Airports & Ports Security Applications
Dallmeier offers comprehensive security solutions for all areas of application around airports. Specifically, in the area of cameras a wide range of systems allow customers to tackle all of their safety and security challenges and be able to comply fully with operational and regulatory requirements. On top of that, Dallmeier supplies video management solutions that not only give operators an exhaustive overview of security-relevant events, but also allow the video data to be analyzed with a vi...
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Though it has been statistically proven that taking a plane is no riskier than taking a bus, people do have reasons to put extra caution on air travel safety, especially in a time replete with terrorist threats. A major line of defense must be the various sections of the airports, which, as a gateway to the outside world and transportation hub of the city, has always been on the top of the safety list of the government and all related authorities. Dahua’s Airport Solution is an intelligen...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
USS Iowa: A Naval Treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a...
Airports and ports are subject to a tough balancing act when it comes to security measures. On the one hand, these locations must maximize the movement of passengers and cargo to ensure a happy customer experience, while at the same time exercising security measures that will ensure their safety. Access Points In Transport Hubs Airports and ports are large areas with many access points, a necessity to facilitate the efficiency needed to handle the large volumes of traffic they generate. This a...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI Technology And Surveillance Solutions Artificial Intelligence technology built into surveillance solutions help organizations optimize their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organizations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organizations overcome this challenge and optimize their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognizing people, vehicles and even behaviors. Detection And Prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial intelligence changes all this by recognizing potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How Does Artificial Intelligence Work? Artificial intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognize different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organizations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organizations can enhance operational efficiency by making use of the data report. Increasing Commercial Success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organizations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organizations the opportunity to personalize the service experience, foster loyalty and maximize customer lifetime revenues. Artificial Intelligence can help organizations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organizations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centers to map footfall at peak times, ensuring that staffing is optimized to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximize the sales opportunities. Artificial Intelligence At Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognize, classify and respond to security threats. This article was written by Hikvision.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SecurityInformed.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organizations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organizations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritizes use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratization of AI in the IP camera market.Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding The Global IP Camera Market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analyzed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-Processor-Enabled Video Analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most timeMicroprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognize how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast Processing For Rapid Response At City Level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyze traffic situations Quick local decisions on the video cameras are also used to help analyze traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-Time HD Video Monitoring And Recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-Gen IP Cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognized in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyze the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalization. Each camera at the edge can be personalized to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recognizer on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI At The Edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
Cloud platforms and applications are becoming prevalent across security solutions. In the simplest terms, cloud systems store and access data and programs over the Internet instead of using an on-premises computer server. The cloud is a metaphor for the Internet. This technology helps security integrators provide managed services and the advantages of off-site systems and services to customers, which is why cloud computing is often mentioned among the 'megatrends' in the physical security industry. Here is part one of our Cloud Security series. Cloud Computing The way users purchase services and products is changing in all walks of life, including the physical security market. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. Data capture form to appear here! This approach has come from the consumer realization that the outcome is more important than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products. And it coincides with a rise in cloud computing. The cloud is a metaphor for the Internet and the way users purchase services and products is changing in all walks of life, including the physical security market With the physical security industry becoming ever more integrated – and truly open systems now a reality – there is every reason to assume this service-led trend will come to dominate the way our industry interacts with its clients as well. Customer choice equates to a change of focus and interest, with physical products being eclipsed by the benefits of the overall solution. Cloud-based services put the onus on the result rather than which device the user chooses. There are benefits for security providers too. Rather than simply 'shifting boxes' and enduring the inevitable sales peaks and troughs this creates; Security as a Service (SaaS) sales allow manufacturers and installers to enjoy a more stable business model. Cloud-Based Solutions Will Have Large Impact “Cloud-based solutions will continue to have a large impact across the security industry in 2019,” says Fawzia Atcha, Vice President, Imron Corp., one of our Expert Panelists. “We saw this trend dominate product offerings in the home security market throughout 2018. We expect the commercial and industrial markets to move in this direction as well, thanks to customer demand." More and more businesses are realising that leveraging the cloud is the most efficient way to solve emerging challenges" "End users are looking for more streamlined experiences, opting for applications that can be accessed remotely from mobile devices as opposed to desktop software or through a server. Dealers and integrators are seeking to increase recurring monthly revenue through managed services to drive their bottom line. These are just some of the factors driving strong adoption of hosted and web-based cloud solutions.” “More and more businesses are realizing that leveraging the cloud is the most efficient way to solve emerging challenges,” says Ron Virden, Chief Operating Officer, ACRE, LLC, another Expert Panelist. “Cloud-based applications offer significant financial savings by enabling more cost-effective scaling, as well as a reduction in hardware maintenance and management costs, more resilience, ease of mobile support, flexibility, and greater user experience.” Integrators are adjusting business models to leverage cloud-based solutions and there has been a rise of cloud-based products and offerings Accessibility, Infrastructure And Management Wayne Jared, VP Engineering of 3XLOGIC, Inc., another Expert Panelist, lists three features of cloud-based SaaS that are the most valuable: Eliminating the need for internal infrastructure, and thus upfront costs and long-term maintenance issues; Allowing “experts” to manage the environment and take the burden off stretched or non-existent IT staff; Accessibility from anywhere for ease of use with higher-level security. There has been a rise of cloud-based products and service offerings that security integrators have access to. While a few key players have offered cloud-based solutions for a couple of years, on the video side in particular, now the cloud is really picking up steam across all other security and life safety solutions. As a result, integrators are adjusting their business models to leverage these cloud-based solutions into recurring revenue models as managed security service providers (MSSP). Part two, coming soon.
