Government & public services security applications
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras T...
A 300-plus camera city center video surveillance scheme in Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The previous analog-based CCTV system was more than 20 years old and had become expensive to maintain, so City of Lincoln Council decided to replace the analog cameras and transmission equipment with HD digital equipment. The total cost of ownership has been reduced by the savings made on legacy fiber lease costs, as well a...
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the program, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardization across sites, shorter implementation times and...
MOBOTIX has announced a raised focus on cyber security by implementing the “MOBOTIX Cactus Concept.” The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. Multimedia Cybersecurity Campaign The objective of the Cactus Concept is to implement a multimedia cyber security campaign in...
With a history dating back to the 1850s, the Sioux City Public Museum has evolved from its original focus on natural science to a broader emphasis on preserving the area’s heritage, offering a variety of educational programmes, events, and historical exhibitions valued at more than $2 million. Having outgrown its former location in a prominent Victorian-era mansion, the museum moved to a new downtown site in April 2011—a modern, open-concept building that has become known as one of t...
Since 1967, Southside Medical Center has been providing affordable healthcare and related services to the insured, underinsured, and uninsured in downtown Atlanta. As one of the oldest and largest community health centres in Georgia, Southside Medical Center has continued to advance healthcare in the area by becoming the first Federally Qualified Health Center (FQHC) of Excellence to offer additional services beyond primary care. “We are in a new era and are moving forward with plans to ha...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
Workforce management systems gather and analyze information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimizes operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customizable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organizations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimized to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyze current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyze current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalize resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customizable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecutions, they may look at newer HD or IP-based video systems. Upgrading to a hybrid DVR system Applications include perimeter monitoring, public parking, city transportation, square/town safetyTo stretch a tight budget, a migration plan to an IP-based camera system could be phased in over time by centering the upgrade on a new hybrid DVR system. This way, both existing analog and newer IP-based cameras can be hooked into the system. For example, Hikvision’s Smart City Solutions include systems for government services, transportation and traffic management, or any combinations of these. Applications include perimeter monitoring, public parking, city transportation, square/town safety and temporary surveillance. Data capture form to appear here! Heart of City strategy Dahua Technology, a video-centric smart IoT solution and service provider, has introduced its ‘Heart of City (HOC)’ strategy, which is in line with the top-level design experience from hundreds of city projects. The strategy is based on the maturity of five technologies – artificial intelligence (AI), big data, cloud computing, IoT and 5G. The combination will enable the evolution of smart city 3.0 and bring great changes to our life, according to Dahua. A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using Dahua's cameras, monitors and switching equipment A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Future-proof radio network design Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Wearables for city surveillance Wearables are another new aspect of city surveillance system. For example, FLIR Systems, Inc. has announced FLIR TruWITNESS, a wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. TruWITNESS is worn on an individual’s body or mounted inside vehicles and is designed for any public safety organization that requires on-scene, real-time mobile surveillance TruWITNESS is designed for any public safety organization that requires on-scene, real-time mobile surveillance. Worn on an individual’s body or mounted inside vehicles, TruWITNESS includes visible-video, audio, global navigation satellite system (GNSS), gyroscope, accelerometer and magnetometer sensors. These sensors combine to send alerts and stream data to a central command center in real-time to ensure full situational awareness and global event handling. Featuring FLIR Neighbor Aware inter-device connectivity, TruWITNESS acts as an IoT device, triggering nearby TruWITNESS devices, fixed and motorized Pan-Tilt-Zoom (PTZ) security cameras, and other connected sensors to act upon an alarm event. TruWITNESS becomes a key component of FLIR Systems’ Video Management System, United VMS, which command centers use to manage video surveillance. United VMS combines video, audio, and other related data and makes it available for real-time situation management and forensic purposes. Video analytics for crowd monitoring Crowd monitoring video analytics solutions monitor vast areas instantly alerting police of any overcrowding areasCrowd monitoring video analytics solutions continuously monitor vast areas instantly alerting police of any overcrowding areas. Qognify’s crowd monitoring video analytics solution was successfully used during the Maratha Morcha in the city of Kolhapur, India, on October 15th, 2016. The system monitored approximately one million protestors through 165 cameras installed across city. Smart threshold alerts were streamed directly into the control room while the crowd was building up, so that action could be taken before the crowd density reached dangerous levels, alleviating crowd safety and stability. At the core of the solution is Situator, Qognify’s advanced PSIM/Situation Management solution, which manages a myriad of security systems and sensors, including Qognify’s video management solution, from a newly built state-of-the-art Command and Control Center. Security operators and officials have advanced situational awareness of what is happening in their city and where. Automated, pre-defined Standard Operating Procedures (SOPs) were designed, in the local language Marathi, for handling routine security incidents as well as disaster management, ensuring that the most effective response is initiated, and procedures are executed in a consistent manner. Maintaining law, order and safety Qognify also implemented its Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai, India. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. Qognify’s Video Management Solution controls hundreds of surveillance camerasAs a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing them to maximize Qognify’s Safe City solution. The Qognify Situator is an advanced Situation Management platform, and Qognify’s Video Management Solution controls the hundreds of surveillance cameras throughout the city. Role of standards in smart cities “Standards can assist in successfully deploying a comprehensive [safe cities] system with multiple technologies into a single, cohesive entity,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “With the ability to integrate various sensors and data from many different devices synthesized through one interface, government officials and law enforcement are afforded a more complete picture of their city’s security.” Deployment of facial recognition technology Live video streaming within the smart and safe city’s infrastructure means video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. Facial recognition technology can be added on to any video surveillance camera that is recording at a high quality This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police.
