Banking & Finance security applications
Columbia Bank, a Northwest community bank headquartered in Tacoma, Washington, sought to upgrade their video surveillance solution to improve image quality and retention time. They also wanted to maximize field of view to deliver a more forceful and expansive – yet, less intrusive – solution. Working with Cook Security Group, Inc., Ross Armstrong, vice president of physical security at Columbia Bank, chose to overhaul video surveillance in their 150-plus branches across the Northwes...
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorized personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorized staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the vide...
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access contr...
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank Crime Statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about...
As technology continues to catapult forward at a significant pace in the 21st century, banks are increasingly facing new security challenges to safeguard their buildings, staff, customers, and financial operations. Because of this, it is critical that banks invest in security systems that meet the complex and unique requirements of the financial environment. Vanderbilt’s SPC provides this solution through advanced, dedicated intruder detection features and products for banking applic...
Financial institutions of all sizes demand simple, reliable solutions to protect against fraud, theft, and accidents in the workplace. Advancements in camera resolution and storage capabilities have put pressure on banks and credit unions to upgrade their video surveillance systems. Upgrading to a modern, economical NVR server will greatly increase system performance and scalability for small-budget projects with benefits seen across both loss prevention and business insights. Reliable High Per...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favorites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-Store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behavior is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail Banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimize, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalized enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centers (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximize situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernized and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimize human error and optimize resource utilization. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command center through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 deaths. The organization recommends that automobile manufacturers install a ‘kill switch’ that would disconnect a vehicle from the Internet in an emergency to mitigate the threat. Protecting transportation system Automakers are keeping the public in the dark as they market new features based on Internet connections"Consumer Watchdog contends that the vulnerability of automotive computer systems, and the possibility of a cyberattack, has been communicated privately to investors but not widely to consumers. “Automakers are keeping the public in the dark as they market new features based on Internet connections,” says Consumer Watchdog. “Connecting safety-critical systems to the Internet is an inherently dangerous design,” says Jamie Court, President of Consumer Watchdog. “American car makers need to end the practice or Congress must step in to protect our transportation system and national security.” Future designs should completely isolate safety-critical systems from infotainment systems connected to the Internet or other networks, according to Consumer Watchdog. By 2022, at least two-thirds of new cars on American roads will have online connections to the cars’ safety-critical systems, putting them at risk of deadly hacks. Updating vehicle software over-The-Air One economic motive of connecting vehicles to the Internet is the ability of car manufacturers to update vehicle software over-the-air rather than having to recall a vehicle. Systems also enable collection of valuable data on how fast a car owner drives or where he/she shops. Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin. Software may be written by third parties and/or include contributions from hundreds or thousands of different authors around the world, with little accountability for flaws. The ability to update software ‘over the air’ without touching the vehicles lets automakers cover up safety problems and sloppy testing practices, contends Consumer Watchdog. “Allowing consumers to physically disconnect their cars from the Internet and other wide-area networks should be a national security priority,” says Court. “If a 9/11-like cyber-attack on American cars were to occur, recovery would be difficult because there is currently no way to disconnect our cars quickly and safely. The nation’s transportation infrastructure could be gridlocked for weeks or months. Mandatory ‘kill switches’ would solve the problem.” Understanding the risks of connected cars In addition to more attention to cybersecurity, there also needs to be more transparency to enable consumers to understand what is at risk and the choices they make. For example, a group of more than 20 car industry engineers and insiders helped to prepare the Consumer Watchdog report, but many of them remained anonymous for fear of losing their jobs. Consumers have a right to understand the risks they are taking and how they can minimize them. In the Internet of things, cybersecurity dangers extend to almost every device in the connected world, from cars to smartphones to medical devices. Increasingly, we will be asked to weigh the convenience of cranking our car with a smartphone, for example, against the possible risk in the form of vulnerability to cyberattack.