Terrorism is among the more unyielding security threats worldwide, but a report on global terrorism from the Institute for Economics & Peace, Sydney, Australia, provides reason for optimism, especially outside the world’s terrorism hot spots such as Iraq and Afghanistan. Europe is the region with the biggest improvement from the impact of terrorism and has recorded a marked fall in terrorist activity. The number of deaths in Western Europe fell from 168 in 2016 to 81 in 2017. Turkey, France, Belgium, and Germany recorded the most significant falls, with only the United Kingdom, Spain, Sweden, Finland, and Austria registering increases. As a whole, deaths from terrorism fell for a third consecutive year, after peaking in 2014. Bombings and armed assaults have been the most common form of terrorist attack every year for the past 20 years. Ranking Countries Based On Impact Of Terrorism The Global Terrorism Index (GTI) was developed in consultation with the Global Peace Index Expert PanelThis article excerpts some of the insights from the Institute for Economics & Peace’s report Global Terrorism Index 2018: Measuring the Impact of Terrorism. The Institute for Economics & Peace (IEP) is an independent, non-partisan, non-profit think tank dedicated to shifting the world's focus to peace as a positive, achievable, and tangible measure of human well-being and progress. The report ranks individual countries based on their impact from terrorism. The Global Terrorism Index (GTI) was developed in consultation with the Global Peace Index Expert Panel. The GTI scores each country on a scale from 0 to 10; where 0 represents no impact from terrorism and 10 represents the highest measurable impact of terrorism. Countries are ranked in descending order with the worst scores listed higher in the index. The United Kingdom scored 5.610 on the GTI scale, up seven spots in the ranking to No. 28. By comparison, the United States scored 6.066 (up 12 spots to rank No. 20), France scored 5.475 (ranked at No. 30) and China scored 5.108 (ranked at No. 36). Fall In Deaths But Rise In Terrorist Incidents Twenty-one countries in Europe recorded improvements on their GTI score in 2017, with 11 registering deteriorations in their scores. The impact of terrorism fell for the region on average. Europe recorded the largest percentage decrease in deaths from terrorism of any region in the world in 2017, with total deaths falling by 75 per cent. In Western Europe, deaths from terrorism fell by 52 percent, from 168 in 2016 to 81 in 2017 In Western Europe, deaths from terrorism fell by 52 per cent, from 168 in 2016 to 81 in 2017. From January until October 2018, fewer than 10 deaths were recorded in the region. Despite the fall in deaths, the number of terrorist incidents increased to 282 in Europe in 2017, up from 253 in the prior year. Furthermore, eight countries in Western Europe recorded at least one death from terrorism in 2017, the highest number in the past 20 years. 27% Decrease In Total Number Of Deaths At the top of the global ranking, No. 1 is Iraq (which scored 9.746 and accounted for 25 percent of the deaths from terrorism) and Afghanistan is No. 2 (with score of 9.391 and representing 23 percent of deaths). The rest of the Top 5 countries are Nigeria, Syria and Pakistan. Iraq recorded over 5,000 fewer deaths from terrorism in 2017, while Syria recorded over 1,000 fewer deaths The total number of deaths from terrorism fell by 27 per cent between 2016 and 2017, with the largest decreases occurring in Iraq and Syria. Iraq recorded over 5,000 fewer deaths from terrorism in 2017, while Syria recorded over 1,000 fewer deaths. The fall in deaths was reflected in scores on the GTI, with 94 countries improving, compared to 46 that deteriorated. Extremism Linked To Ex-Criminals There is a growing body of evidence that indicates people in Western Europe with a criminal background may be especially susceptible to alignment with extremist beliefs, radicalisation, and possible recruitment by terrorist groups, according to the report. Extremists groups provide a ‘redemption narrative’ for alienated young people with a criminal background, while also allowing them to use their illicit skills and networks. Most of the studies conducted in Western Europe find that more than 40 per cent of foreign fighters and those arrested for terrorist activity have some form of criminal background. This pattern of recruitment is of particular concern for countries in Western Europe, with the number of returning foreign fighters expected to grow in the years ahead as ISIL continues to crumble in Iraq and Syria, say the researchers. Increase In Far-Right Political Terrorism Elsewhere, the threat of far-right political terrorism is on the rise. There were 66 deaths from terrorism caused by far-right groups and individuals from 113 attacks for the years from 2013 to 2017. Of those, 17 deaths and 47 attacks occurred in 2017 alone. The majority of attacks were carried out by lone actors with far-right, white nationalist, or anti-Muslim beliefs In Western Europe, there were 12 attacks in the United Kingdom, six in Sweden, and two each in Greece and France. In the United States, there were 30 attacks in 2017 which resulted in 16 deaths. The majority of attacks were carried out by lone actors with far-right, white nationalist, or anti-Muslim beliefs. The GTI is based on the National Consortium for the Study of Terrorism and Responses to Terrorism (START) Global Terrorism Database (GTD), the most authoritative data source on terrorism today. The GTI produces a composite score so as to provide a ranking of countries on the impact of terrorism. The GTD consists of systematically and comprehensively coded data for 170,000 terrorist incidents.
