Education security applications
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regul...
Allianz Parque has become one of the most modern multi-purpose arenas in Latin America since it was built in 2014 by WTorre Properties. The stadium is located at the same place of the old Palestra Itália Stadium with a capacity of more than forty thousand spectators. The stadium not just meets FIFA standards but was also awarded various prizes including the Master Award in the 11th edition of the Grand Prize for Corporate Architecture, the Accessibility Seal, delivered by the Permanent A...
One French town just north of Paris faced familiar key management challenges. Each person in their Municipal Technical Centre had to carry approximately forty physical keys. If a single key was lost or stolen, for even one door, all compromised cylinders had to be changed. To prevent unauthorized access, all the keys had to be replaced, too — at great expense. Key duplication costs were mounting. “One lost key cost from €3,000 to €4,000 for changing cylinders and replacing...
Each of Denmark’s 550 individual Free Schools shares a common ethos: parents and students participate together in activities outside school hours, including weekends. It’s excellent for building a school community. Not so easy for managing security, when issuing and tracking keys becomes a 7-day task every week. The Vejle Friskole turned to SMARTair® wireless access control for a solution. Previously, key management ate up “a very long time, approximately 5 hours a week,&r...
Prama Hikvision partnered with the Sanjivani Group of Institutes to offer latest surveillance and security solutions. For the first time that Artificial Intelligence was offered, and enabled face recognition terminals in India’s education sector. Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar is a premier institute for Engineering, Pharmacy, Nursing and Diploma in Ahmednagar District. Sanjivani took its names and inspiration from the famous epic of Ramayana where ‘S...
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Private video systems are offering new sources of evidence for police investigations. Growing popularity of private camera registration schemes are facilitating police department access to video captured by cameras in homes and businesses for use in their investigations. Camera registration programs are organized locally by individual police departments but have common features and operation. By registering their camera systems, citizens and business people provide information to a confidential database listing any cameras police can quickly access in the event of a crime. Knowing which cameras may be near a crime scene avoids police having to go door-to-door in search of possible video footage. Because perpetrators are more careful and aware of possible video coverage in and around a crime scene, video to solve a crime may also come from a camera several blocks away. The best evidence may not be of the crime scene itself but video of nearby pathways and streets. Today’s camera systems also provide information such as location, date and time that can help an investigation Ability to record and retain video Access to cameras can also provide additional viewing angles to provide police new leads such as type of car, clothing, etc. Another benefit is possible use of a camera’s view to help locate lost children, elderly or disabled persons. In addition to actual video, today’s camera systems also provide information such as location, date and time that can help an investigation or be used as evidence in court. Basic requirements for participating video systems are exterior-facing cameras and the ability to record and retain video. It is important to note that registering a camera system with a local police department does not provide active surveillance or a “live feed” of video. Video is only shared after a crime has been committed and when the police request specific video as possible evidence. Registration of camera systems is voluntary Registration merely enables a police department to know where accessible cameras are located. Police then arrange viewing of video footage after the fact by communicating with the camera owners; if a police visit to a residence might pose an additional risk for any reason, camera video today can often be accessed remotely. Registration of camera systems is voluntary; a state-wide proposal in New Jersey in 2015 calling for mandatory camera registration faced privacy backlash and was later amended to make registration voluntary. Collected information is typically the name of the camera owner, contact information, an address where the cameras are located; how many cameras are at the location, the area recorded by the cameras and how the footage is saved. Police arrange viewing of video footage by communicating with the camera owners Residential security camera Portland, Oregon, launched its CrimeReports camera registration program in 2017, part of its wider effort to get residents involved in fighting crime. In Philadelphia, the police department has been registering cameras since 2011 under its SafeCam program. The Philadelphia Department of Commerce offers a payment, up to $3,000, to reimburse business owners who install cameras and register them with the police. Camera registration is yielding results. Baltimore’s Citiwatch camera registration system has had a direct impact on criminal apprehension. The San Luis Obispo, California, Police Department reports a high success rate identifying suspects in cases where additional video evidence exists because of the camera registration program. In Fort Worth, Texas, last May, a residential security camera played a role in capturing a kidnapping suspect. Privacy concerns and community feedback Many of the camera registration schemes have localized branding or acronyms, such as the S.C.R.A.M. (Security Camera Registration and Mapping) program of Milton, Georgia; the C.A.P.T.U.R.E. (Community and Police Team Up to Record Evidence) program of New Braunfels, Texas; or the RockView program of Rockville, Maryland. The idea is based on willing participation of public citizens in helping law enforcement do their jobs Privacy concerns and community feedback prompted Vancouver, Washington, to suspend a camera registration program for weeks until it could be re-launched earlier this year. Although cities seek to protect information about the locations of cameras, it might be subject to disclosure because of public records laws. Law enforcement and crime prevention Registration of cameras is another aspect of involving the community in law enforcement and crime prevention, not unlike the commonplace Neighborhood Watch programs. The idea is based on willing participation of public citizens in helping law enforcement do their jobs. Making video footage available provides important evidence in much the same way a witness to a crime would hopefully testify if asked. By multiplying the availability of cameras that could view elements of a possible crime, the idea is also akin to the modern concept of “crowdsourcing” – the practice of obtaining information or input by enlisting a large number of people. Local jurisdictions stipulate that registrants in the program should not be construed as agents and/or employees of the police department. There is also a crime prevention element to the programs, in addition to helping police do their jobs better and more efficiently. Some camera registration programmes provide stickers or yard signs to let the neighborhood know that their security cameras are helping to fight local crime.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Missed part one of our healthcare mini series? Click here.