A video analytics system that provides ‘behavioral understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviors, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorized activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioral understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioral understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognized a growing global need for intelligence to make physical and virtual public areas safer – and realized the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioral recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognize behavioral events in a video such as people fighting or a car collision because such behaviors can’t accurately be concluded in large scale from analyzing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognizing a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security“Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behavior inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimized for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviors can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behavior recognition, behavior events many times are not clearly defined, which is very different from object classification. Behaviors can have many variations and they can be very diverse.” An example is a simple behavior like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviors that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
To the lay person they appear to be simple LED light spots going back to the original style of illumination of the old 1800s palace (1876) that currently houses the Italian Ministry of Economy and Finance, and that historically represents the first great building of the newly reborn Roman capital, as commissioned by the former Minister Quintino Sella. Hidden In Plain Sight The carefully hidden technology, however, transforms each of the 20 light points (appropriately designated “Roma lights”) decorating the external perimeter into a state-of-the-art tool to guarantee the security of the public in the area around the Ministry. The transformation is executed thanks to the internal installation of IP cameras produced and distributed world-wide by the German company MOBOTIX, equipped with software for recording and processing the images. Notwithstanding the innovation of the performance, the new lighting systems are perfectly integrated, from an aesthetic point of view, with the historic palace where they are installed: A very advanced system, therefore, in terms of technology, but completely hidden inside a design in perfect harmony with the place where the light spot is installed, as envisioned and implemented by Dr. Massimo Belli, Appointed Administrator of the Ministry of Economy and Finance, Dr. Umberto Dall’Aglio, Director of the VI Office of the IV Department of the Ministry and by Architect Gianluca Canofeni, Director of the Works and Technical Administrator of the IV Department. High Efficiency At A Low Cost The transformation is executed thanks to the internal installation of IP cameras produced and distributed by MOBOTIX “The motivation for the project was multifaceted: On the one hand to realize a control system based upon state-of-the-art video surveillance tools, and on the other hand implementing a new lighting project to substantially reduce electricity consumption – within the scope of energy efficiency –, guaranteeing at the same time a much longer useful life, and as a result a substantial reduction of maintenance costs”, said Lieutenant Colonel Saverio La Monaca, chief of the Central Security Organization of the Ministry. As per the costs, the analysis carried out by the Ghisamestieri teams, obviously as a function of the actual system utilization give a clear picture: It is foreseen that the initial investment will be recouped within only 4 or 5 years and economic savings of even 50% between the fifth and fifteenth year of useful life of the system. With respect to energy savings, MOBOTIX’ video cameras provide a further guarantee, since their energy consumption is extremely low in comparison with other technologies present on the market: about 4 to 6 watts per hour. MOBOTIX DualDome Cameras The project, comprises today 20 wall light spots installed in strategic positions throughout the Ministry. Each shelf hides inside 2 MOBOTIX DualDome cameras with 180 degrees field of view, for an overall total of 40 high-resolution IP security cameras. The images can be recorded inside the cameras 24/7 (color, and black and white) to be viewed at the control center located inside the Ministry building. The security personnel belonging to the military branch of the Financial Guard manage the complete video surveillance apparatus and constantly monitor the images of the cameras in real time. 10 wireless routers manufactured by the young Italian company 3WLan, are installed inside a similar number of wall brackets and are capable of guaranteeing the bi-directional Wi-Fi link between the control center and the patrols active outside the palace. This is possible thanks to an authentication on a RADIUS server that identifies the access permissions of the router on a list of authorized equipment. Exchange Data And Images In Real Time The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile" “Especially in case of demonstrations, which is actually very common, our security operators are involved in the so-called pacification operations outside the palace for the purpose of first of all protecting the ministerial magistrates. These are carried out both on foot and inside our patrols – which implies the need to rapidly cross-check the owner of a particular vehicle or verifying the personal data on passports and identification documents. "Before installing the new intelligent light spots we relied on a GSM system that was, however, very expensive. The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile”, added Giancarlo Varvo, who is responsible for security. The video surveillance technology available on the patrol vehicles, which are also equipped with tools to read license plates, or palmtop operating systems (also known as explorers) supplied to foot patrols, once within the radius of coverage of the poles equipped with Wi-Fi antennas, have the option of exchanging data and images with the operations center inside the Ministry by means of a recognition system. Furthermore, by connecting to a specific IP address, external patrols have the possibility to view the images recorded by a specific video camera in real time. Remote Day/Night Illumination Management Each support is also equipped with a remote switch that allows managing the illumination and video surveillance functions completely autonomously and independently from each other. While the light source turns on at dusk and switches off at sunrise, the cameras continue functioning 24/7, according to the specific settings they may record both in continuous mode or trigger upon an event, such as the movement of a pedestrian, or a sound. The cameras placed close to the entrances of the Ministry are capable of sending alerts in real time to the operations center, or activating a bollard along the perimeter thanks to an automatic vehicle license plate reading system. In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras" Nothing to object about the support of the engineers of Ghisamestieri, that proved to beat all times available and collaborative in answering the requirements of the Ministry. Also, no complaints about Genius, a unique world-wide illumination solution, capable of offering high level design and advanced technology in a single solution. No objections about the technology made in Germany of MOBOTIX. Securing The Facility With Additional Cameras “In addition to the project implemented with Ghisamestieri, we employed the technology of MOBOTIX also for other types of requirements, still obviously related to the security of the Ministry: 36 AllroundMono security cameras have already been installed on the roof of the palace to check potential attacks for instance through the air vent conduits to the so-called Tempest room, a completely aseptic environment for the protection of communications inside the Ministry. "In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras installed in various facilities connected to the department”, underscores Varvo. The light spots installed in Rome find their place in a wider project, where any illumination support can potentially serve as a technology node. Named “Genius” by their creators, regardless of the design or aesthetic form, any light spot is potentially capable of becoming a true security center, perfectly integrated from the aesthetic and urban points of view into city decor. Equipped with microphones and speakers, MOBOTIX’ cameras can put the citizens in touch with the operations centers of the police or ambulances by means of special buttons placed at the base of the pole or through the implementation of an RFID or magnetic strip identification system. “With respect to traditional poles with well-visible cameras installed outdoors, Genius represents a true video security system, not just a simple crime deterrent”, concluded Varvo.
