Airports & Ports Security Applications
Dallmeier offers comprehensive security solutions for all areas of application around airports. Specifically, in the area of cameras a wide range of systems allow customers to tackle all of their safety and security challenges and be able to comply fully with operational and regulatory requirements. On top of that, Dallmeier supplies video management solutions that not only give operators an exhaustive overview of security-relevant events, but also allow the video data to be analyzed with a vi...
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Though it has been statistically proven that taking a plane is no riskier than taking a bus, people do have reasons to put extra caution on air travel safety, especially in a time replete with terrorist threats. A major line of defense must be the various sections of the airports, which, as a gateway to the outside world and transportation hub of the city, has always been on the top of the safety list of the government and all related authorities. Dahua’s Airport Solution is an intelligen...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
USS Iowa: A Naval Treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a...
Airports and ports are subject to a tough balancing act when it comes to security measures. On the one hand, these locations must maximize the movement of passengers and cargo to ensure a happy customer experience, while at the same time exercising security measures that will ensure their safety. Access Points In Transport Hubs Airports and ports are large areas with many access points, a necessity to facilitate the efficiency needed to handle the large volumes of traffic they generate. This a...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 10053 Seagate develops computer drives and storage to store the world’s data from consumer to client specialized drives (i.e. surveillance optimized drives) to the enterprise. Q: What Was The First Year Your Company Exhibited At ISC West? 2014 Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We meet customers, use digital marketing, and display eco-system partnerships in our booth. Q: How Do You Quantify Your Success At ISC West? Our success is based on relationship building with new and existing customers and lead generation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is definitely one of the biggest shows in US, where all the industry professionals, system integrators and dealers converge. The attendees are a highly knowledgeable base with expertise in security and surveillance – making it a great place to have conversations with customers and partners alike.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-Expanding Edge Devices Market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud Computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge Computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralized cloud computing and even coins the phrase, “Cloud computing, decentralized” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost Efficiency Of Edge Processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilizing edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilizing edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase In Revenue For Dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, Connected Smart Locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio Of Home Automation Products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages Of Professional Installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realize they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realize that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling Additional Home Automation Products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labor warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces Connection Instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realize over time. On the other hand, one issue DIYers may recognize right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognizable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not Everyone Is A DIY Customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing Complete And Custom Solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI Technology And Surveillance Solutions Artificial Intelligence technology built into surveillance solutions help organizations optimize their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organizations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organizations overcome this challenge and optimize their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognizing people, vehicles and even behaviors. Detection And Prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial intelligence changes all this by recognizing potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How Does Artificial Intelligence Work? Artificial intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognize different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organizations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organizations can enhance operational efficiency by making use of the data report. Increasing Commercial Success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organizations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organizations the opportunity to personalize the service experience, foster loyalty and maximize customer lifetime revenues. Artificial Intelligence can help organizations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organizations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centers to map footfall at peak times, ensuring that staffing is optimized to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximize the sales opportunities. Artificial Intelligence At Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognize, classify and respond to security threats. This article was written by Hikvision.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
The Electronic Security Expo (ESX) will be held at the Indiana Convention Center, June 3-6, in Indianapolis. The show focuses exclusively on the electronic security and life safety industry, including companies that service the connected Internet of Things (IoT) space for homes and businesses. The ESX Main Stage will highlight inspirational presentations from motivational speakers, Dr. Rick Rigsby and Kevin Brown. In addition, there will be a founder of a drone security company and an Entrepreneur-in-Residence from Kleiner Perkins for OpenXchange, and a Secret Service agent for the Closing Keynote. Sharing Best Practices And Trends In breakout sessions, colleagues and business thought leaders will share best practices, trends and opportunities that helped their own companies and careers, so that others might replicate their successes or minimize their failures. These sessions are aimed at propelling attendees to reimagine their business models and go-to-market strategies, says George De Marco, Chairman of ESX and Managing Partner for DECO Ventures LLC. Examples of breakout sessions include: CounterPoint Forum – “False Alarm Dispatches - A Real Threat or