Switchers & Switches - Expert commentary

Surge Protection For Security Installations: 2017 Saw Increased Investment
Surge Protection For Security Installations: 2017 Saw Increased Investment

In 2017, DITEK saw how power surges from the many natural disasters that took place damaged many businesses. In a natural disaster, or even everyday business operations, a facility’s entire investment in security, life safety and surveillance systems technology can be disabled or rendered useless in a few seconds. Surge protection solutions can mitigate those risks and protect security investments. Proactive Approach To Risk Mitigation Throughout 2017, we also witnessed a change in how enterprises view surge protection, which included how investments are being made in surge protection to protect valuable security, life safety and surveillance systems, while also reducing downtime, manpower costs, liability vulnerabilities, and possibly compliance issues that can force businesses to actually cease operations. Effective security management is about mitigating risks. But risks cannot be mitigated without a proactive approach. Enterprises and integrators, who take the time to assess risk and to develop a strategy to incorporate effective detection, deter and response criteria to protect physical assets will be successful in 2018. 2018 And Beyond That strategy includes designing surge protection into new security systems, while also adding surge protection to existing systems. Enterprises and security integrators who implement a surge protection strategy during security planning processes – or after – will be exercising prevention and mitigation, and they will be successful in 2018 and beyond.  Surge protection devices have an untapped potential for enterprise surveillance and security systems In 2017, Ditek continued to offer security end users a solid surge protection solution. We also successfully educated system integrators, who are seeking value-added products or services to incorporate into their portfolios, on the importance of surge protection devices. Educating Security Integrators We believe that surge protection devices have an untapped potential for enterprise video surveillance and security systems, because they can and do meet safety and security challenges that have been rarely identified in the past. We are looking forward to 2018, when we will continue to develop new surge protection products – including a new product engineered to protect up to twelve individual fuel dispensers, which is critical to the financial operation of convenience stores. We will also continue to educate security integrators about the importance of including surge protection in the design/build RFP, to not only secure an enterprise’s valuable security equipment, but also to help integrators to differentiate their capabilities and knowledge from the competition.

Technology Evolution Leads To Changes In Security Control Room Furniture
Technology Evolution Leads To Changes In Security Control Room Furniture

Technology is changing the look and function of today’s security control rooms. Old-school CRT (cathode-ray tube) monitors are giving way to the thinner, flat screen monitors in the control room environment, but the transition is gradual. Randy Smith of Winsted still sees many control rooms that need to make the conversion, which is a boon to his company’s business. Furniture today is designed differently to accommodate the thinner monitors, often with larger screens. Need For Integrated Rack Systems With the increase of IP-based systems comes the need for integrated rack systems that include advanced functionality such as cable management, adds Jim Coleman, National Sales Manager, AFC Industries. Server rooms are environmentally controlled by cooling systems and power systems monitored on the IP network. Low-profile flat screens allow centers to utilize space vertically, thus creating a smaller footprint for the consoles. Additionally, with IP-based systems, workstations will have a smaller footprint because there is less cumbersome equipment. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security, says Coleman. This environment also helps with cable and power management. AFC builds technical furniture racks that adhere to the precise needs of computer network server room operators. The company designs and fabricates LAN workbenches with versatile functionalities, and server room workstation racks that are scalable. There is a complete line of IT workbenches, IT computer racks and computer server rack mounts with flexible mounting options. In most cases the servers are stored in a secured, climate controlled environment to eliminate overheating of the servers and maintain their security Flexible Control Room Designs Matko Papic, Chief Technology Officer of Evans Consoles, says the transition from bulky CRT equipment to flat-screen (lower profile) monitors was a major disruption in control room design; it changed the whole dynamic. Another evolution is the use of IP video streaming, which allows more flexibility in manipulation of audio-video content, and requires more flexible control room designs. Another shift, driven by larger, higher-definition monitors, is a shift to fewer monitors that display more information. Instead of a smaller monitor for each information stream, larger monitors now consolidate that information into “dashboard” displays. Looking ahead, control rooms will need to be more flexible, both in the initial design and the ability to adapt to changing technology, says Papic. Legacy customers who are currently using PCs may be moving to more remote applications. Sit-stand equipment will continue to be increasingly prevalent. “There will be more emphasis on flexibility, technology integration, and the ability to change over the life of the system,” says Papic. Consolidation Of Multiple Operations Into A Single System A trend in security is consolidation of multiple physical operations into a single system, says Papic. As a result, more customers are taking more interest in alarm management and situational awareness. How is the technology being used in terms of alarm triggers? How can the systems react rapidly and provide information to a larger audience in the control room? These questions impact how control rooms are designed, and Evans Consoles can adapt lessons learned from other markets to these trends in the security arena. Greater use of technology is inevitable, says Coleman of AFC Industries. “It is virtually impossible for humans to monitor all security data at the street level in our cities,” he says. “As computers become more powerful and their programs more all-encompassing, we will see a greater shift to robotic and technology uses that will provide enhanced monitoring capabilities and safety reactions.” Read our Control Rooms series here

Will Security Industry Consolidation Stifle Innovation?
Will Security Industry Consolidation Stifle Innovation?