PVcomBank, one of Vietnam’s fastest growing and most progressive banks, has acquired a cutting-edge March Networks video surveillance system. Established in 2013 through a merger of PetroVietnam Finance Corporation and WesternBank, the Hanoi-based financial institution is a joint stock commercial bank with 115 branches throughout the country. Shareholders include Petro Vietnam with a 52 percent stake and Morgan Stanley with a 6.7 percent strategic interest. Prior to selecting the March Networks technology, PVcomBank had a variety of different video surveillance systems installed throughout its branch network. The bank wanted to upgrade to a high-performance solution it could eventually standardize on for all of its retail branches, ATMs and corporate offices, and centrally manage from its headquarters in Hanoi. “The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.” Enterprise-Class Video Surveillance The enterprise-class March Networks system PVcomBank is now deploying consists of 8000 Series Hybrid NVRs, Command Enterprise video management software and hundreds of March Networks IP cameras, including MegaPX WDR MiniDomes Zs and MegaPX Indoor IR Domes.More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe PVcomBank relied on the advice of Intelligent Building Solutions (IBS), a security systems integrator and March Networks certified partner with offices in Hanoi, Ho Chi Minh City, Singapore and Phnom Penh. “We wanted to upgrade to a high quality, enterprise system with central management and health monitoring,” said Nguyen Manh Hai, PVcomBank. “IBS recommended March Networks because of its track record as a global leader in the delivery of video surveillance solutions to the financial sector.” More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe, and help reduce losses due to fraud, theft and liability claims. IBS, a supplier of security and building automation products, including video surveillance, access control and intrusion detection systems, began rolling out the March Networks system across PVcomBank’s branch network in June 2015 and expects to complete the deployment by the end of 2016. Hybrid Capability Results In Lower Costs The hybrid capability of the March Networks 8000 Series NVRs is ideal because, in addition to approximately 250 new March Networks IP cameras, PVcomBank opted to continue using analog cameras from its previous video surveillance systems. Continuing to use its existing cameras with the March Networks system kept costs down and resulted in noticeably improved video quality from the analog cameras. Access to video is restricted to the bank’s security staff and used to obtain evidence of burglaries, fraud and other reported incidents. Eight and 16-channel NVRs are equipped with 6 and 8 TB of onboard storage, respectively — sufficient for approximately 60 days of video retention. The 8000 Series recorders are available in 4, 8, 16 and 32 channel models and can accommodate two simultaneous recording streams — one lower resolution stream for viewing online, and another full resolution, full frame rate version for investigation purposes. Built for maximum reliability, they feature a secure Linux operating system to better protect against viruses and malware, and an internal battery backup for systematic shutdown in the event of power loss.The 8000 Series recorders can accommodate two simultaneous recording streams The 8000 Series recorders are also designed for easy maintenance with docking station architecture that keeps all cables securely connected to the back of the unit for faster, more convenient installation and servicing. Technicians can also take advantage of March Networks’ industry-first GURU Smartphone Application to scan the QR code on any 8000 Series NVR to quickly find the recorder’s serial number and warranty status, speed troubleshooting, link to video tutorials and use an installation audit feature to run automated reports on the video system’s configuration complete with camera field-of-views. Simplifying Day-To-Day System Administration The Command Enterprise video management software used by PVcomBank simplifies day-to-day system administration with centralized management and mass configuration tools, and provides real-time health monitoring that alerts administrators to performance issues. A customisable user interface with motion histogram and thumbnail images allows investigators to quickly zero in on video evidence. “We are very pleased with our March Networks video surveillance system,” said Nguyen Manh Hai. “We worked closely with IBS, our security systems integrator, to select a system that would meet all of our needs. The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.”