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organization that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal is to deliver global standards of excellence in technical education for all its students. Looking to provide a more secure environment and enhance education management, both inside its college campuses and within classrooms, DTE enlisted the help of Prama Hikvision India to evaluate their needs and recommend a practical solution. Enhancing Education Processes Working closely with the client, Hikvision undertook site surveys at 43 campuses across Gujarat and in respect of DTE’s management and system performance needs, proposed a cost-effective solution that would provide the required level of indoor and outdoor surveillance coverage. The considerations for the surveillance solution would also take-in DTE’s objective of enlisting the new system to play a role in enhancing the day-to-day education processes, where it could also be used to remotely monitor examinations, as well as being a time-saving facilities management tool for use across the large Western India state.The Hikvision control software fully supports smart search, playback, and smart detection Centralized Surveillance Monitoring Providing centralized remote surveillance and alarm monitoring, Hikvision proposed an IP-based solution that would use DTE’s existing secure virtual private network (VPN), which connects all education sites across Gujarat to a central point at the Directorate of Technical Education, in the capital city of Gandhinagar, Gujarat. At two control rooms, Hikvision iVMS-5200 Professional VMS software was installed to control and monitor the new surveillance system 24/7. Ideal for controlling any mix of surveillance system products, the iVMS-5200 Professional software fully supports all Hikvision products, including DVRs, NVRs, cameras and speed domes, as well as any mix of third party manufacturer products that conform to ONVIF standard. Allowing DTE’s security and management application needs to be addressed, regardless of its size and complexity, the Hikvision control software fully supports the installed Hikvision products’ smart features, including smart search, playback, and smart detection. Low-Light Surveillance Capability To provide affordable high-quality surveillance imaging across the 43 college campuses covered, Hikvision specified a mix of DS-2CD2620F-IS HD 2 Megapixel vari-focal IR network bullet, and DS-2CD2720F-IS HD 2 Megapixel outdoor network IR dome cameras. Both camera models provide 1920×1080 resolution, and true day and night (ICR) low-light capabilities, along with back-light compensation (BLC). Approximately 1,300 Hikvision cameras installed now provide comprehensive surveillance within the campuses lobbies, classrooms, laboratories, staff rooms, examination halls, auditoriums, storerooms, exit and entry doors, and open campus area access gates and car parks. Integrated Campus Security The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably"The Hikvision IP-based surveillance solution successfully illustrates just what can be achieved with large-scale integration,” explains Pinkal Shah, Asst. Manager - Technical Support, at Prama Hikvision India. “The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably, encompassing central video management, integration and failover mechanism." "Supporting all remote sites’ local storage and camera SD storage, the system uses Hikvision’s Center Video Record (CVR) mode using NAS to receive data streams directly from network cameras. With CVR mode, there is no need for an intermediate storage server, which not only increases storage efficiency and system stability, but also greatly reduces system hardware cost for the end-user.” DTE system operators can remotely check the status of facilities or presence/absence of support staff Remote Surveillance "The Hikvision video surveillance system utilizes a WAN/VPN to connect each of the separate locations in this massive multi-site project,” explains Mr. Dayashankar of Progility Technologies Pvt. Ltd., systems integration company responsible for the installation of the project. “The excellent Hikvision iVMS-5200 Professional VMS software enabled us to integrate the many existing third-party manufacturers cameras into the new system, as well as providing out of office hours remote alarm configuration and monitoring. We found the quality of the Hikvision networked camera images to be exceptional under every operating condition.” Viewed from the central monitoring stations, DTE system operators can now remotely check the status of facilities or presence/absence of support staff across Western India. In addition, on examination of the high definition play back, since the installation went live, incidents of petty theft have been recorded, and stolen belongings of students and facilities recovered.