a Nuisance to the Industry?” “Top 3 Ways to Grow Your Video RMR” “5 Faster, Smarter Ways to Improve Cash Flow” “Artificial Intelligence Real Time Video Monitoring Solutions” Promoting Security Professionals’ Growth Our goal is to develop next-gen methods that deliver industry content and promote professional growth"“Each year, we challenge ourselves to raise the bar of the educational sessions and main stage events,” says De Marco. “One of the ways is introducing new faces and voices for the peer-developed and peer-driven educational sessions that offer best practices and identify trends, opportunities and challenges for industry professionals to consider today and in the future. Our goal is to develop next-gen methods that deliver industry content and promote professional growth as the industry pivots to the future.” New entrants and disruptors are challenging traditional go-to-market strategies, causing traditional companies to rethink how they rise above the noise in a changing competitive landscape and handle new consumer buying behaviours, says De Marco. Exhibitors At ESX Exhibitors that support ESX include Interlogix (Diamond sponsor), Napco (Platinum sponsor), Alula and DMP (Gold sponsor), and ADI, Altronix, Bold Group, Essence, ICT, Quick Response, Resideo, Secura key, Security Central and WeSuite (Silver sponsors). ESX seeks to connect exhibitors with the influencers and decision-makers from companies that represent a cross section of dealers, integrators and monitoring companies in North America. The exhibit hall will be the focal point for exhibitors to showcase their latest technology in the city’s impressive convention center. The exhibit hall will be the focal point for exhibitors to showcase their latest technology in the city’s convention center “We recognize individuals and companies during the Opening Celebration that help propel the industry forward and at our VIP Event at the Indianapolis Motor Speedway,” says De Marco. “During the day, there are meals around the Main Stage sessions which gather attendees around the table for casual conversation before the presentation begins.” Indianapolis, home of the Indy 500, is a unique location that has a lot to offer the attendees of ESX. A special night at the Indianapolis Motor Speedway will invite a limited number of guests to share great food and drinks, to experience a trip around the track in an official pace car, and to ‘kiss the bricks’, a speedway tradition. Centrally located in the US, Indianapolis is a convenient convention destination for travel, whether flying or driving. Connecting With Peers And Colleagues Another benefit of the show is the cross-section of companies represented in the industry, whether large, medium or small There are also networking opportunities throughout the week. The Pub Crawl, an attendee favorite, is a night where long-time friends gather, and new friendships are made. “This is where the real conversations happen between peers and colleagues about real problems of running and growing a company, and solutions that can make a difference,” says De Marco. Another benefit of the show is the cross-section of companies represented in the industry, whether large, medium or small players. This enables professionals to come together to connect with their peers and colleagues, allowing for deep discussions on how to grow their people, revenues and profits, including mentoring opportunities that encourage leadership development, says De Marco. The subject of finding qualified employees is top of mind for almost every industry today, especially the security industry. Sessions that address hiring and managing employees for industry professionals include “Hiring from Outside the Monitoring Industry: Surprising Resources for Great Operators” “Maximize New Employees: Why Onboarding is Critical to Their Success” “5 Tips for Effective Employee Performance Evaluations” Helping Attendees To Reinvent Their Business “Our focus is primarily on the attendee, helping them connect with suppliers, colleagues and opportunities that reimagine their businesses, so they can be stronger competitors,” says De Marco. “If we can provide the right knowledge to inspire or transform the attendees to take meaningful action or implement change that helps them remain relevant, we believe we have succeeded.” There will be an undercurrent of sadness at ESX this year because the industry recently suffered a loss. George Gunning, former CEO of USA Alarm Systems and one of the founding members of ESX, passed away in February. “We would be remiss if we didn’t recognize his contributions and influence on the industry and ESX over the years,” says De Marco. Another founding member of ESX who has passed away is John Murphy, formerly CEO of Vector Security.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing Key Cards And Fobs With App Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognizes which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customized for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable Access Control Systems For SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favor simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving Security Dealers And Integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalizing that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS To Measure Product Quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analyzing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
AIG, Aéroport International de Genève, is one of the most dynamic airports in Europe. In 2012 alone it handled almost 13.9 million passengers and 193.000 flights to 120 destinations, serviced by 200 different companies. Obviously, with these figures, security is an important issue and needs to be up to standard at all times. Managing Access For A Large Workforce The implemented AEOS platform controls the access of a workforce of 9,500, manages 37,500 badges, 200 organizations working at the airport’s facilities. Securing and controlling such a dynamic environment requires a flexible access control system, based on state-of-the-art technology which is able to meet present demands as well as future security requirements. Handling Multiple Access Control Technologies One of the main reasons for AIG to choose Nedap AEOS as its security management platform was its radical different architecture based on software components. AEOS software components allow the platform to support and enhance the airport’s security policy and procedures. Furthermore, changing requirements can be put into effect much more easily. Another reason to choose AEOS is its capability of simultaneously handling multiple reader and credential technologies in a single platform. Single Card Access Control Four different identification technologies are used simultaneously in AEOS access control functionality at Geneva Airport: Nedap, Mifare, Legic and Magnetic stripe, each technology serving a different purpose. The Nedap Combi card has been put into place, which combines all the required technologies, therefore increasing convenience for the users, as they do not have to carry four different cards.
