Winsted Consoles, racks & desks(37)
The controls form the heart of any security system. Mounting this equipment in a Premier console provides the operator with a logical and efficient working environment. These consoles are finished in beech and will raise the profile of any security room. The Premier range is modular and can be expanded by adding additional console bays and corner sections. The upper slope section is designed to accept monitors, VCR’s and multiplexers whilst the lower section is ideal for matrix equipment. Each console bay comes with cable management to aid initial installation and service.Add to Compare
Browse Consoles, racks & desks
Consoles, racks & desks products updated recently
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
Security control rooms should be functional and durable, and their aesthetics should incorporate matching colors that are conducive to a 24/7 operating environment—not too much contrast and easy on the eyes. Another factor driving aesthetics is an enterprise’s desire to create a ‘showpiece’ to demonstrate a commitment to security for shareholders and other stakeholders. “Everyone wants to have a good-looking control room and a cost-effective design,” says Matko Papic, Chief Technology Officer of Evans Consoles. Critical Role Of Lighting And Aesthetics “Lighting is a critical factor for operators,” adds Papic. Studies of control rooms have sought to address issues of circadian rhythms (physical, mental, and behavioral changes that a person undergoes over a 24-hour cycle, based on responses to light) and the impact of changing light colors throughout the day. Flexibility is key. Properly adjusted light can increase alertness at 2 a.m.; controlling the color, tone and intensity of light can increase productivity any time of day. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting. Evans Controls has experts who can do a lighting study of a room as part of construction services and consulting Aesthetics, depending on the control room, can be very important, agrees Randy Smith, President of Winsted. His company accommodates aesthetics by using a variety of matching laminates, solid (Corian-type) surfaces, and sometimes real wood. They can put in a console with matching work surfaces, a credenza or other furnishings, or can even match existing décor in a facility. Customized Tailored Furnishing Security control rooms, often operating in glass enclosures, are often used to “make a statement” about the security of a facility, says Smith. Companies want the control rooms to be up-to-date, and have “cool designs.” Sometimes they want to add a company logo to a work surface or side panels, or they want to employ corporate colors in the design. Winsted can customize its offerings to meet any such requirements, says Smith. In too many instances, the control room is an afterthought: They just install furniture that fits with the monitors. How the furnishings are tailored to the operator is often not considered, says Papic. He offers several other considerations: Will the furniture last the lifetime of the control room? How adaptable is a design to possible future changes, whether larger monitors, managing cables, or ability to reconfigure the console? Furniture should not be viewed as a transactional item; there are more issues to address beyond physically housing the equipment, says Papic. Read part 5 of our Control Rooms series here
Today, almost every employee carries with them a smart device that can send messages, capture, and record images and increasingly live-stream video and audio, all appended with accurate location and time stamping data. Provide a way for staff to easily feed data from these devices directly to the control room to report an incident and you have created a new and extremely powerful ‘sensor’, capable of providing accurate, verified, real-time multi-media incident information. You need only to watch the television when a major incident is being reported. The images are often from a witness at the scene who recorded it on their device. It is madness that it has until now been easier for people to share information around the world via Facebook and YouTube etc, in a matter of minutes, than it is to transmit it to those that need to coordinate the response. The Public As An Additional Security And Safety Sensor In the UK, a marketing campaign designed by government, police and the rail industry is currently running. Aiming to help build a more vigilant network on railways across the country and raise awareness of the vital role the public can play in keeping themselves and others safe, the ‘See It. Say It. Sorted’ campaign urges train passengers and station visitors to report any unusual items by speaking to a member of rail staff, sending a text, or calling a dedicated telephone number. Essentially, the campaign is asking the public to be an additional safety and security sensor. However, with the help of the latest mobile app technology, it is possible to take things to a whole new level and this is being demonstrated by a large transport network in the US. This organization recognized that the ideal place to begin its campaign of connecting smart devices to the control room as an additional sensor, was by engaging its 10,000 employees (incidentally, this is approximately twice the number of surveillance cameras it has). These employees have been encouraged to install a dedicated app on their cellphones that enables them to transmit important information directly to the control room, as well as a panic button for their own safety. This data can be a combination of images, text, audio, video and even live-streaming, to not only make the control room aware of the situation but give them eyes and ears on the ground. For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information Combating Control Room Information Overload For the control room operator, the insights being fed to them from this ‘sensor’ have arguably more value than any other as they provide pinpoint accurate and relevant information. For example, if an alert comes in about a fire on platform 3, the operator doesn’t necessarily require any of the information from the other sensors, nor does he need to verify it’s not a false alarm. He knows that the information received has been ‘verified’ in-person (it is also time and location stamped) and that there is an employee located in the vicinity of the incident, who they can now directly communicate with for a real-time update and to co-ordinate the appropriate response. Compare this to a 24/7 video stream from 5000 cameras. It is in stark contrast to the typical issue of sensors creating information overload. The employee only captures and transmits the relevant