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small hub primary commercial service facility.” Airport Redevelopment Project The 1990’s brought a large redevelopment project to the airport, sparking more modern facilities, increased room for aircraft, and a range of new shops and restaurants. By 2012 it had become clear that the airport and its parking areas required enhanced surveillance. Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system. Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system The Manchester-Boston Regional Airport faced a lengthy decision-making process when it came to security camera manufacturers, requiring products able to support the unique applications and varied environment of the airport. The security team monitored a range of spaces both in and outdoors, and required products that excelled under all of these varying situations and lighting conditions. The selected cameras needed to provide full high-definition video across multiple open areas, while also delivering detailed, close-up images within busy, crowded spaces. The airport’s FAA grant included stipulations regarding the types of products that could be purchased with the supplied funds, specifying that the selected system must qualify under the “Buy American” standard. This provision meant that all potential selections not only meet the technical requirements, but also be Made in USA. Arecont Vision: Foundation For Security System After a year of exploring the market, the client determined that Arecont Vision was the only manufacturer that not only satisfied the “Buy American” stipulation, but did so without sacrificing the airport’s fundamental security requirements by providing a wide range of high resolution megapixel cameras.Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process. Securadyne Systems was selected as the systems integrator. Extensive planning determined which Arecont Vision products to install, where to do so, and how the installation process would be accomplished. Once Manchester-Boston Regional Airport chose Arecont Vision cameras as the foundation for their security system, they began to collaborate with On-Net Surveillance Systems, Inc. (OnSSI) to supply the video management system (VMS). OnSSI is an Arecont Vision Technology Partner Program member, with many joint customers around the world, demonstrating proven integration between the two company’s products and support services. Arecont Cameras Chosen By Airport Security Team The Arecont Vision SurroundVideo® multi-sensor camera series piqued the security team’s interest for its 180° panoramic capabilities. Passengers, staff, and aircraft crew move frequently and often swiftly from one location to another in varied lighting, yet all proved trackable with the SurroundVideo cameras and the OnSSI software. The placement of SurroundVideo cameras at the Manchester-Boston Regional Airport provides comprehensive coverage while reducing the number of cameras needed overall, a feat that was especially useful in large areas such as the airport’s apron. The security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features For locations that required a single coverage view, the security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features. Features such as low light capabilities and remote focus and zoom all proved crucial to the airport’s requirements. Casino Mode™ is available in the 1080p versions of the MegaDome series, a feature that proved to be as useful at the Manchester-Boston TSA checkpoints as it is in a Las Vegas casino. Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications, an incredibly effective tool when investigating security situations involving many complex, small movements for both live and forensic viewing.Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications for many complex, small movements in both live and forensic viewing Investigating Criminal Or Worker Concerns Manchester-Boston Regional Airport has installed over one hundred and fifty Arecont Vision cameras, and the video surveillance system is continuing to grow. The latest installation of Arecont Vision products included the lower level of a parking garage as well as a newly renovated passenger checkpoint area. When asked if there are any specific incidents in which Arecont Vision cameras proved useful, Mr. Mueller responded, “Every other day we use the cameras to investigate criminal or worker concerns. We go back and monitor them for possible safety issues on the ramps, for passenger interaction, and for worker interactions. Anytime someone expresses a concern to me, they can come in and we can watch the footage together. I try to make sure that the option to view footage is fairly transparent, which has proved very useful to everyone. "SurroundVideo 180° cameras were again utilized in the latter situation due to the client’s satisfaction with stitching together images from multiple 180°s." Paul Mueller, Manchester-Boston Regional Airport’s security manager, stated, “We were sure to go back to Arecont Vision during this process. We have had a good working relationship with them for the past five years, and they enable us to use less cameras while still maintaining full view of inspection areas.” Primary camera views are displayed and monitored all the time, while others can be pulled up and played back as issues arise Passport And Ticket Inspection Made Easy Arecont Vision cameras are monitored 24/7 in the airport’s communications center. Primary views are displayed and monitored all the time, while others can be pulled up and played back as issues arise. The system also allows for particular divisions within the Manchester-Boston Regional Airport to monitor cameras that are applicable to their work, such as in the parking garage. In terms of responsiveness, Arecont Vision makes it a top priority. “We had an issue recently with the lack of detail in some of the views for when people were having their passports and tickets inspected by TSA employees,” Paul stated, “An Arecont Vision rep came out and agreed that we could improve images, so he pulled the cameras and re-installed a newer firmware version which allowed for finer adjustments, completely and efficiently solving our problem.” Arecont Vision prides itself in its relationship with clients such as Manchester-Boston Regional Airport and to its continued design and manufacturing of quality, innovative, and industry-leading cameras within the United States for customers to use worldwide.