Cybersecurity has become a major element – and a major source of discussion – in the physical security marketplace as a result of the rise in networked systems. And we may still not be talking enough about cybersecurity. Here is part one of our Cybersecurity series. “Cybersecurity requires everyone in the security industry to be playing offense and defense at the same time, every single day,” says Bill Bozeman, President and CEO of PSA Security Network. “It needs to just become part of the standard conversation when we are talking about physical security because they are so intertwined.” Creating New Industry Leaders Cybersecurity and physical security can be seen as two parts of a single entity, and increasingly the two will be combined at the enterprise level over the next several years. “This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership,” says Rob Lydic of ISONAS, now part of Allegion. Data capture form to appear here! Cybersecurity issues dominate almost every discussion in today’s physical security industry, and the clear message is that “manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities,” says Lydic. He contends that cloud services providers (such as ISONAS) are more cybersecure and reliable ‘by orders of magnitude’ than non-cloud solutions. Cybersecurity is linked to cloud-based systems and managed security service provider models Cloud-Based Services The Security Industry Association (SIA) has listed cybersecurity as one of 2019’s ‘Top Megatrends’ in the physical security market. SIA says it is important to prioritize cybersecurity among security businesses, for customers’ businesses, and for vendors. The trend calls for continual process improvement and investment. Bill Bozeman of PSA Security Network agrees: “Cybersecurity has definitely taken a strong foothold in the industry.” With the continued expansion of cloud-based services, cybersecurity will be more important than ever to integrators, manufacturers and end users alike, he says. Notably, cybersecurity is directly linked to two other important industry trends listed by Bozeman: cloud-based systems and the rise in recurring monthly revenue (RMR) and managed security service provider (MSSP) models, whose focus will include cybersecurity. Loss Prevention Executives The days when cybersecurity was exclusively the domain of the information technology (IT) department are gone. “Cybercrime is one of the biggest threats organizations of all sizes and types face today,” says Michael Malone, CEO of ADT Cybersecurity (formerly known as Datashield). “Considering the magnitude of these crimes, it now falls on the entire organization, including the traditional security or loss prevention executives, to band together to combat these threats.” Cybercrime is one of the biggest threats organizations of all sizes and types face today Malone favors (and his company offers) a managed detection and response (MDR) service, which combines advanced technology and human analysis. Using packet capture on the network, an MDR analyst can ‘replay’ a cyber security event and dig deeper into the incident and determine remediation steps. It’s an approach that significantly cuts through false positive ‘noise’ so security teams can focus on what matters. Helping Security Officers Interestingly, cybersecurity is poised to benefit from another major trend in the physical security market – the rise of artificial intelligence. Specifically, machine learning applications for cybersecurity include: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. But AI in this case is not a panacea. Christopher McDaniels of Mosaic451 recommends pairing human intellect with machine technology to sort through data faster and catch hackers before they do much damage. Part two of our Cybersecurity series coming soon.
AIG, Aéroport International de Genève, is one of the most dynamic airports in Europe. In 2012 alone it handled almost 13.9 million passengers and 193.000 flights to 120 destinations, serviced by 200 different companies. Obviously, with these figures, security is an important issue and needs to be up to standard at all times. Managing Access For A Large Workforce The implemented AEOS platform controls the access of a workforce of 9,500, manages 37,500 badges, 200 organizations working at the airport’s facilities. Securing and controlling such a dynamic environment requires a flexible access control system, based on state-of-the-art technology which is able to meet present demands as well as future security requirements. Handling Multiple Access Control Technologies One of the main reasons for AIG to choose Nedap AEOS as its security management platform was its radical different architecture based on software components. AEOS software components allow the platform to support and enhance the airport’s security policy and procedures. Furthermore, changing requirements can be put into effect much more easily. Another reason to choose AEOS is its capability of simultaneously handling multiple reader and credential technologies in a single platform. Single Card Access Control Four different identification technologies are used simultaneously in AEOS access control functionality at Geneva Airport: Nedap, Mifare, Legic and Magnetic stripe, each technology serving a different purpose. The Nedap Combi card has been put into place, which combines all the required technologies, therefore increasing convenience for the users, as they do not have to carry four different cards.