information, so in essence, the filtering of information is being done at source, by a human sensor that can see, hear, and understand what is happening in context. So, if an intruder is climbing over a fence you no longer need to rely on the alert from the perimeter alarm and the feed from the nearest camera, you simply send a patrol to the location based on what the person is telling you. Furthermore, if the control room is operating a Situation Management/PSIM system it will trigger the opening of a new incident, so when the operator receives the information they are also presented with clear guidance and support regarding how to best manage and respond to that particular situation. Transport networks are using staff and the public as additional safety and security sensors Application Of Roaming Smart Sensors To be clear, this is not to suggest that we no longer need these vitally important sensors, because we do. However, one major reason that we have so many sensors is because we cannot have people stationed everywhere. So, in the case of the US transit company, it has been able to add a further 10,000 roaming smart sensors. This can be applied to other industries such as airports, ports, warehouse operations, stadiums, and arenas etc. Now, imagine the potential of widening the scope to include the public, to truly incorporate crowdsourcing in to the day-to-day security function. For example, in May, it was reported that West Midlands Police in the UK would be piloting an initiative that is asking citizens to upload content relating to offences being committed. Leveraging Existing Hardware Infrastructure Typically, when introducing any form of new security sensor or system, it is expected to be an expensive process. However, the hardware infrastructure is already in place as most people are already in possession of a smart device, either through work or personally. What’s more, there is typically an eager appetite to be a good citizen or employee, just so long as it isn’t too much of an inconvenience. Innovations in smart mobile devices has moved at such a pace that while many security professionals debate if and how to roll-out body-worn-cameras, members of the public are live-streaming from their full HD and even 4K ready phones. The technology to make every employee a smart sensor has been around for some time and keeps getting better and better, and it is in the pockets of most people around the world. What is different now is the potential to harness it and efficiently bring it in to the security process. All organizations need to do is know how to switch it on and leverage it.
AMAG Technology hosted its annual Security Engineering Symposium in Miami, Florida, February 15-18, 2019 at the Trump National Doral Miami. Eighty end users, consultants and integrators were in attendance. Guests were treated to two days of interactive presentations with thought leaders in compliance, AI, edge technology, insider threat, and open technologies and were taught how to apply what it means to them to understand how to utilize the right solutions to mitigate risks, ensure compliance and save money. AMAG Technology President, Kurt Takahashi and Director of Business Development, Kami Dukes opened the conference by welcoming attendees and introducing honored guests and AMAG staff. Chief Operating Officer, Howard Johnson and Vice President of Products and Partner Programs, Jason Schimpf presented Your Voice, Our Vision, and discussed AMAG’s vision for the future which is based on customer feedback and the technology innovation needed to meet today’s threats. Discussing Security Trends Our goal this year was to change and improve the format to provide digestible, useable content that was valuable to our attendees"A Platinum panel based on the theme, Achieve More Together, discussed security trends, customer needs and how best to move forward together to be successful. Two TED style talks featured Open Ideas with Dukes and Senior Director of Global Sales, Justin Wilmas and People Within with Business Development Manager, Dan Bissmeyer. “Our goal this year was to change and improve the format to provide digestible, useable content that was valuable to our attendees, and I believe we met that goal,” said Dukes. “Our diverse audience inspired impactful discussions surrounding topics that affect vertical markets dealing with compliance challenges, and I am proud to announce that together we raised nearly $9,500.00 for St. Jude Children’s Hospital.” Integrating Access Control With Video “AMAG hosted a first-class event that provided the opportunity to network with AMAG, as well as many end users and vendors," said Salt Lake City Police Department Captain, Scott Teerlink. "The format allowed for much discussion not only about the Symmetry solution, but with how to better integrate access control with video, audio, and other innovative solutions to improve our site security while simplifying and reducing time needed to complete the critical tasks necessary to ensure our facilities are secure. “I left with a better understanding about AMAG, the Symmetry solution and what's new in the security industry. Most importantly, I met outstanding people that will be a tremendous asset as we work to adapt and evolve our systems to best meet our changing environment and needs." Building Relationships With Security Professionals The Security Engineering Symposium provided a wonderful opportunity to network and build relationships with fellow security professionals"Ten certified technology partners worked together to deliver theme-based presentations to attendees. Platinum Level sponsors, ASSA ABLOY and Vingtor Stentofon presented Living on the Edge. Gold level sponsors Axis Communications and Salient Systems presented Take Tech to the Biz. Gold sponsors LifeSafety Power and Winsted presented Automation & Compliance. Silver sponsors shared a breakout session and included Idemia, IRIS ID, LiveSafe and Wavelynx. "The Security Engineering Symposium provided a wonderful opportunity to network and build relationships with fellow security professionals," said Jorge Gomez PE, RCDD, Managing Member/Project Engineer, J&A Engineering Consultants. "The event revitalized me and renewed my excitement about the security industry." During the closing banquet, a representative from St. Jude’s Research Hospital presented about the mission and advances St. Jude’s is making in pediatric cancer research. Our generous SES19 sponsors and attendees together raised $4,728.00, which was matched by AMAG for a record setting total of $9,456.00! “We are so thankful to our integrators, consultants, partners and end users for their generosity, and are thrilled to donate such a large sum to St. Jude,” said Dukes.