At SSW, CLIQ® is built on the foundations of world-class leading mechanical PROTEC2 locking solution Security expert Abloy UK has supplied South Staffs Water (SSW) with a bespoke PROTEC2 CLIQ® electromechanical security system for 91 of its operational sites. SSW supplies high quality drinking water to approximately 1.3m people and 35,000 commercial customers over 1,500 square km in the West Midlands, South Staffordshire, South Derbyshire, North Warwickshire and North Worcestershire areas. The SSW clean water sites include treatment works, reservoirs, pumping stations, boosters, and water towers. PROTEC2 CLIQ® Electromechanical Locking System The installation of the PROTEC2 CLIQ® system, which was completed by Lincoln Security, comprised of 600 Padlocks, 392 Cylinders, 200 User Keys and four Desktop Programmers. In addition, 10 Wall Programming Devices were strategically placed at offices and depots throughout the SSW geographical area to allow key holders to re validate when required. The locking systems are now fully operational, securing and maintaining the safety of equipment - such as pumps and telemetry units - operational apparatus, chemicals, and potable water within reservoirs. There is also scope for the system to be expanded to fulfill additional security and site access requirements, as they are needed. CLIQ®-powered Electronic Security Abloy’s PROTEC2 CLIQ® cylinder system was chosen because it is specially designed to provide the highest level of security for the most sensitive areas; it offers a patented disc controller structure that requires a moving element in the key. PROTEC2 CLIQ® also possesses key and key blank patent protection to prevent systems from becoming compromised through the unauthorized duplication of keys. The patent, which lasts until 2031, is one of the longest in the industry and covers the entire range. "We chose the Abloy PROTEC2 CLIQ® system because of the versatility and flexibility it offers" In a PROTEC2 CLIQ® locking system, different products can be keyed into the same master key system, meaning all products can be operated with just a single key, simplifying the locking system and key management. In addition, there are 1.97 billion different key combinations; providing the possibility to create extensive master key systems that fulfill the clients’ exact specifications. Versatility And Flexibility Kate Wilkes, Resilience and Security Manager at South Staffs Water, said: “We chose the Abloy PROTEC2 CLIQ® system because of the versatility and flexibility it offers – our employees can use just one key for every site they need to gain access to. Individuals that only need to access certain assets can have a particular level of key and other employees can have a higher level where required” Rob Bennett, Senior Market Development Manager at Abloy, added: “There are a number of specific requirements when securing water sites, and it can be difficult to maintain access to all areas without the risk of keys being lost and a system becoming compromised. “A web-managed, patent protected master-key system that combines electronic access control with the strength of Abloy’s mechanical locks is the ideal solution, as it reduces the number of keys carried by individual employees or contractors, offering a convenient and flexible high security provision.”
The municipality of Haarlemmermeer wanted to replace the existing access control system and bring city hall security up to modern standards. They looked for a system that could manage all municipal buildings centrally. For this reason, the system had to be easily expandable. The access control system also had to include camera supervision of employees' sign-in and sign-out process. Existing Access Control Infrastructure When implementing the new system, the municipality wanted to reuse existing infrastructure and to be flexible in terms of the types of card readers that could be connected; an unambiguous design was preferred. Furthermore, the system had to be able to be expanded to include burglary protection and parking control in the future. There was also the desire to scale down and improve management of the current key plan. Integrated Video Management The municipality uses access control and IP video on the AEOS platform. AEOS also takes future desires into account such as intrusion detection, lockers and filing cabinets, wireless online locks and key cabinets. All this functionality can be implemented at a later date using the same AEOS platform and the same controller by adding the desired software components - also new locations can be easily added. AEOS was implemented in November 2010 with reuse of the existing infrastructure. AEOS provides access control and IP video management in a single integrated system. In this manner, cameras can be operated from a single location and the foundation is laid for simple, efficient integration and expansion with other systems in the future.