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system. The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution. Wireless Locking Technology Aperio wireless locks are battery powered, and so use much less energyUEA’s needs included more than just security, stylish component design and affordability. Crome Court was specifically designed to minimise environmental impact, including CO2 emissions. Any access control system was expected to contribute to that goal. The university chose Aperio wireless locking technology from ASSA ABLOY. Aperio wireless locks are battery powered, and so use much less energy than wired magnetic security locks. They only “wake up” when a credential is presented to the reader. On Campus Training “We decided to offer Aperio to upgrade and extend our system at UEA because of its outstanding reputation within the security industry,” explains Jason Boyce, sales manager at Gallagher. “Having worked with us for 6 years, Gallagher knew we would deliver,” adds David Hodgkiss, national sales manager at ASSA ABLOY UK. Installation was quick and easy, aided by training delivered on campus by specialist ASSA ABLOY technicians. “We found ASSA ABLOY’s service faultless,” says Wayne Dyble, installation and support manager at Check Your Security, UEA’s service provider. Environmentally Advanced Profile There’s no need for expensive and time-consuming work changing the locks Crome Court’s secure doors are fitted with Aperio E100 online escutcheons. Students open them with programmable RFID smart cards, instead of cumbersome mechanical keys. If a keycard is lost, it is straightforward for UEA facilities staff to cancel it and issue a replacement—using a simple web-based interface or mobile phone. There’s no need for expensive and time-consuming work changing the locks. UEA also aimed to build Crome Court with an environmentally advanced profile. Here, too, Aperio delivered. Wireless locks are battery-operated and emit much less CO2 than wired magnetic locks. In fact, in carbon terms, Aperio locks emit 0.16 percent of the total emissions produced by standard wired locks. Flexibility is another Aperio asset: additional doors can be brought into the same integrated Gallagher system whenever needed. “We hope to roll out Aperio across all new and existing residential estate,” says Christine Beveridge, head of campus services at UEA.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access Management System The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff" In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Adaptable Access Solutions A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio® wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost-effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Improved Student Experience The Gallagher Command Centre integration allows for the access key and student ID to be combined in to one card, offering a number of benefits to both students and staff. The student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted" Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Monitoring Access Cards The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” Replacing keys with a combined access and student ID card has reduced our operational costs" Creating Business Value University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Enduring Partnerships “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved, and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.” “The University has worked with 2020 Vision Systems for some time on CCTV and access control systems, so when they won the tender to provide and install the Gallagher and Aperio® systems we had every confidence that they would be able to deliver. The completion of our new state of the art Chamberlain development was extremely close to the date of the first student occupation and so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.”