Levels of security inside the Aviation industry have never been higher; mainly due to increased terrorism threat levels across the globe, combined with a worldwide rise in smuggling activity. No airport is immune from these pressures and Ghana’s ‘Kotoka International’ can now claim to meet ACC3, the highest accreditation in the aviation industry, thanks to their recent investment in the latest generation of IP CCTV systems from Hikvision. Ghana’s Kotoka International Airport Established in 1994, Aviance Ghana Ltd provides a range of ground handling services at Ghana’s Kotoka International Airport, situated just outside the capital, Accra. The airport itself is Ghana’s premier international flight center and is capable of accepting large aircrafts, such as the latest generation of Boeing 747.Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents It occupies more than 650 hectares, with two large terminals for domestic/regional and international/long-haul operations that are connected by an internal walkway. Terminal 2 is the principal international departure terminal and includes restaurants, duty-free shops and two Executive lounges for First and Business Class travellers. There are also two smaller terminals dedicated solely to diplomatic flights and military operations. Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents. At Kotoka, the ground services include managing all the passenger concourse facilities in Terminal 2, plus passenger check-in and baggage handling, the loading and unloading of cargo from freight flights and a cargo warehouse operation for all import and export needs. Overriding Security Objectives Given that today’s security concerns require the aviation industry to maintain very high levels of protection measures, close scrutiny of the 650 hectare site that the airport occupies and protecting passengers, aircraft and cargo were the twin key objectives for Aviance when deciding to upgrade the Airport’s CCTV system. The company also recognized that intelligently deploying the camera infrastructure would be necessary to maximize cost-effectiveness and efficiency.The new Skylink CCTV system design uses four different types of Hikvision IP camera Aviance Ghana turned to Skylinks Technical Services Ltd and tasked them with designing a solution that would enable it to meet the EU’s ACC3 accreditation, the highest accreditation in the aviation industry. In turn, Skylinks turned to Hikvision for the design of an all-IP CCTV system capable of not only meeting the current challenges facing Aviance in its operation at Kotoka International Airport, but also providing an expandable base that could rise to meet future developments. The new Skylink CCTV system design uses four different types of Hikvision IP cameras connected to a 32-channel, RAID 5 NVR over an entirely new Gigabit network infrastructure. According to Haim Atanelov, Skylinks General Manager, “The final brief for the CCTV upgrade included installation of new cameras in Aviance’s import and export cargo warehouses, both entry and exit vehicle gates, within the terminal public areas, at the biometric log-in area and associated turnstiles, and within the VIP lounge areas. “In all of these disparate areas, we were challenged by Aviance to deliver high resolution images at all times and in all lighting conditions. It is these pressures that helped us in choosing Hikvision components, with their robust build quality, excellent video quality, and quick and simple installation and operation due to the user-friendly software. It also helped that the products offer very competitive prices and are accompanied by after-sales service and technical support from a first-class team.” Clear Images In Poor Lighting Conditions Aviance is committed to phasing out the old system in favour of a totally Hikvision IP system as soon as possible" The CCTV system uses a combination of IP66-rated dome and bullet cameras with either 1.3 or 3MP resolution. A total of four DS-2CD2312-I 1.3MP Outdoor Network Mini Dome cameras were installed, two in the public areas of the terminal and two at the main gates where passengers complete the biometric log-in process and enter through the turnstiles. To complement the dome cameras, nine EXIR bullet cameras were used: five DS-2CD2212-I5 1.3 MP units for general surveillance in the warehouses together with a pair of DS-2CD2232-I5 3MP units where greater resolution was required, and two DS-2CD2632F-I 3MP Vari-focal EXIR cameras for the main vehicle entry and exit gates. “All of the cameras offer great resolution, with 3D DNR and Digital WDR as standard, together with a full complement of alarm triggers, including line crossing and motion and intrusion detection” says Haim Atanelov. “But, the true day/night capability of the EXIR infrared technology meant that they always delivered clear images, even in the warehouses where lighting conditions are not good. Both the 1.3MP and 3MP bullet cameras employed in the warehouses live up to the 50-meter IR range quoted. What’s more, the 30-meter EXIR range of the mini dome cameras deployed in the terminal building is also very useful during night time hours when the building lighting is partially shut down.The new system has already proved its worth, helping to completely seal the export warehouse in particular “We also paid particular attention to the vehicle entry and exit points, in each case choosing the 3MP Vari-focal bullet cameras for their IP66 environmental protection, high resolution, advanced night viewing capabilities and zoom.” Into The Future The new system has already proved its worth, helping to completely seal the export warehouse in particular and enabling Kotoka to meet ACC3 accreditation. Together with securing the import warehouse, which serves global airline and cargo brands such as British Airways, South African Airways, Alitalia, KLM, Virgin, DHL, Cargolux, etc., it means that the airport is well-placed to continue to attract business. “Aviance is especially pleased with the smooth integration of the Hikvision IP system with the access control system at the 4 turnstiles,” says Haim Atanelov, “something which was also carefully noted by the EU ACC3 validators. Aviance was also pleased with the integration of the new system with the existing analog CCTV system, although it did show up the difference in video quality immediately. "We have already agreed to add further IP cameras to the site and Aviance is committed to phasing out the old system in favor of a totally Hikvision IP system as soon as possible.”