Levels of security inside the Aviation industry have never been higher; mainly due to increased terrorism threat levels across the globe, combined with a worldwide rise in smuggling activity. No airport is immune from these pressures and Ghana’s ‘Kotoka International’ can now claim to meet ACC3, the highest accreditation in the aviation industry, thanks to their recent investment in the latest generation of IP CCTV systems from Hikvision. Ghana’s Kotoka International Airport Established in 1994, Aviance Ghana Ltd provides a range of ground handling services at Ghana’s Kotoka International Airport, situated just outside the capital, Accra. The airport itself is Ghana’s premier international flight center and is capable of accepting large aircrafts, such as the latest generation of Boeing 747.Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents It occupies more than 650 hectares, with two large terminals for domestic/regional and international/long-haul operations that are connected by an internal walkway. Terminal 2 is the principal international departure terminal and includes restaurants, duty-free shops and two Executive lounges for First and Business Class travellers. There are also two smaller terminals dedicated solely to diplomatic flights and military operations. Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents. At Kotoka, the ground services include managing all the passenger concourse facilities in Terminal 2, plus passenger check-in and baggage handling, the loading and unloading of cargo from freight flights and a cargo warehouse operation for all import and export needs. Overriding Security Objectives Given that today’s security concerns require the aviation industry to maintain very high levels of protection measures, close scrutiny of the 650 hectare site that the airport occupies and protecting passengers, aircraft and cargo were the twin key objectives for Aviance when deciding to upgrade the Airport’s CCTV system. The company also recognized that intelligently deploying the camera infrastructure would be necessary to maximize cost-effectiveness and efficiency.The new Skylink CCTV system design uses four different types of Hikvision IP camera Aviance Ghana turned to Skylinks Technical Services Ltd and tasked them with designing a solution that would enable it to meet the EU’s ACC3 accreditation, the highest accreditation in the aviation industry. In turn, Skylinks turned to Hikvision for the design of an all-IP CCTV system capable of not only meeting the current challenges facing Aviance in its operation at Kotoka International Airport, but also providing an expandable base that could rise to meet future developments. The new Skylink CCTV system design uses four different types of Hikvision IP cameras connected to a 32-channel, RAID 5 NVR over an entirely new Gigabit network infrastructure. According to Haim Atanelov, Skylinks General Manager, “The final brief for the CCTV upgrade included installation of new cameras in Aviance’s import and export cargo warehouses, both entry and exit vehicle gates, within the terminal public areas, at the biometric log-in area and associated turnstiles, and within the VIP lounge areas. “In all of these disparate areas, we were challenged by Aviance to deliver high resolution images at all times and in all lighting conditions. It is these pressures that helped us in choosing Hikvision components, with their robust build quality, excellent video quality, and quick and simple installation and operation due to the user-friendly software. It also helped that the products offer very competitive prices and are accompanied by after-sales service and technical support from a first-class team.” Clear Images In Poor Lighting Conditions Aviance is committed to phasing out the old system in favour of a totally Hikvision IP system as soon as possible" The CCTV system uses a combination of IP66-rated dome and bullet cameras with either 1.3 or 3MP resolution. A total of four DS-2CD2312-I 1.3MP Outdoor Network Mini Dome cameras were installed, two in the public areas of the terminal and two at the main gates where passengers complete the biometric log-in process and enter through the turnstiles. To complement the dome cameras, nine EXIR bullet cameras were used: five DS-2CD2212-I5 1.3 MP units for general surveillance in the warehouses together with a pair of DS-2CD2232-I5 3MP units where greater resolution was required, and two DS-2CD2632F-I 3MP Vari-focal EXIR cameras for the main vehicle entry and exit gates. “All of the cameras offer great resolution, with 3D DNR and Digital WDR as standard, together with a full complement of alarm triggers, including line crossing and motion and intrusion detection” says Haim Atanelov. “But, the true day/night capability of the EXIR infrared technology meant that they always delivered clear images, even in the warehouses where lighting conditions are not good. Both the 1.3MP and 3MP bullet cameras employed in the warehouses live up to the 50-meter IR range quoted. What’s more, the 30-meter EXIR range of the mini dome cameras deployed in the terminal building is also very useful during night time hours when the building lighting is partially shut down.The new system has already proved its worth, helping to completely seal the export warehouse in particular “We also paid particular attention to the vehicle entry and exit points, in each case choosing the 3MP Vari-focal bullet cameras for their IP66 environmental protection, high resolution, advanced night viewing capabilities and zoom.” Into The Future The new system has already proved its worth, helping to completely seal the export warehouse in particular and enabling Kotoka to meet ACC3 accreditation. Together with securing the import warehouse, which serves global airline and cargo brands such as British Airways, South African Airways, Alitalia, KLM, Virgin, DHL, Cargolux, etc., it means that the airport is well-placed to continue to attract business. “Aviance is especially pleased with the smooth integration of the Hikvision IP system with the access control system at the 4 turnstiles,” says Haim Atanelov, “something which was also carefully noted by the EU ACC3 validators. Aviance was also pleased with the integration of the new system with the existing analog CCTV system, although it did show up the difference in video quality immediately. "We have already agreed to add further IP cameras to the site and Aviance is committed to phasing out the old system in favor of a totally Hikvision IP system as soon as possible.”