Customer: The Absa Group Limited is one of South Africa’s largest financial services groups, offering a complete range of banking and wealth management products and services. Absa Bank's business is primarily in South Africa, and the group has equity holdings in banks in Mozambique and Tanzania. Absa is a subsidiary of Barclays Bank, a major global financial services provider with an extensive international presence in Europe, the United States, Africa and Asia. Challenge: Absa Bank’s objective was to streamline its processes and reduce costs while maintaining a clear focus on the individual customer’s experience. Their decision to deploy megapixel network cameras in a proof-of-concept video surveillance installation was based on leveraging the greater system efficiencies, functionality and superior image quality of megapixel technology. Megapixel Solution: The new security surveillance system at Absa Bank was installed by AV Enforce Electronics (AVEE) of South Africa. The system employs Arecont Vision's 2.0 and 3.0 Megapixel Cameras positioned behind teller stations to closely monitor transactions between bank employees and clients. In addition, Arecont Vision's 8 Megapixel 180-degree and 360-degree Panoramic Cameras (AV8185 and AV8365) watch over customer queues, automated teller machines (ATMs) and the general banking hall with extreme image detail. Each Arecont Vision megapixel camera at the Absa Bank installation is connected to a power-over-Ethernet network switch that serves as the network video connection and also as the power source to the camera. Cameras are recorded on Luxriot network video recorders. The system is monitored locally by authorized management personnel. Arecont Vision's AV3105 3-Megapixel Camera uses a ½ inch CMOS sensor to provide 2048x1536-pixel progressive scan images at up to 15 frames per second (fps). The camera is built with Arecont Vision's massively-parallel MegaVideo technology, providing image processing at billions of operations per second. It can output multiple image formats of larger areas to allow simultaneous viewing of the full resolution field of view and regions of interest. The Arecont Vision AV2105 2-Megapixel Camera provides 1600x1200-pixel video at up to 24 fps, with light sensitivity of 0.1 lux at F1.4. Features include forensic zooming on archived video, region-of-interest views, as well as image cropping and motion detection. The panoramic view cameras used at the Absa Bank proof-of-concept installation are the 180-degree Arecont Vision AV8185 and 360-degree Arecont Vision AV8365 8-Megapixel Cameras. Both models employ four 2-megapixel sensors enclosed in 6-inch IP66-rated domes and provide up to 6400x1200-pixel images at 5.5 fps. The cameras can be set for lower resolutions at higher frame speeds, such as 1600x1200-pixel images at 22 fps or 800x600-pixel images at 88 fps. The cameras also use Arecont Vision MegaVideo video processing at billions of operations per second. Light sensitivity is 0.2 lux at F2.0, and the cameras provide image cropping and up to four regions-of-interest. “Arecont Vision outperforms all the current competitors,” said Alex De Barros of AV Enforce. “The price compared to analog cameras is better considering the fact that you gain so much. We were able to capture images for the bank that were never achieved before.” Megapixel Benefit: The proof-of-concept system atAbsa Bank has demonstratedthat megapixel cameras aresuitable for applications inthe banking environment andrepresent a significant upgradein system functionality comparedto standard-resolution cameras Arecont Vision megapixel network cameras use H.264 compression to minimize bandwidth and storage needs and are available at costs comparable to standard-resolution alternatives. Megapixel images provide much more detail in playback mode for forensic investigations. Operators can zoom in for up-close views on stored images. They can view specific parts of a larger image, such as a person's face. A benefit for Absa Bank is creation of a database of suspected criminals to allow operators to identify them easily. The use of megapixel video enables a larger area to be covered with fewer cameras, which reduces overall system cost which make it easier to realize ROI. Higher-resolution images boost the functionality of systems, enabling pristine image quality at industry-leading high frame rates, while minimizing bandwidth usage with H.264 video compression. The proof-of-concept system at Absa Bank has demonstrated that megapixel cameras are suitable for applications in the banking environment and represent a significant upgrade in system functionality compared to standard-resolution cameras. In addition to lower bandwidth and storage requirements, megapixel cameras can dramatically decrease costs related to other elements of a system, such as fewer software licenses, less cabling, fewer lenses, and a decrease in man-hours needed to bring it all together. “There is a lot at stake in the banking environment, and megapixel imaging can vastly improve the performance of the video surveillance systems in this important market,” said Ethan Maxon, Middle East and Africa Regional Sales Manager of Arecont Vision. “We continue to spread the word about the unparalleled image quality and resolution of Arecont Vision's megapixel IP video cameras. It's good to know that Absa Bank has experienced those benefits first-hand.”