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety at more than 100 schools, Fulton has installed a full Avigilon security solution that includes Avigilon cameras with self-learning video analytics, Avigilon network video recorders, and Avigilon Control Center™ (ACC) video management software with Avigilon Appearance Search™ technology. Fulton is also deploying Avigilon Access Control Manager to secure physical access points, providing an integrated security solution for the district. Simplifying Recording And Capturing Of Footage Fulton sought to replace analogue cameras with an end-to-end high definition security system camera system in order to maximise protectionFulton sought to replace analog cameras with an end-to-end high definition security system camera system in order to maximize protection, enable proactive event response, and facilitate the recording, capturing and sharing of clear footage with its school board, police and the concerned public. Securing more than 100 buildings is no easy feat, but it’s of utmost importance to the Department of Safety and Security at Fulton, which also includes the School Police and Student Health Services and Emergency. Upgrading Video Security System With recent data showing above average student incident rates and student disciplinary concerns at some schools, upgrades to the security system were needed to allow better local and remote monitoring in important areas. “One of the biggest security challenges we face is our ability to reliably monitor important areas throughout our schools, especially during an emergency. With Avigilon, we not only benefit from exceptional image quality, but their advanced video analytics, like Avigilon Appearance Search technology, save us valuable time and effort, ultimately making our schools a safer place.” - Paul Hildreth, Emergency Operations, Safety and Security, Fulton County School System. Appearance Search Technology Avigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schoolsAvigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schools. ACC 6 video management software with Avigilon Appearance Search technology is a particularly exciting new development for the district. “We chose Avigilon because of the capabilities it offers in its advanced video analytics search technologies, including Avigilon Appearance Search,” said Paul Hildreth, Emergency Operations, Safety and Security for Fulton. “Their analytics are easy to set up and use, and can save us valuable time and effort, ultimately making our schools a safer place for generations to come.” Video Data Analysis Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence search engine to sort through hours of footage with ease. This technology allows Fulton’s operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently. This can save Fulton time and effort during critical investigations as Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route and identify previous and last-known locations. Avigilon self-learning video analytics enable proactive, real-time event response. Built from the ground up to manage high-definition video, Avigilon offers self-learning analytics on camera resolutions of up to 5K (16 MP). Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area Avigilon H4 Platform Avigilon H4 bullet and dome cameras from the new H4 platform were installed, offering self-learning video analytics, greater resolution performance and Wide Dynamic Range support. Avigilon H4 cameras are available in 1 to 5 MP and 4K Ultra HD (8 MP) resolutions. Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area. Upgrading the district’s security solutions began three years ago with a single high school as a pilot program. The success of this replacement led the district to integrate ACC in other school projects and, in 2014, Fulton opened new administrative centers with both Avigilon access control and video security solutions. At the start of 2017, Fulton began implementing a three-year approach to completing the upgrade. Image Quality And Resolution Before switching to the Avigilon solution, the district was challenged with low system reliability, which resulted in not having video evidence when needed. Furthermore, in situations where there was recorded footage, it was not of high enough quality to provide value. With the installation of Avigilon video security, Fulton has benefited from exceptional image quality and resolution across wide areas in all lighting conditions. The ongoing Avigilon implementation will provide the district with crucial and powerful insights that can help save time and effort during critical investigations. With the help of Avigilon trusted security solutions, the future looks bright for Fulton County Schools.
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organizations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white shark. It is therefore no surprise that the Monterey Bay Aquarium desired the most innovative and state-of-the-art cameras as a key component for its security system, and Arecont Vision was able to deliver what they required. Until recently, the Monterey Bay Aquarium relied upon up to 60 analog cameras for its video security needs Constant Surveillance And Monitoring The aquarium has a huge campus, with multiple separate properties and an average annual visitation of two million people. Until recently, the Monterey Bay Aquarium relied upon up to 60 analog cameras for its video security needs. With such a large area to cover and with so many people to monitor, this type of system proved increasingly unreliable and insufficient to its growing security needs. The aquarium’s security staff also found it a major inconvenience that accessories and other parts for the system were exclusive to the original provider, limiting the security team’s options both technically and financially. The footage from the analog cameras was monitored on monochrome screens and useful