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibility with our current VMS, and the new features [including] Wide Dynamic Range. Our experience has been great. Our organization requires high levels of security and with Arecont Vision’s updates to firmware we can maintain our internal network security policies.” said Safraz Samad, TPA Operations – Security Administration, Tampa International Airport. “Alberta invests a great deal of money and resources into developing and evaluating the best technological advances to provide superior performance to our customers. Arecont Vision’s megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta.” commented Karim Cassar, Technical Research Executive, Alberta. Megapixel Camera Benefits Deter and detect threats and document activities Maintain situational awareness and security Improve staff productivity Resolve security/staff and customer disputes Protect staff, travellers, customers, equipment, and goods Ability to cover more with less Increased detail equals better forensics and reduced time from police and security professionals in post event investigations Monitor daily business Forensic documentation to build cases Provide security, situational awareness, life safety Prevent fraudulent claims Application Areas Remote surveillance Facility entry/exits Loading docks Luggage and freight areas Storage areas Offices and warehouses Open spaces Parking lots/structures Roads and bridges Concourses and corridors People/vehicle counting/monitoring License plate/facial recognition
Customer Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hemisphere. It is a technologically advanced facility, employing state-of-the-art equipment and is a model for the industry and the region in everything from size to efficiency and security. Challenge The DP World marine control tower at Jebel Ali is an important facility for monitoring and controlling the movement of vessels in and out of the port. Physical security at the control tower was in need of upgrading and, in keeping with requirements mandated by Jebel Ali Port Security, DP World conducted a security risk assessment to determine how best to improve security at the site. Based on the assessment, DP World recommended an external video surveillance system. A basic design was developed that included 13 analog day/night box cameras and two outdoor pan-tilt-zoom (PTZ) cameras. Upon review, DP World concluded that the installation of this analog video surveillance system would also require the services of civil and electrical personnel for cabling and power needs. These additional services would add to the overall system costs as well as potentially increase the time frame for completion. DP World shelved the analog proposal and initiated a search for a more technically advanced video surveillance solution. They needed a camera system that would thoroughly cover the designated areas; require little or no external services or personnel for installation/maintenance; offer features and functionality that would enhance monitoring and operational control; be reasonably priced and ultimately provide greater detail and picture quality than would a typical analog system. Megapixel Solution DP World moved forward on the project with a new solution featuring megapixel cameras from Arecont Vision. When comparing the Arecont Vision megapixel system to the original analog system, it was evident that while the analog cameras were priced less than megapixel cameras on a per camera basis, they deliver less value when a total system cost was evaluated. The new design included two AV8185DN 180° day/night panoramic 8-megapixel dome cameras, two AV10005DN day/night 10-megapixel MegaVideo® Compact box cameras and four AV2105DN day/night 2- megapixel MegaVideo® Compact box cameras. Compared to the original design that included 13 analog cameras, the six-camera Arecont Vision megapixel system provided greater coverage with fewer cameras and significantly higher resolution images. The ability to digitally zoom into live scenes and recorded video while maintaining high resolution and wide area coverage also eliminated the need for PTZ cameras. And with Moonlight™ mode, the cameras automatically shift from color to black and white as ambient light diminishes. Megapixel Benefits Because the megapixel network cameras are PoE (Power over Ethernet) capable, the need for separate electrical cables to provide power was eliminated. Power and data is conveyed over a single network cable per camera. Using fewer cameras to effectively cover the same area also translated into infrastructure cost savings in containment works, cables and installations, which actually brought down the original cost of the system by nearly 20%, easily reflecting an improved return on investment (ROI). In addition to these advantages, the megapixel solution also contributed towards a greener environment because of fewer cables and less hardware that was needed. The Arecont Vision megapixel camera system provides superior performance and imaging capabilities than the analog system and most importantly, proved to deliver the most cost-effective video surveillance solution with tangible benefits and ROI.