AMAG Technology hosted its annual Security Engineering Symposium in Newport Beach, California, February 23-26, 2018 at the Balboa Bay Resort. Nearly 70 end users, integrators and consultants attended the highly interactive networking event. Threat Analysis AMAG Technology President, Kurt Takahashi and Vice President-Global Sales and Business Development, Jody Ross kicked off the conference with opening remarks and introductions of honored guests and AMAG staff. Chief Operating Officer, Howard Johnson presented Threat Analysis Through Machine Learning, and updated attendees on AMAG’s product roadmap and vision for the future. Breakout sessions educated attendees about Symmetry GUEST Visitor Management, Symmetry CONNECT Identity Management, the Symmetry Solution and RISK360 Incident management. Keynote speaker, Michael Gelles, managing director and security expert, Deloitte, LLP, presented Challenges to Building an Insider Threat Program where he outlined the program pillars to prevent, detect and respond, and how creating a program is a team sport. Every year I am amazed at the collaboration and networking that occurs at the Security Engineering Symposium" Security Energy Symposium “Every year I am amazed at the collaboration and networking that occurs at the Security Engineering Symposium and this year it was fantastic to see end users, integrators and consultants sharing ideas and interacting with the technology partners to learn about the latest technologies,” said AMAG Technology, Director of Business Development, Kami Dukes. “We had a record number of technology partners attend, which speaks for itself. The cutting-edge technologies demonstrated were on target with the trends we are seeing in the industry. Seeing those technologies close up and having the opportunity to ask questions was invaluable.” “This is my first SES and I was very impressed with the setup,” said Craig Vollman, a computer expert who works for a large health care insurance company. “As an end user, I especially enjoyed the break-out sessions being paired with integrators, manufacturers and consultants. It was a great experience to hear everybody’s perspective on deployment strategies and to learn about the new software and technologies being developed and implemented.” Seventeen certified technology partners demonstrated their products and solutions throughout the weekend Multiple Technology Partners Seventeen certified technology partners demonstrated their products and solutions throughout the weekend. Platinum and Gold level sponsors presented small breakout sessions. Silver sponsors shared a breakout session and associate sponsors setup booths. The impressive list of sponsors includes: ASSA ABLOY, Zenitel, Arrow, FST Biometrics with Gunnebo, HID Global, Hoverfly, NEC, Winsted, Flir, Idemia, SMI, Ticto, Arecont Vision, Barco, Life Safety Power and Wavelynx. “This is the first time I’ve participated in an event where you have so much interaction with the guests,” said Ticto Chief Marketing Officer, Bart Vansevenant. “The formula of combining end users, integrators, consultants and AMAG Technology partners is so powerful, and when combined with the small interactive breakout sessions, it is just wonderful.” The SES brings everyone to the same forum and creates an open dialog where the end users get to voice what they want to do in their business" End-Users and Integrators “The SES brings everyone to the same forum and creates an open dialog where the end users get to voice what they want to do in their business. The integrator exposes himself to what the consultants can bring to the table, and the consultants can see what the integrators are capable of,” said Automation Integrated, Director of Engineering, Ron Free. “It’s a great gathering of the minds that provides input and guidance for attendees to take back to their companies and make decisions about the direction they want to go in the market.” During the closing banquet, a representative from St. Jude’s Research Hospital presented about the mission and advances St. Jude’s is making in pediatric cancer research. Thanks to the generosity of the attendees and AMAG’s matching program, over $2000.00 was raised to support St. Jude’s. “I couldn’t be prouder,” said Dukes.
Winsted Corporation, a provider of control room console solutions, announces the promotion of Rusty Hellen into the role of southeast regional sales manager. Rusty previously worked for Winsted in the role of sales manager for the Winsted Custom Division, which he held for the past eight years. In his new position, Rusty will be responsible for managing Winsted’s dealer network in the southeast region of the U.S. Rusty will be based in Atlanta and work with dealers that service the security, broadcast, and presentation markets within a six-state area. In addition, Rusty will be responsible for direct sales to integrators who are involved in the process control and distributed control systems markets. With his promotion, Rusty will continue his efforts managing projects for the Winsted Custom Division and serve an instrumental role in new product design. “Rusty’s past experience gives him great insight into the requirements needed to design control room environments that meet our customer’s needs,” said Wayne Cook, vice president of sales at Winsted. A graduate from Auburn University, Rusty previously worked as an industrial designer.
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals
- eyevis Provides 24/7 Monitoring And Security Technology For Wind Farms In UK
- MOBOTIX Video Surveillance: Protecting Shoppers At Forum Bornova, Izmir
- Thinking Space Provides Control Room Furniture For New CCTV Hub At Blackburn With Darwen Council
- Custom Consoles MDesk-Technical Furniture Deployed At Warrior Insight