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibility with our current VMS, and the new features [including] Wide Dynamic Range. Our experience has been great. Our organization requires high levels of security and with Arecont Vision’s updates to firmware we can maintain our internal network security policies.” said Safraz Samad, TPA Operations – Security Administration, Tampa International Airport. “Alberta invests a great deal of money and resources into developing and evaluating the best technological advances to provide superior performance to our customers. Arecont Vision’s megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta.” commented Karim Cassar, Technical Research Executive, Alberta. Megapixel Camera Benefits Deter and detect threats and document activities Maintain situational awareness and security Improve staff productivity Resolve security/staff and customer disputes Protect staff, travellers, customers, equipment, and goods Ability to cover more with less Increased detail equals better forensics and reduced time from police and security professionals in post event investigations Monitor daily business Forensic documentation to build cases Provide security, situational awareness, life safety Prevent fraudulent claims Application Areas Remote surveillance Facility entry/exits Loading docks Luggage and freight areas Storage areas Offices and warehouses Open spaces Parking lots/structures Roads and bridges Concourses and corridors People/vehicle counting/monitoring License plate/facial recognition
Customer Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hemisphere. It is a technologically advanced facility, employing state-of-the-art equipment and is a model for the industry and the region in everything from size to efficiency and security. Challenge The DP World marine control tower at Jebel Ali is an important facility for monitoring and controlling the movement of vessels in and out of the port. Physical security at the control tower was in need of upgrading and, in keeping with requirements mandated by Jebel Ali Port Security, DP World conducted a security risk assessment to determine how best to improve security at the site. Based on the assessment, DP World recommended an external video surveillance system. A basic design was developed that included 13 analog day/night box cameras and two outdoor pan-tilt-zoom (PTZ) cameras. Upon review, DP World concluded that the installation of this analog video surveillance system would also require the services of civil and electrical personnel for cabling and power needs. These additional services would add to the overall system costs as well as potentially increase the time frame for completion. DP World shelved the analog proposal and initiated a search for a more technically advanced video surveillance solution. They needed a camera system that would thoroughly cover the designated areas; require little or no external services or personnel for installation/maintenance; offer features and functionality that would enhance monitoring and operational control; be reasonably priced and ultimately provide greater detail and picture quality than would a typical analog system. Megapixel Solution DP World moved forward on the project with a new solution featuring megapixel cameras from Arecont Vision. When comparing the Arecont Vision megapixel system to the original analog system, it was evident that while the analog cameras were priced less than megapixel cameras on a per camera basis, they deliver less value when a total system cost was evaluated. The new design included two AV8185DN 180° day/night panoramic 8-megapixel dome cameras, two AV10005DN day/night 10-megapixel MegaVideo® Compact box cameras and four AV2105DN day/night 2- megapixel MegaVideo® Compact box cameras. Compared to the original design that included 13 analog cameras, the six-camera Arecont Vision megapixel system provided greater coverage with fewer cameras and significantly higher resolution images. The ability to digitally zoom into live scenes and recorded video while maintaining high resolution and wide area coverage also eliminated the need for PTZ cameras. And with Moonlight™ mode, the cameras automatically shift from color to black and white as ambient light diminishes. Megapixel Benefits Because the megapixel network cameras are PoE (Power over Ethernet) capable, the need for separate electrical cables to provide power was eliminated. Power and data is conveyed over a single network cable per camera. Using fewer cameras to effectively cover the same area also translated into infrastructure cost savings in containment works, cables and installations, which actually brought down the original cost of the system by nearly 20%, easily reflecting an improved return on investment (ROI). In addition to these advantages, the megapixel solution also contributed towards a greener environment because of fewer cables and less hardware that was needed. The Arecont Vision megapixel camera system provides superior performance and imaging capabilities than the analog system and most importantly, proved to deliver the most cost-effective video surveillance solution with tangible benefits and ROI.