viewing of surveillance video was quite difficult at times. The quality of the images was low, and the inflexible nature of the cameras resulted in a number of blind spots throughout the aquarium’s large campus. Difficult Lighting Conditons The aquarium also has some very challenging lighting situations, requiring more specialized, versatile cameras in order to properly capture images. “We have some very difficult light levels here. The reflections of the water tanks can make certain areas lighter on camera than they are in person, or vice-versa,” stated Thomas Uretsky, Director of Security and Emergency Management for the facility. The security team reached the point where they knew they needed to upgrade. “The system needed more flexibility, multiple views on one camera, the works,” Mr. Uretsky said. “Blind spots needed to be eliminated, and we wanted as close to a 360-degree view as possible.” After thorough research, San Jose, California-based security integrator NSI Systems recommended Arecont Vision for the camera solution. The aquarium has a huge campus, with an average annual visitation of two million people Arecont Vision Surveillance Expertise Mr. Uretsky and the team at Monterey Bay Aquarium collaborated with Arecont Vision regarding what they were looking for, where coverage was needed, and how to best fit in into their budget. Monterey Bay Aquarium chose ExacqVision as their video management system, another solid partner to help upgrade their prior surveillance system. A range of different Arecont Vision cameras were ultimately deployed to serve the aquarium’s varying needs. Arecont Vision MicroDome cameras were ideal for the ticketing area and customer lines. The series includes Wide Dynamic Range (WDR) models, which can achieve clear images across extreme lighting conditions, such as those found in some of the indoor spaces at the aquarium. MicroDome cameras have an extremely low profile and only a 4” diameter, making them ideal for discreet security surveillance. When asked for his thoughts about the MicroDome camera, Mr. Uretsky responded, “They are small and nearly invisible to anyone who doesn’t know what they’re looking for. The fact that they have such a small footprint makes them ideal for us in the ticketing and front entrance areas.” The Monterey Bay Aquarium now has the unique and flexible camera solution it required, utilising 360-degree video Another favorite at Monterey Bay Aquarium were Arecont Vision SurroundVideo Omni G1 and G2 adjustable-view cameras. The SurroundVideo Omni series utilises a patented 360º track where each of its four-megapixel sensors can be moved to cover virtually any angle. Remote motorised focus simplified installation with the Omni G2. Combined with the ability to interchange lenses, the Monterey Bay Aquarium now has the unique and flexible camera solution it required. The customizable features of the camera also simplify future changes that may occur at the aquarium, saving time and money if construction or remodeling were to occur. “The SurroundVideo Omni cameras are some of our favourites because we are getting four cameras in one. They have the most flexibility,” said Kevin Wright, Monterey Bay Aquarium’s security manager. “Our blind spots are much more limited, and we don’t need to use nearly as many cameras as we previously had in those areas.” Although each camera offers four separate views, only a single PoE (Power over Ethernet) cable and a single software license is required for integration with the Exacq software, further reducing costs. Megapixel Camera Performance The system has performed incredibly well to date. Not only was it installed on time, but it was completed within budget. The Monterey Bay Aquarium monitors the system locally, 24-hours per day. The images are viewed on a dynamic video wall in the new Security Operations Centre. While most footage is viewed on-site, some cameras have been enabled with the Exacq software for remote monitoring at satellite offices. For example, holding areas for rescued sea otters can be viewed remotely by a research team. Some cameras have been enabled with the Exacq software for remote monitoring off-site Arecont Vision cameras have helped the aquarium’s security department in a variety of ways, one of which is increasingly common: addressing bicycle theft. Individuals will sometimes access a public recreational trail that runs along the aquarium’s main campus to steal unattended bikes parked by visitors or staff. Unlike the previous analog surveillance system, Arecont Vision’s megapixel cameras are able to provide the security department with good views and high-resolution images when reporting such incidents to the police department. The project at Monterey Bay Aquarium fulfilled a vast array of surveillance requirements — indoor and outdoor scenes, large and small spaces, low- to high-lighting conditions — and Arecont Vision cameras addressed each of the challenges. The deployment of the new cameras made an impression on Mr. Uretsky and his team. Making Potential Security Solutions Reality One installation inspired ideas for another, and Arecont Vision helped make these potential security solutions a reality as well. The continual partnership between the aquarium, the system integrator, and Arecont Vision has resulted in an ongoing collaboration between the three entities. “The reason we went with Arecont Vision was because it has a niche where a lot of manufacturers don’t, with its multi-view cameras,” Mr. Uretsky stated. Arecont Vision pioneered the first multi-sensor megapixel panoramic cameras in the surveillance industry in 2006, and has continued to enhance their capabilities, introducing adjustable-view Omni cameras in 2014. “These cameras have been fundamental as we systematically replace our old cameras with newer, megapixel versions. We are always improving and always adding cameras, so each time we’ve installed them we’ve been pleased.”
