Healthcare security applications
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorized access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could...
A total overhaul of care and safeguarding measures at Southern Health NHS Foundation Trust’s mental healthcare facilities was required following historic failures, including preventable deaths in 2012 and 2013. A root-and-branch reform program was put in place to improve care, ensure transparency and cut risks. A comprehensive video surveillance solution was sought to underpin these efforts. The first phase project required complete video capture and recording at the Ravenswood House faci...
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centers, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wire...
It was over a century ago that Charlotte Hungerford Hospital (CHH) was founded, as a gift by industrialist Uri T. Hungerford. The vision was to create a community hospital that would serve as a beacon of hope and a place of comfort for the sick and injured. 100 years later, that same community spirit has helped CHH evolve into a vibrant, independent, affordable healthcare network that delivers a comprehensive range of healthcare programs and services for over 100,000 lives in Northwestern...
Since 1967, Southside Medical Center has been providing affordable healthcare and related services to the insured, underinsured, and uninsured in downtown Atlanta. As one of the oldest and largest community health centres in Georgia, Southside Medical Center has continued to advance healthcare in the area by becoming the first Federally Qualified Health Center (FQHC) of Excellence to offer additional services beyond primary care. “We are in a new era and are moving forward with plans to ha...
Hospitals, medical centers, university training centers, clinics and other healthcare institutions are exposed to legal liability, ethical concerns, and subject to litigation and lawsuits, as well as changing regulation worldwide. Facilities have drugs and medical equipment onsite, making them a tempting target for crime. Healthcare Industry Challenges At the same time, aging populations in developed nations will drive increased demand for patient treatment. Rising populations and econom...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
Workforce management systems gather and analyze information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimizes operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customizable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organizations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimized to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyze current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyze current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalize resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customizable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecutions, they may look at newer HD or IP-based video systems. Upgrading to a hybrid DVR system Applications include perimeter monitoring, public parking, city transportation, square/town safetyTo stretch a tight budget, a migration plan to an IP-based camera system could be phased in over time by centering the upgrade on a new hybrid DVR system. This way, both existing analog and newer IP-based cameras can be hooked into the system. For example, Hikvision’s Smart City Solutions include systems for government services, transportation and traffic management, or any combinations of these. Applications include perimeter monitoring, public parking, city transportation, square/town safety and temporary surveillance. Data capture form to appear here! Heart of City strategy Dahua Technology, a video-centric smart IoT solution and service provider, has introduced its ‘Heart of City (HOC)’ strategy, which is in line with the top-level design experience from hundreds of city projects. The strategy is based on the maturity of five technologies – artificial intelligence (AI), big data, cloud computing, IoT and 5G. The combination will enable the evolution of smart city 3.0 and bring great changes to our life, according to Dahua. A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using Dahua's cameras, monitors and switching equipment A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Future-proof radio network design Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Wearables for city surveillance Wearables are another new aspect of city surveillance system. For example, FLIR Systems, Inc. has announced FLIR TruWITNESS, a wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. TruWITNESS is worn on an individual’s body or mounted inside vehicles and is designed for any public safety organization that requires on-scene, real-time mobile surveillance TruWITNESS is designed for any public safety organization that requires on-scene, real-time mobile surveillance. Worn on an individual’s body or mounted inside vehicles, TruWITNESS includes visible-video, audio, global navigation satellite system (GNSS), gyroscope, accelerometer and magnetometer sensors. These sensors combine to send alerts and stream data to a central command center in real-time to ensure full situational awareness and global event handling. Featuring FLIR Neighbor Aware inter-device connectivity, TruWITNESS acts as an IoT device, triggering nearby TruWITNESS devices, fixed and motorized Pan-Tilt-Zoom (PTZ) security cameras, and other connected sensors to act upon an alarm event. TruWITNESS becomes a key component of FLIR Systems’ Video Management System, United VMS, which command centers use to manage video surveillance. United VMS combines video, audio, and other related data and makes it available for real-time situation management and forensic purposes. Video analytics for crowd monitoring Crowd monitoring video analytics solutions monitor vast areas instantly alerting police of any overcrowding areasCrowd monitoring video analytics solutions continuously monitor vast areas instantly alerting police of any overcrowding areas. Qognify’s crowd monitoring video analytics solution was successfully used during the Maratha Morcha in the city of Kolhapur, India, on October 15th, 2016. The system monitored approximately one million protestors through 165 cameras installed across city. Smart threshold alerts were streamed directly into the control room while the crowd was building up, so that action could be taken before the crowd density reached dangerous levels, alleviating crowd safety and stability. At the core of the solution is Situator, Qognify’s advanced PSIM/Situation Management solution, which manages a myriad of security systems and sensors, including Qognify’s video management solution, from a newly built state-of-the-art Command and Control Center. Security operators and officials have advanced situational awareness of what is happening in their city and where. Automated, pre-defined Standard Operating Procedures (SOPs) were designed, in the local language Marathi, for handling routine security incidents as well as disaster management, ensuring that the most effective response is initiated, and procedures are executed in a consistent manner. Maintaining law, order and safety Qognify also implemented its Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai, India. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. Qognify’s Video Management Solution controls hundreds of surveillance camerasAs a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing them to maximize Qognify’s Safe City solution. The Qognify Situator is an advanced Situation Management platform, and Qognify’s Video Management Solution controls the hundreds of surveillance cameras throughout the city. Role of standards in smart cities “Standards can assist in successfully deploying a comprehensive [safe cities] system with multiple technologies into a single, cohesive entity,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “With the ability to integrate various sensors and data from many different devices synthesized through one interface, government officials and law enforcement are afforded a more complete picture of their city’s security.” Deployment of facial recognition technology Live video streaming within the smart and safe city’s infrastructure means video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. Facial recognition technology can be added on to any video surveillance camera that is recording at a high quality This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police.
The Savelberg nursing home has implemented smart domotics to provide elderly people affected by dementia with a wider range of movement. Depending on individual abilities, residents can move freely within three living zones. Savelberg has chosen the Conview Care solution from Leertouwer, which uses MOBOTIX cameras. Integrating Residential And Care Services Savelberg in Gouda is part of Zorgpartners Midden-Holland. Zorgpartners is a full-service organization offering diverse residential and care options for elderly people in the Central Holland region. A lot of attention is paid to integrating independent living and care provision. Conview Care is a complete care solution for organizations that wish to improve their processes with the help of technology One of the fifteen centers, Savelberg is managed by Irene Feenstra, who said: “We have been investing for years in care for elderly people affected by dementia in order to increase their quality of life. In late 2014, prior to commencing the planned renovation of two sections that house elderly people affected by dementia, we started looking for a new call-for-assistance system. "Zorgpartners Midden-Holland have been using the IQ Messenger communication platform for some time, which is one of the reasons why, after comparing several solutions, we decided on Conview Care from Leertouwer.” Conview Care is a complete care solution for organizations that wish to improve their processes with the help of technology. It stands out in the market due to its open integrability, vendor-neutral technology, and ease of management. Video And Audio Care Solution As soon as a resident ventures outside their allowed living zone, the care givers are notified through a message on their smartphone" "Here at Savelberg, the care solution includes video surveillance, sound and motion detection, and electronic wristbands", says Jasper Coppes, Care & Technology specialist at Leertouwer. "This combination automatically informs the staff if one of the residents exits the approved living zone. "High resolution Q25 MOBOTIX cameras function as smart video and audio sensors. In addition, an infrared ring developed by Gold-IP is provided thus allowing for night-time surveillance. This naturally happens with the consent of the customers or their direct family, and without saving any images." "Each residence is equipped with a smart sensor with camera which automatically sends a message once a resident gets out of bed," says Feenstra. "If the person returns to bed after going to the toilet, there is no problem and nobody needs to go and check on them. If said resident needs help, the care giver in charge notices immediately enabling them to react adequately." 