The security industry will continue to see consolidation through acquisition in 2017. At the advent of IP camera adoption, we saw a great decline in large vertically integrated companies, which spurred a new era of innovation within smaller IP camera manufacturers, VMS providers and other hardware companies for storage and managed switches.   We are now living in a new era of consolidation that is taking us full-circle back to vertical integration. Ultimately, the industry as a whole suffers because this consolidation will stifle innovation until the next big technology disruption takes shape. Interoperability Across Different Verticals  This time last year, we noted that the marketplace was moving toward converged technologies and the need for alarm management across multiple platforms into a common interface, turned out to be a popular request. If anything, we are only seeing just the beginning phases of this transition. The biggest surprise is that interoperability is not only confined to security technology, but also extends to parallel systems such as building automation, safety and environmental controls, and even Enterprise Resource Planning (ERP) software. Using Video Event Management Software (VEMS) alongside these intelligent platforms proves to be a valuable verification process for many new and exciting vertical markets. Arteco plans to continue the revenue growth and brand awareness achieved in 2016 Event-Based Video Security Software At Arteco, our highest growth sectors tend to be slightly insulated from economic fluctuation in the sense that we focus on securing critical infrastructure (electrical utilities and communications) as well as corporate and education campuses. Unfortunately, the continued growth in active shooter incidents have made physical security concerns top of mind for many organizations regardless of economic impact. The unexpected repercussions are that many new security technologies are emerging that cater to real-time event notification on both the macro and micro level. The exciting part of this trend is that users are leveraging a layered approach with multiple autonomous applications working together toward a common goal to improve security, which will hopefully ensure a high level of protection.  Business Growth And Challenges Business has continued to grow year-over-year, and 2016 was a huge step forward for Arteco not only in terms of revenue growth, but also increased brand awareness in the United States and abroad. Our biggest challenge continues to be the crowded VMS market, which is filled with lower cost or even free substitute products. We are making great strides in overcoming this challenge by having a wonderful team of people, both on the technical and sales side of the organization, who are focused on finding new and innovative ways to advance intuitive, open and affordable event-based and intelligent video security software into 2017. See the full coverage of 2016/2017 Review and Forecast articles here

Latest Bosch Security Systems news

Bosch Security Systems Unveil Version 4.8 Of Its Building Integration System To Enable A Safe And Contactless Access Control Environment
Bosch Security Systems Unveil Version 4.8 Of Its Building Integration System To Enable A Safe And Contactless Access Control Environment