Port Fourchon plays a strategic role in supplying the United States with nearly 18 percent of its oil supply, servicing over 90 percent of the Gulf of Mexico’s deepwater exploration and production. Securing such an essential portion of the Gulf Coast requires a hands-on team of security professionals to watch for unauthorized activities and enhance the safety of workers and officers. When evaluating options for a surveillance system to feed its new maritime domain awareness platform GLPC-C4 (C4), Port Fourchon officials chose Milestone XProtect® Enterprise video management software (VMS). “On a day-to-day basis, we are observing numerous points of interest throughout the port, in addition to providing a helping hand to the security officers. The video surveillance system has been taken to an entirely new level, integrating multiple systems for complete coverage. Milestone’s open platform allows us to feed video analytics and disparate cameras through it, and the entire port is benefiting immensely.” April Danos, Director of IT, Port Fourchon. The challenge: As the first land point of contact for approximately 90 percent of all Gulf of Mexico deep-water activities, including more than 600 rigs and platforms within a 40-mile radius, Louisiana’s Port Fourchon has unique safety standards to combat potentially devastating safety issues that may damage vessels, equipment, products and people working at the port. Obsolete surveillance equipment previously used to monitor the area was not sufficient to support the new C4 platform. A new video system was required to provide clearer imaging, improved storage capabilities, wider coverage and flexible video management. The solution: Milestone XProtect® Enterprise software has been deployed by Convergint Technologies to manage 64 cameras from Bosch and Pelco. With Milestone’s ability to display video in real time and its open platform architecture for integration with analytics from BRS Labs, the port’s personnel have the benefit of much more comprehensive and responsive video surveillance. Alerts from the video analytics system are fed through XProtect®, and into the Port’s C4 platform, where they are integrated with other alerts to create improved overall situational awareness. The advantages: Several strategic elements are deployed in the port’s surveillance network, and these elements work in unison to create complete behavioral analytics. The biggest advantage seen by the port is the ability to have the dispatchers, through the C4 common operating picture, pull up all camera views that they need to address an alert or an incident. It is also easy to add more cameras to the port’s surveillance network (which the Port did in conjunction with the installation of a new radar system from DMT), since the Milestone open platform supports the largest variety of manufacturer models. A Top Hub in Our Nation’s Oil Supply Chain About 80 percent of all Gulf oil comes from deepwater, and Louisiana’s Port Fourchon services more than 90 percent of the Gulf of Mexico’s deepwater activities. In addition to being the premier service base for the Gulf’s tremendous domestic hydrocarbon supply, Port Fourchon is the land base for Louisiana Offshore Oil Port (LOOP), which handles 10 percent of imported oil. Port security and the police have their work cut out for them, ensuring the nation’s oil supply, the workers and vessels, and every piece of equipment used to transport the product, are kept secure on a day-to-day basis. The previous surveillance system, installed more than a decade ago, was not up to the standards required by the Port for its new C4 installation. Many members of the Port’s security department and police force experienced difficulties with the old video system for its less-than-user-friendly interface, slow feeds, minimal storage and need for more cameras. "Alerts come right through the port’s Milestone XProtect setup. We can provide a brief clip of any target, time-and-date stamp it and inject it into the alarm" “We all agreed that our new video management system should be easy to integrate and allow us to dovetail with our legacy equipment while having an opportunity to shop around for upgraded hardware without any proprietary restrictions,” stated April Danos, Director of IT, Port Fourchon. “The ability to scale up over the years to increase the port’s protection was another very important aspect that needed to be addressed with the incoming VMS solution.” Key points in the port’s request for proposals included a system with minimal maintenance requirements, video display in real time, user-friendly operation and the ability to easily integrate a variety of already installed and soon-to-be-installed components: new servers, cameras, and analytics software, for instance. Milestone XProtect Enterprise VMS was chosen and implemented by Milestone certified partner Convergint Technologies. GLPC-C4 Priority 5’s Touch Assisted Command and Control System (TACCSTM) powers the Port’s C4 system. TACCS is an all-hazards command and control operations platform that integrates the VMS inputs with other data feeds to support the Port’s security and situational awareness requirements. Developed in response to requirements by the Department of Defense, the platform aligned with Port Fourchon’s vision for a centralized system into which all elements would be integrated, providing directors and police with full coverage of the analytics, radar, access control and security systems. With input from the Port and other early adopters, TACCS and the C4 system have evolved over the years, and now provide wide area situational awareness and response capabilities to Port Fourchon's Harbor Police dispatchers, Lafourche Parish Sheriff’s Office, the parish EOC, LOOP, and the Port Administrative, Operations and IT departments. “Our goal is to enable the Port to use TACCS and its open architecture to create the most comprehensive and flexible situational awareness solution possible,” said Joe Kammerman, Vice President of Priority 5. “Working with other companies such as Milestone that design their solutions around open architectures has proven to create a real value to customers, especially in today’s environment where budgets are tighter and people need to do more with less.” “Many companies claim to provide an integrated system, but what they deliver is more likely to consist of a large number of windows scattered on a screen, without any data integration,” noted Danos. “Milestone’s integration of video management and very detailed analytics literally gives our operators one single data feed through which the port’s entire surveillance system can be readily accessed as needed. We don’t miss a beat, which is priority number one when dealing with the safety of those at the port.” Several C4 stations throughout the port contain command centers equipped with Milestone The Setup Several C4 stations throughout the port contain command centers equipped with Milestone: three within the main office in Galliano, LA, one setup two miles from the port in the harbor police headquarters and one in the port itself. The LOOP system is networked into the Milestone software and Lafourche Parish Sherriff’s Office, with access to the port’s live feeds. The Federal Emergency Management Agency (FEMA) is also connected to the port for cases of emergency. Each registered user in the port security team has immediate access to Milestone video archives, going back as far as two months. “We have a good mixture of different makes and models of camera hardware and different analytics strategically deployed. We are very pleased with the way Milestone’s open platform enables us to explore multiple opportunities without worry of technology being rejected or reworking our entire system,” continued Danos. “All of the systems we implement in the port are brought in with the security factor in mind. Milestone has been very impressive as we adapt our system to improve operations every day.” All of the port’s surveillance systems work in unison with a behavior analytics system. Milestone is the only interface that can process this large amount of information, according to Bruce Whitaker of BRS Labs. “Alerts come right through the port’s Milestone XProtect setup. We can provide a brief clip of any target, time-and-date stamp it and inject it into the alarm. The users are looking at real-time video with the alerts built right in. No event goes unseen.” The Benefits Milestone XProtect is a day-to-day video management system, providing the video inputs and archives to the officers at the port to protect against criminal activity and helping to identify damage done to the docks or vessels that have been left unattended for long periods of time, among numerous other activities. The Milestone video product feeds the C4 common operating picture, enabling the dispatchers to maintain the big picture while having the ability to monitor video surveillance throughout the port. There are hundreds of continuous activities going on at any time. With all systems integrated, the officers can concentrate on security itself, not worry about the system working properly. “Nothing held up to the qualities of Milestone when we were researching for the port software integration,” stated Whitaker. “During the selection process, its capabilities were front and center. If we had any limit on our VMS options, we wouldn’t have a fraction of the benefits the port offers its security team now.” “The port has transformed its security platform to a new level,” concluded Danos. “We are working to be as far-sighted as possible, with the integration of our numerous best-of-breed applications, so the C4 system will always provide the highest level of maritime domain awareness. Starting with the Milestone open platform has allowed us to integrate numerous video applications through it, and the entire port is benefiting immensely.”