Founded in 1877, Banco de Costa Rica (BCR) is the second-largest state-owned bank in Costa Rica. Today, BCR provides a broad range of financial services, including retail banking.Looking to protect its staff, buildings and financial assets, BCR has set upon a major project that will see its 4,500 employees, in 278 offices across Costa Rica, protected by an integrated hybrid CCTV and alarm system. The fundamental characteristic of the project is its implementation over unshielded twisted-pair (UTP) structured cabling networks, which will allow the use of legacy equipment to be integrated into a scheme that paves the way for migration to security solutions based entirely on this transmission media.Network Video Technologies (NVT) UTP CCTV video transmission equipment plays a fundamental role in the hybrid solution, enabling both legacy and new systems to be combined, delivering high-quality real-time video over large distances; to help ensure a measured and rapid response by the bank to any alarm scenario.One of the most important government financial institutions in Costa Rica, BCR was previously protected by a CCTV system based on coax cable and using monochrome cameras. Consequently, one of the aims of the bank's directors in implementing the new solution was to unify all of its systems to operate over UTP networks.Protection on multiple frontsThe new solution will encompass the bank's 278 branches, public offices and administrative buildings across Costa Rica, 450 buildings in total. Randall Ruiz Parajeles, the Bank's Director of Electronic Security explains about the project roll out: "At the moment 80% of the bank's buildings are covered, thanks to the installation of NVT video transmission equipment. Our aim was to improve video signal quality, eliminate interference noise, and most importantly, using NVT technology we will be greatly extending the video transmission distances without suffering video quality losses, which is what happens with coax."From coaxial to hybrid systemsBanco de Costa Rica has always had a surveillance system, the purpose of which was to protect the security of visitors to each of the bank's offices, as well as their money. These consisted of analog recording systems and standard-resolution monochrome cameras, with transmission via coaxial cables. Analogue recording systems as well as standard resolution monochrome cameras were included in the solution from NVT "For the system-wide renewal, the number of cameras has been increased, but many of them were re-used," explains Parajeles. "There are currently more than 4,500 NVT UTP transmission links installed that transmit the camera video over twisted pairs, using high-resolution day/night and low-light equipment. As for the recording systems, we are using digital equipment that works over the IP network.""It should be noted that NVT equipment was installed right from the start of the renewal programme. NVT allowed us to retain existing equipment as an infrastructure and adapt it to work with the newer devices, making this match between the two without having to discard units that might still give us some useful working life. We were able to integrate these units with the new ones in a manner entirely transparent to the monitoring personnel, who are now able to have everything integrated seamlessly on a single platform."The current configuration of the security system, installed by Seguridad y Protección de Centro América, has a threefold purpose: it is intended to be dissuasive, but also persuasive, and to allow verification of the events reported by the alarms. In this sense, it can be said that it is designed for both supervision and recording.But a major component of the system is the automation programme. This means that the CCTV system is complemented by the alarm system, which, when an event occurs, generates pop-up windows in the control center. There is also a link to the lighting systems, so that when an alarm is given, the lights in a particular area are switched on.The cameras and PTZ domes installed in the system are all Pelco models. Recording is carried out by Honeywell Rapid Eye units. In total, around 450 recording units have been installed. NVT technology allows extending the video transmission distances without suffering video quality losses A fundamental decision: hybrid instead of IPHowever, a review of the characteristics of this system immediately prompts a question. If the system was designed to run over UTP based structured networks, why implement a hybrid model instead of installing end-to-end IP.Parajeles explains that the use of UTP and NVT devices allows the linking of analog and digital equipment on a given IP network helps businesses to start down the road towards a single-stage system, because they are designed to work over structured cabling. "For us, it was rather difficult to install IP cameras because of bandwidth considerations, the quantity of IP addresses needed and the infrastructure that would require us to have individual physical connections for each camera in each branch. After looking into the matter, we could not find an IP camera that would, on its own, allow us to transmit over the network without adversely affecting the establishment's bandwidth."High-satisfaction technologyWhen a large institution implements such an important project, it is looking to simplify its operation and enhance its ability to respond when that operation finds itself put to the test. From this point of view, it can be declared that Banco de Costa Rica has fully met its target, in terms of guarantees, ease of installation and professional achievements; NVT has become an important ally.Summarising the entire process, Parajeles concludes: "This is an investment that will pay for itself over time. And because the quality of the NVT equipment is so good, visits to the sites of the various installations have also been reduced."