Bosch Security Systems has released version 4.8 of its Building Integration System (BIS) which offers safe, touchless access control solutions to curb the spread of viruses like Covid-19. Secure access control solution BIS 4.8 supports biometric and mobile device authentication and provides building managers enhanced integration of fire panels and intrusion panels to ensure the security of buildings. The global COVID-19 pandemic has caused building operators to rethink their access control solutions In light of the global COVID-19 (coronavirus) pandemic, building operators need to rethink their access control solutions. Instead of systems that require physical touch and thereby increase the risk of virus transmission, contactless solutions that still meet the highest security guidelines are preferable. BIS 4.8, Building Integration System In response to these requirements, BIS 4.8 expands on the trusted features and benefits of version 4.7 to now work with three different touchless solutions that safeguard personal health: Face recognition - BIS 4.8 has been redesigned to work with the face recognition solution from Idemia. The face recognition device obtains a biometric scan from a safe distance and matches facial features with credentials in an encrypted database. Doors and gates open via the BIS Access Engine and the Bosch Access Modular Controller (AMC2). Touchless fingerprint readers - Integrated with Idemia’s Morphowave reader, BIS 4.8 controls access via a touchless fingerprint scan. A simple wave of the hand in front of the touchless sensor triggers a 3D scan of four fingers. Access rights are confirmed within less than one second by the system's fingerprint database for a clean and highly secure solution. Access via mobile phones - In conjunction with the mobile access control solutions from STid and HID, BIS 4.8 allows users to use their mobile phone instead of a card for access at the secure reader. For STid’s Mobile ID, the method requires a STid reader, while a Bosch Lectus secure reader works with HID’s Mobile Access solution. Users only need to install an app to verify access rights and use the safe, wireless technology. Aside from facilitating contactless access, all three solutions are also intuitive, quick and convenient compared to keycards and similar methods as there is no need to carry an access card or remember a password in order to gain entry to a building or area. Seamless fire and intrusion panel integration Combining BIS 4.8 with Bosch B and G Series intrusion panels unlock a new level of convenience Combining BIS 4.8 with Bosch B and G Series intrusion panels or MAP 5000 panels unlocks a new level of convenience. Users require only one authorization badge to control two systems. Disarming areas of the intrusion system and granting access can be realized with the same badge on the same reader, without entering a PIN code for easy, one-step authorization. Improved flexibility and efficiency With the introduction of version 4.8, BIS continues to unify the management of multiple security and safety domains and maximize flexibility for key customer requirements. New features include: Integration of the latest Bosch Avenar 2000 and 8000 fire panels and peripherals, along with command and control via BIS, with devices and status shown on maps, and events managed more intuitively via an alarm list. User authorization for Bosch B and G Series intrusion panels are managed directly within BIS for up to 2,000 users on as many as 25 intrusion panels, instead of handling authorizations separately on each of the 25 panels. Central overview of all existing access and B and G Series intrusion authorisations for the complete installation within one system. With these updates, BIS 4.8 helps operators meet the health and safety demands of the new reality without compromising on functionality and security. As a centralized platform for operational building management, the new version of BIS offers greater convenience, flexibility, and efficiency.

ASSA ABLOY Integrates Aperio Wireless Lock Technology With Connect ONE Platform From Connected Technologies
ASSA ABLOY Integrates Aperio Wireless Lock Technology With Connect ONE Platform From Connected Technologies

ASSA ABLOY Opening Solutions completed the integration of their Aperio® wireless lock technology with the Connect ONE® cloud-hosted management platform from Connected Technologies, Monument, Colo. Connect ONE manages all connected customer devices, including wireless and hardwired locks, access control, intrusion, video surveillance, critical environmental monitoring and energy management from a single interface. “We’re excited to present this integration with industry leading ASSA ABLOY Aperio wireless devices to Connect ONE dealers,” said Mike Simon, Managing Partner of Connected Technologies. Global wireless platform “Now, dealers can easily expand their services to more doors and offer new protection possibilities that save installation time and money. In addition, the Aperio/Connect ONE integration works with popular Bosch, DMP, ELK and Honeywell Vista panels so they can be up and running with new specs quickly.” The Aperio integration offers Connect ONE customers an easy way to connect additional wireless locks to new and existing installations. Aperio is a global wireless platform that works with extensive locking hardware options from ASSA ABLOY Group brands, offering the flexibility to address a variety of applications throughout any facility. The platform uses wireless communication (IEEE 802.15.4) between the lock and an Aperio hub to provide real-time communication to the access control system, simplifying installation and reducing costs. Encrypted wireless connection The integration also allows for a mapped hardwired relay output to initiate an auxiliary control upon access Aperio wireless locks map directly to the intrusion areas for an immediate armed status review to deny access when armed and can also disarm intrusion with proper authority upon granted access at the lock. Since the wireless locks are highly integrated with the control panel, user permissions are applied exactly the same for hardwired readers, allowing for a mix of wireless and hardwired reader/locks without additional set-up complexity. The integration also allows for a mapped hardwired relay output to initiate an auxiliary control upon access and a relay output to control an external door opener. Aperio locks use an encrypted wireless connection to an Aperio IP hub; each hub can communicate to a maximum of 64 locks. Highly flexible solution “Connect ONE offers a simple, scalable solution that complements the Aperio offering perfectly,” stated Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions Americas. “This integration will offer dealers and end-users a highly flexible solution for comprehensive access management.” Connect One’s ScanPass® Mobile Credential smartphone control is also supported with the integration, eliminating the need for card or fob credentials. Dealers can contact ASSA ABLOY to become certified to offer Aperio locks, which come in a variety of form factors and can be purchased through ASSA ABLOY Authorized Channel Partners.

Bosch Security Systems Protect Unmanned Train Depots On Southeastern Rail Network In The UK With Intelligent Video Analytics
Bosch Security Systems Protect Unmanned Train Depots On Southeastern Rail Network In The UK With Intelligent Video Analytics

One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analog legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports color filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorized entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.