The municipal council of Odense, Denmark’s third biggest city, uses Vanderbilt’s SPC Connect to help monitor and maintain public buildings such as schools, libraries, museums, gyms, housing, and government offices. Remote And Instant Access Due to the number of buildings under their authority, the municipality of Odense needed a security solution that would provide remote and instant access to deal with potential alarms from any location, at any time. For example, a janitor in charge of maintaining several buildings throughout the municipality, could not be in all places at once should an alarm trigger. Or, if an alarm triggered in the middle of the night, the team leader at a government office might have to leave their bed and drive into the workplace to investigate. SPC Connect is helping to solve this problem. Vanderbilt's SPC currently protects 36 buildings in the municipality of Odense. Therefore, upgrading to SPC Connect was a natural progression for the municipal council. SPC Connect SPC Connect is a cloud-based service that can be used by installers or end system users to access their SPC systems securely. The SPC panel and Connect communicate using FlexC. This is a powerful protocol and can be used to support multiple paths such as Ethernet, GRPS, and 3G. This ensures the system is always connected.SPC Connect is a cloud-based service that can be used by installers or end system users to access their SPC systems securely With SPC Connect, the municipality of Odense’s end users are benefiting greatly from the SPC Connect app. This can be downloaded free of charge from the Apple App Store or Google Play. The app provides them with an interface that contributes clearer arming and status information and allows for remotely carrying out tasks such as controlling doors, setting or unsetting an alarm, or isolating a zone. This instant and remote access to any potential alarms helps save a huge amount of time for those involved in maintaining the system. For example, say a janitor oversees maintenance for a dozen or so buildings, and an alarm is triggered in one of the buildings. If he happens to be working on the other side of the town and physically getting to the incident is logistically difficult, all he needs to do is take out his smartphone, access the SPC Connect app, view the event investigate further remotely. Simple as. Real-time Security Alerts The SPC Connect app allows you to receive real-time security alerts. You can then immediately investigate the issue and act if necessary. When an alarm is triggered, you will receive an email notification to your smartphone and then, with your IP cameras connected to SPC, you can check the live video feed on your smartphone to examine the alert further. It saves a lot of time and money, but it also brings comfort and peace of mind to the end user as well. All the user’s interactions through SPC Connect are secured with financial grade SSL security, giving peace of mind alongside powerful control.
Public safety and the protection of property initiatives led the city of Mankato, Minnesota to deploy a city-wide IP-based video surveillance system. Founded in 1852, the city is the seat of Blue Earth County. It encompasses 18.26 square miles of land and water, and supports a population of about 41,000 (2015 US census estimate). Home to a variety of natural landmarks and higher educational institutes, Mankato provides a dynamic lifestyle for its citizens all year round. Surveillance For Key Community Areas The new city surveillance system uses a range of Arecont Vision megapixel cameras to cover key areas of the community, with the largest concentration of cameras deployed in the popular downtown entertainment district. Surveillance is also in place throughout Mankato’s city hall, civic event center, shopping areas, parking ramps, public safety center, municipal water plant, public work center, regional airport, and for multiple public parks and community streets. The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project. The original system NVR supported primarily analog technology cameras, with a small percentage of early generation IP cameras supporting only JPEG video. The image quality of megapixel cameras could not be matched by this system, nor could it be cost effectively grown to address city requirements. In order to enjoy enhanced security, increased public safety, and the protection of property, a more modern and capable surveillance system was required. The city thus engaged security and communications integrator WW Communications to design and deploy such a project.The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project WW Communications WW Communications’ COO Mike Bales led the effort and selected Arecont Vision’s IP megapixel cameras as the core of the new project. With regards as to why Arecont Vision was selected for the project, Bales explained: “A variety of factors led to the use of Arecont Vision, not least of which was the commitment and quality they provide as an American-based manufacturer. They are one of the few vendors who design and build their cameras in the U.S., and their cameras’ features and reliability reflect that.” Delving further into what features specifically appealed to them, Bales concluded, “Simplified installation features such as remote focus, along with advanced features such as true WDR (wide dynamic range) were key factors in the decision. Additionally, the SurroundVideo camera series’ cost effectiveness and coverage capabilities placed Arecont Vision ahead of its competitors for the job.” SurroundVideo cameras were first designed and pioneered in the surveillance