Security for banks can be a real challenge when faced with a multitude of threats including: fraud, theft and physical attacks. One bank which is setting new standards in the Middle East, when it comes to the application of surveillance technology to keep its infrastructure, staff and customers safe and secure, is National Bank of Kuwait (NBK). This is thanks to the roll out of an advanced NetVu Connected CCTV solution from Dedicated Micros part of AD Group which is focused on the centralized monitoring of all of its branches and critical ATM infrastructure.Awarded the Best Bank in the Middle East 2010 accolade by EuroMoney, National Bank of Kuwait (NBK), which was incorporated in 1952 as the first indigenous bank in the entire Gulf region, remains the preeminent banking institution in Kuwait as well as being an established banking franchise across the Middle East and supporting a large branch network, spanning 17 countries, including many of the world's financial and business centers.Dedicated Micros connection with National Bank of Kuwait stretches back over four years. The catalyst for the surveillance specialist being brought on board for this ambitious ATM protection project was the bank's dissatisfaction with the CCTV solutions it tested from other providers. A spokesperson for the Engineering Services Division, NBK, takes up the story: "We looked at and tested several brands of DVRs as potential answers to our pressing ATM surveillance needs before deciding to go ultimately with Dedicated Micros. The solutions that fell by the wayside were simply too cumbersome and complicated in terms of all the extra equipment (and software licenses) that would have been required to activate the functionality we wanted. This was in stark contrast to Dedicated Micros which was able to meet our needs based around an effective hardware-based package." Said Salim Idris, General Manager (Middle East), Dedicated Micros: "When contacted by NBK we were delighted to assist Kuwait's foremost banking establishment, not only were we able to demonstrate that we had the solutions available, such as the DV-IP ATM, that could address their specific requirements head-on, without lots of add-ons, but could also point to an unparallelled track record. To put our extensive experience, protecting the banking sector, into some sort of context, across the Gulf Cooperation Council area alone, we can now count 10 major banks - in Bahrain, Dubai, Kuwait, Oman, Qatar and Saudi Arabia - as customers. Significantly, as our CCTV systems are embedded, rather than PC based, they are recognized for their stability - essential in the banking environment - whereas PC dependent solutions have a reputation for crashing without warning."ATM FocusLooking in more detail at the systems from Dedicated Micros which have been put in place at NBK, since 2006, to support the effective monitoring of vital local and overseas ATM related infrastructure. These comprise 28 individual DV-IP ATM units which are used primarily to protect standalone Automated Teller Machines, with numbers expected to rise as part of the ongoing ATM project. There are also 145 NetVu Connected DS2 DVRs, with typically two systems connected at each National Bank of Kuwait branch plus an associated RAID (Redundant Array of Independent Disks) unit giving additional storage capacity to the existing internal hard disk of the DVR.This set-up offers redundancy and resilience to ensure any recorded video images are securely stored. In the case of the larger Dubai branch this combination was doubled up and four (DS2s and RAIDs) were installed at NBK's extensive Bahrain site. To help with the management of the geographically dispersed NetVu Connected CCTV infrastructure, at an early stage, Dedicated Micros was called upon to assist NBK in the setting-up of centralized monitoring from a control room. This was achieved by deploying NetVu Observer video management software to allow operators to seamlessly view distributed images from any NetVu Connected product. DV-IP ATM units from Dedicated Micros have proved useful in making transactions more secure and safe The robust DV-IP ATM units specified for the National Bank of Kuwait project are designed to work, primarily, within the confines of an Automated Teller Machine. Certainly the security challenges with regards to banking are most keenly felt when it comes to the safe operation of Automated Teller Machines (ATMs) whose accessibility makes them a convenient target for card skimming, shoulder surfing, and even physical theft from customers. It is CCTV systems, specifically remotely accessible DVRs, that are at the very heart of efforts to deal with these types of threat.Combining Video and Transaction DataThe Dedicated DV-IP ATM, based on NetVu Connected technology which ensures its interoperability with other DM and AD Group systems, is able to process transaction data which is then recorded with video footage. Post event analysis, via a powerful text search engine, provides video imagery of the ATM user plus the associated transaction information. For NBK this allows security staff to deal with any fraudulent activity and ensures that customer services representatives are well placed to quickly resolve any genuine customer withdrawal disputes.Marrying up the DS2 DVRs with RAID units at every NBK branch, also facilitated the effective monitoring of each location including the in-branch ATMs not covered by the DV-IP ATMs. With, in this case, the cameras in the ATMs connected to the DVRs which had been specifically programmed to have the capability to associate transaction data with the appropriate video footage.The ability of both the DV-IP ATM systems and DS2 DVRs, deployed for the NBK project, to apply Dedicated Micros' TransCoding technology to record evidential quality MJPEG locally and simultaneously support low bit rate data streaming in MPEG-4 compression format for remote viewing has proved to be advantageous in keeping bandwidth demands on NBK's network to an absolute minimum. Of course local recording (including the additional capacity provided by the RAID units) has