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organization that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal is to deliver global standards of excellence in technical education for all its students. Looking to provide a more secure environment and enhance education management, both inside its college campuses and within classrooms, DTE enlisted the help of Prama Hikvision India to evaluate their needs and recommend a practical solution. Enhancing Education Processes Working closely with the client, Hikvision undertook site surveys at 43 campuses across Gujarat and in respect of DTE’s management and system performance needs, proposed a cost-effective solution that would provide the required level of indoor and outdoor surveillance coverage. The considerations for the surveillance solution would also take-in DTE’s objective of enlisting the new system to play a role in enhancing the day-to-day education processes, where it could also be used to remotely monitor examinations, as well as being a time-saving facilities management tool for use across the large Western India state.The Hikvision control software fully supports smart search, playback, and smart detection Centralized Surveillance Monitoring Providing centralized remote surveillance and alarm monitoring, Hikvision proposed an IP-based solution that would use DTE’s existing secure virtual private network (VPN), which connects all education sites across Gujarat to a central point at the Directorate of Technical Education, in the capital city of Gandhinagar, Gujarat. At two control rooms, Hikvision iVMS-5200 Professional VMS software was installed to control and monitor the new surveillance system 24/7. Ideal for controlling any mix of surveillance system products, the iVMS-5200 Professional software fully supports all Hikvision products, including DVRs, NVRs, cameras and speed domes, as well as any mix of third party manufacturer products that conform to ONVIF standard. Allowing DTE’s security and management application needs to be addressed, regardless of its size and complexity, the Hikvision control software fully supports the installed Hikvision products’ smart features, including smart search, playback, and smart detection. Low-Light Surveillance Capability To provide affordable high-quality surveillance imaging across the 43 college campuses covered, Hikvision specified a mix of DS-2CD2620F-IS HD 2 Megapixel vari-focal IR network bullet, and DS-2CD2720F-IS HD 2 Megapixel outdoor network IR dome cameras. Both camera models provide 1920×1080 resolution, and true day and night (ICR) low-light capabilities, along with back-light compensation (BLC). Approximately 1,300 Hikvision cameras installed now provide comprehensive surveillance within the campuses lobbies, classrooms, laboratories, staff rooms, examination halls, auditoriums, storerooms, exit and entry doors, and open campus area access gates and car parks. Integrated Campus Security The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably"The Hikvision IP-based surveillance solution successfully illustrates just what can be achieved with large-scale integration,” explains Pinkal Shah, Asst. Manager - Technical Support, at Prama Hikvision India. “The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably, encompassing central video management, integration and failover mechanism." "Supporting all remote sites’ local storage and camera SD storage, the system uses Hikvision’s Center Video Record (CVR) mode using NAS to receive data streams directly from network cameras. With CVR mode, there is no need for an intermediate storage server, which not only increases storage efficiency and system stability, but also greatly reduces system hardware cost for the end-user.” DTE system operators can remotely check the status of facilities or presence/absence of support staff Remote Surveillance "The Hikvision video surveillance system utilizes a WAN/VPN to connect each of the separate locations in this massive multi-site project,” explains Mr. Dayashankar of Progility Technologies Pvt. Ltd., systems integration company responsible for the installation of the project. “The excellent Hikvision iVMS-5200 Professional VMS software enabled us to integrate the many existing third-party manufacturers cameras into the new system, as well as providing out of office hours remote alarm configuration and monitoring. We found the quality of the Hikvision networked camera images to be exceptional under every operating condition.” Viewed from the central monitoring stations, DTE system operators can now remotely check the status of facilities or presence/absence of support staff across Western India. In addition, on examination of the high definition play back, since the installation went live, incidents of petty theft have been recorded, and stolen belongings of students and facilities recovered.
An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other university assets. They sought a technology-based solution to reduce security risks across the campus, and specifically an access control system able to monitor multiple spaces and monitor all access points in real time. System software and hardware should make it fast and intuitive to generate or modify access rights for any campus user. A single solution needed to work across both common university facilities and separate areas with student accommodation. Monitoring Campus In Real Time With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when ASUCQ turned to SMARTair to protect its investment and site users. So far, around 600 SMARTair battery-powered online escutcheons have been installed across campus. High traffic flows through many campus doors required robust access control devices. With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when. Intuitive SMARTair software enables all day-to-day administration from a central control point. "SMARTair is a very secure access control system that is also very intuitive for user and access management,” says Jose Alfonso Suarez Torres, Operations Chief at ASUCQ. Future plans for ASUCQ envision a ‘university city’ with up to 20,000 students — all protected in real time with SMARTair access control. And because a SMARTair system is wireless, expanding and upgrading access control will never disrupt the daily work or campus life at this fast-growing university. SMARTair Mobile Solution Openow A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app The new SMARTair mobile solution, Openow also gives facility managers the option to send, revoke and amend the validity of users’ keys, wherever they (or the keyholder) may be — with no need for physical credentials like keys or smart-cards. Students and staff save time, with no access cards to collect or validate. Each user installs and validates their Openow app and collects keys virtually. Tap a SMARTair escutcheon with your phone... and the door unlocks, if you are authorized to enter. Administrators save time and resource at the end of a student or staff member’s time on campus. A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app. A simple, secure, modern solution to university access control.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?