industry by Arecont Vision in 2006. Now in their fifth generation, they provide non-stop coverage with four individual megapixel sensors for superior situational awareness and image quality while reducing the total number of cameras required for surveillance projects. After deciding on a manufacturer, Milestone Systems was then brought on as the video management software for Mankato’s new surveillance system. Arecont Vision and Milestone are proven integration partners, having completed thousands of seamlessly-integrated city surveillance projects around the world. Arecont Vision And Milestone Systems Additionally, Milestone is a top-tier participant in the Arecont Vision Technology Partner Program and its VMS software is among those used in Arecont Vision’s MegaLab. “The close technology and support integration between Arecont Vision and Milestone helped ensure that a best-in-class surveillance system was delivered to the Mankato,” commented Bales. “The result is a single system for the city that is second to none in capabilities and can grow with the community’s needs.” The surveillance system has exceeded the expectations of the city to protect both people and property City Surveillance Project Phases Phase one of the project included deploying thirteen cameras to the newly-built public safety center. Phase two resulted in the deployment of thirty-seven cameras to the city’s entertainment district. The effectiveness of these cameras led to additional installations at city sites which greatly assisted in reducing common vandalisms and other public safety crimes. Phase three of the project involved the installation of twenty-three MegaDome 2 single sensor cameras onto the fourth floor of a brand-new, four-story parking facility in the downtown area. Surveillance of the structure was further enhanced through use of a SurroundVideo Omni — a unique omni-directional camera introduced to the industry by Arecont Vision in 2014. Unmatched Surveillance Capabilities The Omni camera series offers four megapixel sensors that are mounted on three-axis gimbals inside a low-profile dome enclosure. The sensors can be individualized to cover virtually any direction, providing unmatched surveillance capabilities with a single high-resolution camera that is fully integrated with the VMS. With the recent Public Works Center campus construction project, another three MicroDome G2 and five SurroundVideo Omni cameras were added to the city’s overall surveillance system. Five SurroundVideo Omni cameras and MicroDome G2 cameras were also installed along a pedestrian walkway that stretches from local hotels to the city’s civic center and entertainment district. The system is expected to continue growing in order to address public safety and property protection concerns as they arise. Security And City-Wide Situational Awareness After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime Depending upon the location and local requirement, the Mankato’s city surveillance system uses a range of Arecont Vision cameras. These include single sensor 2 – 5MP MegaDome 2 and MicroDome G2 cameras. 20MP SurroundVideo multi-sensor cameras provide 180° situational awareness coverage, while omni-directional SurroundVideo Omni G1 and G2 cameras cover an even wider range of deployments. The city surveillance system is managed and monitored from a command center with a multitude of large screens displayed across a wall. “The surveillance system and the screens are critically important during high-traffic events in the city,” said Mr. Bales. “With three colleges here in town, homecoming is a very busy time of the year. There are also numerous festivals that take place in the city combined with a very dynamic downtown. Our staff is able to view the activities as they happen, enhancing security and city-wide situational awareness.” Video Streaming To Cellphone Devices It is not just the security center that can monitor this system either — video can also be streamed to cellphone devices and can be monitored for official use all over the city. The system provides public monitoring as well. There are about half a dozen locations downtown with indoor walkways and skyways that are covered by Arecont Vision cameras with live video, providing the public with supplementary awareness and security. The surveillance system has exceeded the expectations of the city to protect both people and property. An example of the system’s usefulness was evident in a recent incident that made national news. After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision cameras were crucial in solving the crime. The city surveillance system caught the incident on camera, providing detailed video evidence which assisted law enforcement in proceeding accordingly. The cameras prompted the ideal outcome in an unfortunate situation, helping make the legal process more efficient and serving to greater deter the occurrence of future incidents. When probed on how the system has performed to date, Bales responded that Arecont Vision “exceeded the expectations.” Arecont Vision looks forward to continuing this legacy throughout its work with the City of Mankato.
Round table discussion
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
People are an essential component of any physical security system. Automation hasn’t taken over completely yet! But how has innovation changed the skillsets security operators need to operate systems effectively? The two elements – technology and manpower – must operate seamlessly and hand-in-glove to ensure that modern systems live up to their full potential. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?