global market leaders cooperating to ensure our mutual customers are able to efficiently and conveniently obtain maximum value from their investment in a security solution.” Access control event Commenting on the success of the integration, Michael Moyna, Senior Product Manager at Vanderbilt, stated: “This integration makes for a more precise examination of the video system concerning the access control event. It also removes the operator's need to visit the control room to retrieve the footage, as it can be viewed directly within ACT Enterprise instead. This, of course, delivers an added layer of convenience to the system’s users.”
Vanderbilt, a provider of state-of-the-art security systems, announces the release of ACT Enterprise 2.14. ACT Enterprise is the company’s award-winning access control software that has a wealth of features and integrations. The latest additions in version 2.14 include extended integration with KONE and new video integration with Hanwha. The software has also added contact traceability reporting to its suite of tools. For instance, thanks to contact traceability reporting, users of ACT Enterprise can now successfully track potentially close contact cases within their building, including doors they may have interacted with. Tracking international travelers Commenting on the new feature, Alex Holmström, Global Sales Director at Vanderbilt, states: “This feature will help businesses create a safer and cleaner environment for their staff. System users can now remotely monitor their office from anywhere in the world, including tracking international travelers to their site.” ACT Enterprise 2.14 also sees additional benefits added to the software’s existing integration with KONE. By supporting KONE's latest API calls, it allows for a much faster install time compared with traditional hardwired input and outputs. Instead, ACT Enterprise and KONE software communicate at an API level. This optimizes the KONE system by having an efficient throughput within the building. Hardwired elevator control The big benefit, certainly for large buildings, is that it allows for a large increase in footfall" Michael Moyna, Senior Product Manager at Vanderbilt, explains in more detail: “The benefits of KONE integration are twofold. It makes the installation and integration of KONE and ACT much more straightforward because there is no cabling required as with traditional hardwired elevator control since the ACT software talks directly to the KONE server via the KONE API.” “The big benefit, certainly for large buildings, is that it allows for a large increase in footfall through the elevator system. This means you can prioritize elevators and make them work efficiently. For example, during morning rush hour, the elevator can be configured for optimal utilization to ensure effective throughput.” Lastly, a new release in this version is video integration with Hanwha’s Wisenet WAVE system and Dahua. These video additions complement an already rich set of integrations that include Milestones 3XLogic and Hikvision. Access control event ACT Enterprise users can play live video or recorded video associated with a door through these video integrations. Moyna expands on the value of this: “If an event happened last week where a door was forced open, the operator can right-click on the event in ACT Enterprise and simply replay the video recording from the Hanwha Wisenet WAVE system.” “This makes for a more precise examination of the video system concerning the access control event. It also removes the operator's need to visit the control room to retrieve the footage as it can be viewed directly within ACT Enterprise instead. This, of course, delivers an added layer of convenience to the system’s users,” he concludes.
Related white papers
5 Reasons To Integrate Mobile Technology Into Your Security Solution
RFID and Smartphone Readers in Physical Access Control
The Role Of IT In Physical Access Control
5 Security Lessons For Navigating COVID-19Download
Cloud Video and Smart CitiesDownload
Security Investments Retailers Should Consider For Their 2021 BudgetDownload
- Vanderbilt Installs ACT365 Cloud-Based Access Control Reader At Denmark’s Vejle Marina
- Comelit And Howarth Homes Deliver Smart Access Control And Door Entry System For Lovell House
- Fermax DUOX 2 Wires Solution For Evelina London Children's Hospital In UK
- UK Department Store Installs Traka’s Intelligent Locker Solution To Protect Customer Service Mobile Equipment