Port Fourchon plays a strategic role in supplying the United States with nearly 18 percent of its oil supply, servicing over 90 percent of the Gulf of Mexico’s deepwater exploration and production. Securing such an essential portion of the Gulf Coast requires a hands-on team of security professionals to watch for unauthorized activities and enhance the safety of workers and officers. When evaluating options for a surveillance system to feed its new maritime domain awareness platform GLPC-C4 (C4), Port Fourchon officials chose Milestone XProtect® Enterprise video management software (VMS). “On a day-to-day basis, we are observing numerous points of interest throughout the port, in addition to providing a helping hand to the security officers. The video surveillance system has been taken to an entirely new level, integrating multiple systems for complete coverage. Milestone’s open platform allows us to feed video analytics and disparate cameras through it, and the entire port is benefiting immensely.” April Danos, Director of IT, Port Fourchon. The challenge: As the first land point of contact for approximately 90 percent of all Gulf of Mexico deep-water activities, including more than 600 rigs and platforms within a 40-mile radius, Louisiana’s Port Fourchon has unique safety standards to combat potentially devastating safety issues that may damage vessels, equipment, products and people working at the port. Obsolete surveillance equipment previously used to monitor the area was not sufficient to support the new C4 platform. A new video system was required to provide clearer imaging, improved storage capabilities, wider coverage and flexible video management. The solution: Milestone XProtect® Enterprise software has been deployed by Convergint Technologies to manage 64 cameras from Bosch and Pelco. With Milestone’s ability to display video in real time and its open platform architecture for integration with analytics from BRS Labs, the port’s personnel have the benefit of much more comprehensive and responsive video surveillance. Alerts from the video analytics system are fed through XProtect®, and into the Port’s C4 platform, where they are integrated with other alerts to create improved overall situational awareness. The advantages: Several strategic elements are deployed in the port’s surveillance network, and these elements work in unison to create complete behavioral analytics. The biggest advantage seen by the port is the ability to have the dispatchers, through the C4 common operating picture, pull up all camera views that they need to address an alert or an incident. It is also easy to add more cameras to the port’s surveillance network (which the Port did in conjunction with the installation of a new radar system from DMT), since the Milestone open platform supports the largest variety of manufacturer models. A Top Hub in Our Nation’s Oil Supply Chain About 80 percent of all Gulf oil comes from deepwater, and Louisiana’s Port Fourchon services more than 90 percent of the Gulf of Mexico’s deepwater activities. In addition to being the premier service base for the Gulf’s tremendous domestic hydrocarbon supply, Port Fourchon is the land base for Louisiana Offshore Oil Port (LOOP), which handles 10 percent of imported oil. Port security and the police have their work cut out for them, ensuring the nation’s oil supply, the workers and vessels, and every piece of equipment used to transport the product, are kept secure on a day-to-day basis. The previous surveillance system, installed more than a decade ago, was not up to the standards required by the Port for its new C4 installation. Many members of the Port’s security department and police force experienced difficulties with the old video system for its less-than-user-friendly interface, slow feeds, minimal storage and need for more cameras. "Alerts come right through the port’s Milestone XProtect setup. We can provide a brief clip of any target, time-and-date stamp it and inject it into the alarm" “We all agreed that our new video management system should be easy to integrate and allow us to dovetail with our legacy equipment while having an opportunity to shop around for upgraded hardware without any proprietary restrictions,” stated April Danos, Director of IT, Port Fourchon. “The ability to scale up over the years to increase the port’s protection was another very important aspect that needed to be addressed with the incoming VMS solution.” Key points in the port’s request for proposals included a system with minimal maintenance requirements, video display in real time, user-friendly operation and the ability to easily integrate a variety of already installed and soon-to-be-installed components: new servers, cameras, and analytics software, for instance. Milestone XProtect Enterprise VMS was chosen and implemented by Milestone certified partner Convergint Technologies. GLPC-C4 Priority 5’s Touch Assisted Command and Control System (TACCSTM) powers the Port’s C4 system. TACCS is an all-hazards command and control operations platform that integrates the VMS inputs with other data feeds to support the Port’s security and situational awareness requirements. Developed in response to requirements by the Department of Defense, the platform aligned with Port Fourchon’s vision for a centralized system into which all elements would be integrated, providing directors and police with full coverage of the analytics, radar, access control and security systems. With input from the Port and other early adopters, TACCS and the C4 system have evolved over the years, and now provide wide area situational awareness and response capabilities to Port Fourchon's Harbor Police dispatchers, Lafourche Parish Sheriff’s Office, the parish EOC, LOOP, and the Port Administrative, Operations and IT departments. “Our goal is to enable the Port to use TACCS and its open architecture to create the most comprehensive and flexible situational awareness solution possible,” said Joe Kammerman, Vice President of Priority 5. “Working with other companies such as Milestone that design their solutions around open architectures has proven to create a real value to customers, especially in today’s environment where budgets are tighter and people need to do more with less.” “Many companies claim to provide an integrated system, but what they deliver is more likely to consist of a large number of windows scattered on a screen, without any data integration,” noted Danos. “Milestone’s integration of video management and very detailed analytics literally gives our operators one single data feed through which the port’s entire surveillance system can be readily accessed as needed. We don’t miss a beat, which is priority number one when dealing with the safety of those at the port.” Several C4 stations throughout the port contain command centers equipped with Milestone The Setup Several C4 stations throughout the port contain command centers equipped with Milestone: three within the main office in Galliano, LA, one setup two miles from the port in the harbor police headquarters and one in the port itself. The LOOP system is networked into the Milestone software and Lafourche Parish Sherriff’s Office, with access to the port’s live feeds. The Federal Emergency Management Agency (FEMA) is also connected to the port for cases of emergency. Each registered user in the port security team has immediate access to Milestone video archives, going back as far as two months. “We have a good mixture of different makes and models of camera hardware and different analytics strategically deployed. We are very pleased with the way Milestone’s open platform enables us to explore multiple opportunities without worry of technology being rejected or reworking our entire system,” continued Danos. “All of the systems we implement in the port are brought in with the security factor in mind. Milestone has been very impressive as we adapt our system to improve operations every day.” All of the port’s surveillance systems work in unison with a behavior analytics system. Milestone is the only interface that can process this large amount of information, according to Bruce Whitaker of BRS Labs. “Alerts come right through the port’s Milestone XProtect setup. We can provide a brief clip of any target, time-and-date stamp it and inject it into the alarm. The users are looking at real-time video with the alerts built right in. No event goes unseen.” The Benefits Milestone XProtect is a day-to-day video management system, providing the video inputs and archives to the officers at the port to protect against criminal activity and helping to identify damage done to the docks or vessels that have been left unattended for long periods of time, among numerous other activities. The Milestone video product feeds the C4 common operating picture, enabling the dispatchers to maintain the big picture while having the ability to monitor video surveillance throughout the port. There are hundreds of continuous activities going on at any time. With all systems integrated, the officers can concentrate on security itself, not worry about the system working properly. “Nothing held up to the qualities of Milestone when we were researching for the port software integration,” stated Whitaker. “During the selection process, its capabilities were front and center. If we had any limit on our VMS options, we wouldn’t have a fraction of the benefits the port offers its security team now.” “The port has transformed its security platform to a new level,” concluded Danos. “We are working to be as far-sighted as possible, with the integration of our numerous best-of-breed applications, so the C4 system will always provide the highest level of maritime domain awareness. Starting with the Milestone open platform has allowed us to integrate numerous video applications through it, and the entire port is benefiting immensely.”