The Sabine-Neches Waterway runs 55 miles through Jefferson County, Texas, to the Gulf of Mexico, and includes the number-one commercial and military out-load port in the United States. It is the fourth largest port in terms of processed tonnage. A vast waterway traffic-monitoring network has been deployed to ensure all vessels (civilian, military and commercial) can safely navigate the waters with minimal interference such as collisions or other traffic stoppage. A new surveillance system also monitors the many petroleum refineries that line the channel. Backed by a Verizon Wireless 4G connection, the county cameras reside along the Sabine-Neches Waterway, networked through Milestone XProtect Enterprise for managing high definition video, live vessel movements and incident reporting. “Milestone’s open platform IP software is truly the best on the market. It integrates with all of the cameras seamlessly. Milestone XProtect provides the sheriff’s department with more high definition screen images and significantly better views of the waterway than the previous system. Now our system’s design provides live video and pushes to tablets, smartphones, dispatchers, and personnel on watercraft, who are given access to the video.” Mark Nolan, Knight Security Systems The Challenge Securing and monitoring 55 miles of waterway with traffic, including vessels ranging in size from small tugboats to huge tanker ships hauling hundreds of tons of oil and other commodities. When an incident is called into port security, the port authorities must assess the situation and respond immediately. Through the Milestone interface, reported incidents are checked on video to determine if the port must close or can continue operating. Closing the port for any amount of time is an expensive procedure, so having virtual eyes on the scene is imperative to operations. The previously installed system was only viewable and navigable in a control station building. The Solution Knight Security Systems designed and installed a Milestone XProtect Enterprise IP video surveillance solution with AXIS Q1604 and Sony SNC-ER550 cameras and more than eight terabytes of storage to provide 24 hours of monitoring. With the Milestone Mobile client, the sheriff’s department and port authorities have instant access to video at a moment’s notice, from anywhere. A Verizon Wireless 4G network for reliable and redundant operation powers the entire system. The Advantages The Milestone XProtect solution consolidates every one of the 24-hour monitored cameras into one centrally managed solution, viewable by all administrators in their respective offices, in the main monitoring station and on mobile devices. With high-level national security implications, live camera views and the ability to quickly check recorded video is essential to the port’s operational standards for efficiency. Every second between an incident report and confirmation of the validity of the report is crucial to the response process. A Vital Artery For US Oil Imports As the fourth largest port in the U.S., Port Arthur in Texas’ Jefferson County is the number-one crude oil destination for foreign tankers, as well as the number-one commercial and military out-load port. Hundreds of vessels are processed through the channel each day, making their way from other domestic ports and from all over the globe into the Gulf of Mexico and up the Sabine-Neches Waterway. With oil refineries and other critical infrastructure lining the 55 miles of river bank through Jefferson County, the sheriff’s department required a sophisticated security surveillance system to monitor waterway traffic and incidents. They need to ensure the safety of those working and traveling through the port, and to keep traffic flowing for the sake of commerce that relies on a clear waterway. With Milestone Mobile client, the sheriff’s department and port authorities have instant access to video from anywhere The Problem Previously installed systems relied on T1 lines, leased communication lines and microwave communication methods. Jefferson County was relying on outside partners to host landing points and was constantly provided low definition video. The area is scattered with low-lying areas and swamps, which limited coverage for the low-capacity T1 lines which were easily corroded from damp conditions and salt corrosion. When monitoring the video during and after an incident, a command center was the only place where the sheriff, Coast Guard or port officials had access to the video. When looking to completely upgrade the county’s river surveillance, officials contracted Texas-based Knight Security for a better solution – one that would provide nearly lossless access to video at a moment’s notice, even for those stationed away from the central command center. “Our goal was to provide high-definition screen views and more efficient monitoring of the waterway,” stated Mark Nolan, Sales Engineer, Knight Security Systems, Gulf Coast Region. “The new video system was specifically designed to capitalize on the unique areas of the Port. We now have camera ‘eyes’ located on an array of tall locations in challenging environments. Coupled with Milestone XProtect, the system provides advanced coverage throughout the entire waterway. We are able to provide live video and push out to tablets and mobile devices to numerous dispatch stations, personnel on watercrafts and others to have immediate access to any incident.” Protecting the Port The only way to access Jefferson County through the waterway is via Sabine Pass, TX or through two entry points on the Intracoastal Waterway. With an advanced communications system and screening process, no vessel is unaccounted for. The cameras act as verification to confirm radio transmissions. The Vessel Traffic Service (VTS) at Port Arthur acts as the “keepers of the gate” aided by the Milestone video management solution. VTS Port Arthur trained operators