the added benefit that, even in the event of a network failure, recording is not interrupted or vital evidence lost. Adding-Up the Benefits NetVu connected solution from Dedicated Micros has enabled National Bank of Kuwait to monitor all the branches Reflecting on the success of the project to date, a spokesperson for the Engineering Services Division, NBK, commented: "The NetVu Connected solution from Dedicated Micros we have adopted has given us the opportunity, for the first time, to monitor all of our branches remotely 24/7 wherever they might be and to cover a large number of ATMs (181 at the latest count) through the ATM transactions interface. We have been very pleased with the performance of the NetVu Observer viewing software over the past four years - which we are in the process of upgrading to Pick-a-Point Icon - as it has made it extremely easy to retrieve footage and to playback recordings over the network. With numerous cases involving ATMs reported on a daily basis and, with the Dedicated Micros' solution in place, we have been able to provide recorded footage, in a timely manner, to offer proof of what has actually happened. In practice, we have found the speed that video can be delivered across the network to be extremely favourable, for management and archiving, when set against the limited bandwidth provided."The distributed architecture of the solution has also meant that even, when there has been a network issue, critical recording has been able to continue unabated. Testament to this is the fact that since the start of the project no footage has been lost in this way. A major benefit we have also seen, in terms of cost of ownership, is the fact that from an Engineering Services' point of view the DVRs have been much easier to maintain, compared to what was in place before, and we have been very impressed with the stability of the DVRs in operation with zero reported failures. Alongside this the web-based configuration for the Dedicated Micros' systems has proved to be very intuitive."Future Plans Looking ahead, Dedicated Micros is working closely with NBK to expand the capabilities of the surveillance infrastructure. One key development soon to go 'live' is the implementation of the Pick-a-Point Icon multi-site video management solution in the bank's main control room to further enhance the remote monitoring of all of the bank's geographically dispersed locations. The uplift in functionality provided by Pick-a-Point Icon's more extensive features, compared to NetVu Observer, should greatly enhance the ability of the bank's security staff to manage and control their CCTV infrastructure. Dedicated Micros has formed many of the building blocks for the success of today's CCTV industry From the start Pick-A-Point Icon has been designed to be intuitive for operators, simplifying and speeding up image retrieval. In future, operators in the main NBK control room will be able to select cameras using Pick-A-Point Icon's enhanced GUI (Graphical User Interface) via multiple map screens and highly detailed map images, allowing them to pick a camera on-screen without having to know which digital video recorder the camera is linked to. Pick-A-Point Icon is based around a robust standalone hardware based workstation, which eliminates the reliability issues associated with PC based systems - a key consideration in the banking sector.Closed IPTV InvestmentCommented Salim Idris, General Manager (Middle East), Dedicated Micros: "As the surveillance solution moves ahead, we are delighted that National Bank of Kuwait has confirmed that it will also act as a trailblazer for the deployment of our award winning Closed IPTV 'IP Video' solution. This follows on from the successful testing of the Closed IPTV version of the SD Advanced hybrid NVR/DVR, which will now be rolled out gradually across all of the bank's extensive branch network, making NBK one of the first customers in the Middle East region for this new solution."Essentially, adopting Closed IPTV systems such as the SD Advanced - in conjunction with a Layer 3 Enhanced CCTV Switch which provides greater security for less configuration effort than a conventional managed switch - makes deploying an IP Video, CCTV system safe, secure and simple. Combining patent-pending innovation with zeroconf networking technology, Closed IPTV automatically allocates IP addresses to IP cameras by physical port. In this way the system is completely deterministic, creating firewalls and monitoring IP connections by individual network ports so they cannot be hacked or intercepted. This ground breaking solution provides a very simple and secure answer to IP Video, where no prior knowledge of IP networking is required. National Bank of Kuwait is going to adopt Dedicated Micros' HyperSense APNR cameras for its car park management A further enhancement, in the pipeline for NBK, is the adoption of Dedicated Micros' HyperSense ANPR cameras for its car park management, in this case combining an Overview and ANPR camera, with alerts triggered by car park barriers to monitor vehicles entering and leaving a location. The sophisticated HyperSense technology built in to the cameras removes ambient light from the scene leaving only the objects that strongly reflect the IR light emitted by the integrated invisible IR LED flash to be displayed. The ability to eliminate glare from vehicle headlights delivers a more distinct image for evidential purposes and the black and white ANPR camera ensures that details of the numberplate can be seen, whilst the 'overview' camera allows this to be tied-up with other details such as the color of the vehicle.Banking on SecurityUltimately, National Bank of Kuwait, through continuing investment in the latest surveillance infrastructure from Dedicated Micros, has demonstrated a real commitment to not only be a leader in the banking services it provides but also, crucially, to back this up with the best possible levels of security for customers, staff, and physical assets such as the branch network and ATMs making NBK ideally placed to deal expeditiously with any form of criminal attack.