The Sabine-Neches Waterway runs 55 miles through Jefferson County, Texas, to the Gulf of Mexico, and includes the number-one commercial and military out-load port in the United States. It is the fourth largest port in terms of processed tonnage. A vast waterway traffic-monitoring network has been deployed to ensure all vessels (civilian, military and commercial) can safely navigate the waters with minimal interference such as collisions or other traffic stoppage. A new surveillance system also monitors the many petroleum refineries that line the channel. Backed by a Verizon Wireless 4G connection, the county cameras reside along the Sabine-Neches Waterway, networked through Milestone XProtect Enterprise for managing high definition video, live vessel movements and incident reporting. “Milestone’s open platform IP software is truly the best on the market. It integrates with all of the cameras seamlessly. Milestone XProtect provides the sheriff’s department with more high definition screen images and significantly better views of the waterway than the previous system. Now our system’s design provides live video and pushes to tablets, smartphones, dispatchers, and personnel on watercraft, who are given access to the video.” Mark Nolan, Knight Security Systems The Challenge Securing and monitoring 55 miles of waterway with traffic, including vessels ranging in size from small tugboats to huge tanker ships hauling hundreds of tons of oil and other commodities. When an incident is called into port security, the port authorities must assess the situation and respond immediately. Through the Milestone interface, reported incidents are checked on video to determine if the port must close or can continue operating. Closing the port for any amount of time is an expensive procedure, so having virtual eyes on the scene is imperative to operations. The previously installed system was only viewable and navigable in a control station building. The Solution Knight Security Systems designed and installed a Milestone XProtect Enterprise IP video surveillance solution with AXIS Q1604 and Sony SNC-ER550 cameras and more than eight terabytes of storage to provide 24 hours of monitoring. With the Milestone Mobile client, the sheriff’s department and port authorities have instant access to video at a moment’s notice, from anywhere. A Verizon Wireless 4G network for reliable and redundant operation powers the entire system. The Advantages The Milestone XProtect solution consolidates every one of the 24-hour monitored cameras into one centrally managed solution, viewable by all administrators in their respective offices, in the main monitoring station and on mobile devices. With high-level national security implications, live camera views and the ability to quickly check recorded video is essential to the port’s operational standards for efficiency. Every second between an incident report and confirmation of the validity of the report is crucial to the response process. A Vital Artery For US Oil Imports As the fourth largest port in the U.S., Port Arthur in Texas’ Jefferson County is the number-one crude oil destination for foreign tankers, as well as the number-one commercial and military out-load port. Hundreds of vessels are processed through the channel each day, making their way from other domestic ports and from all over the globe into the Gulf of Mexico and up the Sabine-Neches Waterway. With oil refineries and other critical infrastructure lining the 55 miles of river bank through Jefferson County, the sheriff’s department required a sophisticated security surveillance system to monitor waterway traffic and incidents. They need to ensure the safety of those working and traveling through the port, and to keep traffic flowing for the sake of commerce that relies on a clear waterway. With Milestone Mobile client, the sheriff’s department and port authorities have instant access to video from anywhere The Problem Previously installed systems relied on T1 lines, leased communication lines and microwave communication methods. Jefferson County was relying on outside partners to host landing points and was constantly provided low definition video. The area is scattered with low-lying areas and swamps, which limited coverage for the low-capacity T1 lines which were easily corroded from damp conditions and salt corrosion. When monitoring the video during and after an incident, a command center was the only place where the sheriff, Coast Guard or port officials had access to the video. When looking to completely upgrade the county’s river surveillance, officials contracted Texas-based Knight Security for a better solution – one that would provide nearly lossless access to video at a moment’s notice, even for those stationed away from the central command center. “Our goal was to provide high-definition screen views and more efficient monitoring of the waterway,” stated Mark Nolan, Sales Engineer, Knight Security Systems, Gulf Coast Region. “The new video system was specifically designed to capitalize on the unique areas of the Port. We now have camera ‘eyes’ located on an array of tall locations in challenging environments. Coupled with Milestone XProtect, the system provides advanced coverage throughout the entire waterway. We are able to provide live video and push out to tablets and mobile devices to numerous dispatch stations, personnel on watercrafts and others to have immediate access to any incident.” Protecting the Port The only way to access Jefferson County through the waterway is via Sabine Pass, TX or through two entry points on the Intracoastal Waterway. With an advanced communications system and screening process, no vessel is unaccounted for. The cameras act as verification to confirm radio transmissions. The Vessel Traffic Service (VTS) at Port Arthur acts as the “keepers of the gate” aided by the Milestone video management