scan the waterways efficiently and effectively, 24 hours a day. VTS issues advisories and works to minimize blind spots utilising cameras and radar. Activities are monitored with the aid of the Milestone XProtect interface. Whether it’s a dredge, accident, or other incident; almost every vessel, regardless of size, is within a camera’s field of vision. “If we pick up a radar blip that’s not transmitting an identification signal, it is imperative to identify that blip before it enters the port,” explained Michael Measells, Director of Vessel Traffic Service. “The cameras can do what radar can’t achieve. We can put an eye on a vessel through the Milestone XProtect software, allowing us to know what’s moving from a marine safety and security standpoint. That’s the number-one mission.” Uniquely Stationed Surveillance Points Cameras line the river and port entrance, placed in strategic locations from the roofs of buildings to the top of the Verizon Wireless 4G towers. A Jefferson County Sheriff helicopter also hosts a mounted camera ready to be called into action at any time, whether it’s monitoring an incident or making rounds. “Our cameras feed the entire system and with the added support of the 4G LTE, the chances that we’ll be blacked out are very low. Nearly all aspects of the system have a redundant counterpart,” stated Measells. “We’ve been up and running as a group for eight years and other than hurricanes we’ve never had a shut down due to the system.” Knight Security Systems can monitor the status of the sheriff’s cameras and immediately notify the client of a camera outage, which might not have been noticed by the authorities if they’ve not checked their mobile device. Downtime is completely minimised with the proactive monitoring and Milestone system alerts. “We’ve adapted to the ease of application, connectivity and versatility of the Milestone interface very quickly – it’s become so easy to use. It’s something we can just access without really putting too much extra work into it,” stated John Moore, Electronics Materials Officer, United States Coast Guard. “Milestone is always up and running and it loads extremely fast on any mobile operating system.” The system also includes a rapidly deployable camera system that can be connected to a generator and a camera on a portable frame to easily access the waterway. It can be deployed and launched live into the Milestone system via local cell towers within minutes of a reported incident. “The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue,” Moore continued. Incident Confirmation and Control "The versatility of our Milestone setup also allows us to remotely provide access to our Sector Command Center in Houston so they can view any potential issue" The port is a vital, active entity, responsible for millions of dollars in assets and manpower. If an incident is reported to the Sheriff’s Department or Coast Guard, which isn’t uncommon, there are established procedures to follow before any response is made. A response for any event, whether a boating accident, cargo spill or personal injury, has the potential to shut down the critical channel for an extended length of time. When an incident is reported, officials must immediately confirm the report. Once confirmed, the proper authorities are contacted and ground or water personnel deployed as needed. The sheriff’s department jurisdiction covers the entire 55 miles of critical infrastructure, so mobility is vital. “I’m not monitoring the lines 24 hours a day personally, but if I get a report of an incident, I’ll pull Milestone Mobile up on my tablet or phone to assess the situation,” stated Deputy Chief Mark Dubois, Jefferson County Sheriff. “XProtect helps us respond quickly, allowing us to pull up video from any particular time and cameras immediately, from any location, to confirm or deny an event.” “With our camera coverage, we can move from evaluation of a report to initiating a response in a matter of minutes, if not seconds,” Moore continued. “There’s time and money there. Once we confirm, all responders’ mindsets are immediately shifted into ‘response’.” The Benefits of Scalability and Usability Quickly allowing access to live and recorded video, Milestone can handle a large number of cameras should the sheriff’s department decide to upgrade or add more hardware devices to the monitoring solution. “Overall, it used to take a lot more time before the sheriff could react to an incident, which could have been a life-or-death difference over a few minutes,” continued Nolan. “Milestone provides the open platform capability, allowing the end user to stay current on the latest and greatest software, and scaling up without changing the entire system from the ground level up.” Training was quick and efficient among the three user groups -- field users on the ground and water, and users in the office reporting on analytics, recording and searching archives. Knight Security Systems created different user profiles and tailored training sessions for each group, showing them exactly the views and functions they will regularly access, rather than diving into processes that would not be relevant to their specific duty. In total, 40 personnel were trained on Milestone, from ‘power users’ to those who use the system casually or view cameras sporadically. Screen images are used for numerous activities besides security, including studying tow configurations, training, and exporting photos and data to port partners. “This is a high-traffic waterway and with a limited width, there are bound to be close calls and incidents,” said Measells. “It’s just good to have more eyes on each vessel. The cameras are high resolution enough to read a soccer player’s jersey number from a mile away in low light! We’re sending photo-quality screenshots throughout our network, which is incredibly valuable for investigations”.
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?