Security management in banking is a discipline unlike any other. Rather than integrating all security into one centralized system, some banks choose decentralized security for their branch offices. AEOS, a leading platform in integrated security, turns out to be just as effective when deployed decentrally. ”We were already using Nedap AEOS in our headquarters, as well as various regional offices. Then, in 2011, the security system used by our 800 branch offices in Belgium needed to be extended with access control. Because we were already aware of AEOS’s capabilities and very satisfied with its performance, it was a logical step to ask Nedap to solve our problem.” - Joris de Greve, Security Manager at ING Belgium. Key Management Challenge ING’s 800 branch offices in Belgium were already equipped with autonomous intrusion detection and camera surveillance. All doors and their accessories, such as locks, push buttons and door contacts, were monitored and controlled by the intrusion detection system. Doors were opened and closed using keys in security cylinders. A central alarm management system handled alarms coming in from local intrusion control systems.It was virtually impossible to keep track of the physical keys and who was authorised to use them" Key management had become a problem, according to De Greve. ”It was virtually impossible to keep track of the physical keys and who was authorized to use them. We had no central database in which authorisations could be assigned or retracted.” In addition, changing locks, replacing keys and keeping key plans up to date had become difficult. “It was time for an electronic access control system,” explains Peter Rommens, Country Manager at Nedap Belgium. “Since all peripherals were connected to the intrusion detection system, the scope of the project was clearly defined. We were looking purely at access control at one or more doors per office.” Expanding The Centralized AEOS System After considering a wide range of solutions, ING eventually selected two for further evaluation. One was to add access control to the existing intrusion detection systems. This was technically the least complicated option, because the basic infrastructure and necessary hardware were already in place. The other option was to expand the centralized AEOS system that was already up at headquarters and regional offices to include access control at the branch offices. The latter offered the major advantage of being able to connect all branch offices to one central database, while retaining the ability to delegate responsibility for authorisations to lower-level security management layers. Other benefits of this option included its system architecture, the proven stability of the system for large numbers of offices and cardholders, the system’s scalability and flexibility, the native IP controllers’ ability to communicate peer-to-peer and bypass the server, and the system’s redundant facilities and security (failsafe, switching servers, etc.). Flexible And Extra Secure The factor that clinched the deal was that AEOS allowed for decentralized management of separate units and the use of entrance filters. This meant local offices could be authorized to manage their own security without access to other offices’ data, Joris de Greve explains. “The bank’s security structure is based on central access to buildings and central facilitation of technical solutions, but decentralized security and access responsibility per zone. Therefore, the system must allow us to cluster cardholders into groups with different authorisations. AEOS supports this.”Cardholders who lose or forget their badge are issued a replacement while the original badge is invalidated" “Another factor was ING’s requirement that authorisations not be assigned to a badge, but to a cardholder,” adds Rommens. ”This builds in extra security: cardholders who lose or forget their badge are issued a replacement while the original badge is invalidated. This guarantees there are no unaccounted-for, authorized badges ‘floating around’. Decentralized Approach ING combines centralized and decentralized policies. Overall security policy is set at top headquarters; security management there decides who is authorized to manage accounts and which authorisations may be assigned. This is part of the bank’s security structure. We ask ING Belgium Security Manager De Greve to illustrate. “For example, the Milan office uses a server in Belgium and the technical facilities provided by central security management. However, the management in Milan are in full control of who is allowed access to their building and when,” he says. User training is also decentralized. There are some 500 administrators, all of whom were trained internally and decentrally. AEOS enables this flexibility. Because AEOS is web-based, interventions are simply and swiftly carried out. Keeping An Eye On Things A consequence of decentralisation is the need for reports. “Central management wants to keep an eye on what is happening at the various branch offices,” De Greve says. ”Is security functioning properly? And are offices complying with security policy?” He believes reports “are also a valuable management tool.” For example: how many people are at work at any given time, or whether people only come in a few times a week. “This helps us to make sound decisions concerning flexible office space, for instance, and that’s an important way to reduce costs.” Proxy Offices Roll-Out ING BE has two different types of offices: Proxy offices where all money is distributed by ATMs and Full Service where staff behind counters provide service. In both types of branches local staff is present and mobile specialists are available to respond to specific needs or questions customers may have. Nedap is currently installing AEOS at the 800 Belgian branch offices at an approximate rate of nine offices per week. Peter Rommens explains how the roll-out is being organized logistically: “In preparation for installation, ING centrally creates the appropriate authorisations in AEOS. Then, Nedap’s business partner defines the configuration and uploads this to the controller. This means on-site installation is quick; once the controller is connected and deployed, the system is up and running.”Each office is prepared for expansion of its access control or the addition of other security functionalities" AEOS At Proxy Offices “The bank preferred our proposed solution, with one AP4803x per branch office, over a solution with one or more AP6003 network controllers per office but only one AEpu per ten offices,” Rommens says. “Although having one AEpu per office is costlier, availability is more sure with the AP4803x and it offers more long-term advantages. It means each office is prepared for expansion of its access control or the addition of other security functionalities.” Proxy offices are defined as individual access control zones. Each office has its own profiles defining who is allowed access and on what basis. Proxy offices are secured with readers and a key replacement badge. The alarm system runs separately from the access control system. The badge only provides access, while arming and disarming the alarm system requires identification. In line with existing policy, if an unauthorized person finds a badge and tries to use it when the office is empty, this sets off an alarm. If a person tries to use a stray badge when the office is manned, he or she is immediately exposed by staff (social control). “Badges are also blocked based on expiry date or end of contract because in general the fewer badges in circulation and the fewer people with access, the smaller the security risk,” says De Greve.
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?