solution. VTS Port Arthur trained operators scan the waterways efficiently and effectively, 24 hours a day. VTS issues advisories and works to minimize blind spots utilising cameras and radar. Activities are monitored with the aid of the Milestone XProtect interface. Whether it’s a dredge, accident, or other incident; almost every vessel, regardless of size, is within a camera’s field of vision. “If we pick up a radar blip that’s not transmitting an identification signal, it is imperative to identify that blip before it enters the port,” explained Michael Measells, Director of Vessel Traffic Service. “The cameras can do what radar can’t achieve. We can put an eye on a vessel through the Milestone XProtect software, allowing us to know what’s moving from a marine safety and security standpoint. That’s the number-one mission.” Uniquely Stationed Surveillance Points Cameras line the river and port entrance, placed in strategic locations from the roofs of buildings to the top of the Verizon Wireless 4G towers. A Jefferson County Sheriff helicopter also hosts a mounted camera ready to be called into action at any time, whether it’s monitoring an incident or making rounds. “Our cameras feed the entire system and with the added support of the 4G LTE, the chances that we’ll be blacked out are very low. Nearly all aspects of the system have a redundant counterpart,” stated Measells. “We’ve been up and running as a group for eight years and other than hurricanes we’ve never had a shut down due to the system.” Knight Security Systems can monitor the status of the sheriff’s cameras and immediately notify the client of a camera outage, which might not have been noticed by the authorities if they’ve not checked their mobile device. Downtime is completely minimised with the proactive monitoring and Milestone system alerts. “We’ve adapted to the ease of application, connectivity and versatility of the Milestone interface very quickly – it’s become so easy to use. It’s something we can just access without really putting too much extra work into it,” stated John Moore, Electronics Materials Officer, United States Coast Guard. “Milestone is always up and running and it loads extremely fast on any mobile operating system.” The system also includes a rapidly deployable camera system that can be connected to a generator and a camera on a portable frame to easily access the waterway. It can be deployed and launched live into the Milestone system via local cell towers within minutes of a reported incident. “The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue,” Moore continued. Incident Confirmation and Control "The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue" The port is a vital, active entity, responsible for millions of dollars in assets and manpower. If an incident is reported to the Sheriff’s Department or Coast Guard, which isn’t uncommon, there are established procedures to follow before any response is made. A response for any event, whether a boating accident, cargo spill or personal injury, has the potential to shut down the critical channel for an extended length of time. When an incident is reported, officials must immediately confirm the report. Once confirmed, the proper authorities are contacted and ground or water personnel deployed as needed. The sheriff’s department jurisdiction covers the entire 55 miles of critical infrastructure, so mobility is vital. “I’m not monitoring the lines 24 hours a day personally, but if I get a report of an incident, I’ll pull Milestone Mobile up on my tablet or phone to assess the situation,” stated Deputy Chief Mark Dubois, Jefferson County Sheriff. “XProtect helps us respond quickly, allowing us to pull up video from any particular time and cameras immediately, from any location, to confirm or deny an event.” “With our camera coverage, we can move from evaluation of a report to initiating a response in a matter of minutes, if not seconds,” Moore continued. “There’s time and money there. Once we confirm, all responders’ mindsets are immediately shifted into ‘response’.” The Benefits of Scalability and Usability Quickly allowing access to live and recorded video, Milestone can handle a large number of cameras should the sheriff’s department decide to upgrade or add more hardware devices to the monitoring solution. “Overall, it used to take a lot more time before the sheriff could react to an incident, which could have been a life-or-death difference over a few minutes,” continued Nolan. “Milestone provides the open platform capability, allowing the end user to stay current on the latest and greatest software, and scaling up without changing the entire system from the ground level up.” Training was quick and efficient among the three user groups -- field users on the ground and water, and users in the office reporting on analytics, recording and searching archives. Knight Security Systems created different user profiles and tailored training sessions for each group, showing them exactly the views and functions they will regularly access, rather than diving into processes that would not be relevant to their specific duty. In total, 40 personnel were trained on Milestone, from ‘power users’ to those who use the system casually or view cameras sporadically. Screen images are used for numerous activities besides security, including studying tow configurations, training, and exporting photos and data to port partners. “This is a high-traffic waterway and with a limited width, there are bound to be close calls and incidents,” said Measells. “It’s just good to have more eyes on each vessel. The cameras are high resolution enough to read a soccer player’s jersey number from a mile away in low light! We’re sending photo-quality screenshots throughout our network, which is incredibly valuable for investigations”.
Round table discussion
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?