24/7 Wander Detection Using the Conview Care solution, Leertouwer has created three living zones for Savelberg, allowing for 24/7 wander detection. The innermost zone consists of the floor where elderly people affected by dementia live. Within this zone, they can move with a greater feeling of freedom, as the previous boundary using air-lock doors has been removed from near the elevator. The second living zone consists of the entire building with nine floors and all shared areas, while the third zone has an additional open terrace and garden. "Since we removed all physical boundaries our dementia patients have visibly thrived," says Feenstra. "As soon as a resident ventures outside their allowed living zone, the care givers in charge are notified through a message on their smartphone. If a resident leaves the outermost zone and thus our premises, we can immediately bring him or her back.” We plan to work with Leertouwer to equip all flats with Conview Care and smart MOBOTIX cameras over the coming years." New Domotics Give More Freedom Although Feenstra prepared a business case for the new solution in late 2014, the greater freedom for all residents and the staff are more important than financial savings. "Our employees no longer need to do unnecessary night-time rounds which may disturb the sleep of residents, but can nevertheless immediately intervene if there really is a problem. Moreover, they feel that the new domotics ensures a lighter and happier atmosphere in the ward, which helps them enjoy their work more. "Approximately 40 flats over two floors have currently been equipped with a MOBOTIX Q25 camera connected to Conview Care. Until now, they have been working flawlessly. Implementing them was easier than expected and our care givers are also remarkably enthusiastic about and happy with them. They perceive it as a new way of working which increases the well-being of our residents. "Given these positive experiences, we plan to work with Leertouwer to equip all flats with Conview Care and smart MOBOTIX cameras over the coming years."
The City International Hospital (CIH) is a new multi-specialty hospital located within the Binh Tan district in Ho Chi Minh City, Vietnam. Located in the International Hi-Tech Healthcare Park, CIH features the latest medical technology and imaging equipment. With a large volume of visitors anticipated at the hospital every day, the need for a best-in-breed surveillance solution was a high priority from the onset of the project. To fulfill this requirement, hospital administrators turned to Citek Corporation, a technology integrator located in Ho Chi Minh City. IP Surveillance With Arecont® Megapixel Cameras The need to secure CIH by maintaining the highest levels of situational awareness was a primary design objective for the new video surveillance system. To achieve this goal, Hoa Lam’s management team worked together with Citek’s technical personnel to design and install a superior video surveillance system. The decision to deploy an IP surveillance solution featuring Arecont Vision megapixel cameras was based on superior functionality and image quality, ease of use, and the ability to manage the system centrally or remotely. “We always rely on the quality of Arecont Vision® cameras”, says Mr. Thomas Tran, CEO of Citek Corporation. “Our experience with Arecont Vision® has made them our first choice for every large project because of their exceptional performance and image quality.” Situational Awareness Both Day And Night Citek became an Arecont Vision® installer in Vietnam in 2009, and installation of the video surveillance system was a smooth process by the experienced integrator. The video surveillance system at CIH is monitored on a local network, which includes a main server and two client systems. There are approximately two hundred Arecont Vision® cameras installed at the CIH facility to date There are approximately two hundred Arecont Vision® cameras installed at the facility to date, including approximately one hundred SurroundVideo® 360° AV8365DN 8 megapixel (MP) panoramics and 35 SurroundVideo® 180° AV8185DN 8 MP panoramic cameras. These high-performing cameras deliver exceptional situational awareness in both day and night lighting conditions. Additionally, there are approximately 60 Arecont Vision® MegaVideo® AV2115DN compact day/night megapixel cameras installed at key locations which are operational 24/7. “The quality of Arecont Vision® cameras more than satisfies our requirements for image quality,” said Mr. Lai Voon Hon, General Director of Hoa Lam-Shangri-La. “The system is working very well for us and Arecont Vision® is extremely responsive to our needs.” Substantial Savings, Superior Coverage The CIH management team carefully evaluated their long-term return on investment (ROI) comparing IP and analog surveillance system solutions. Since a smaller number of Arecont Vision® megapixel cameras provide superior area coverage to conventional cameras, substantial savings are derived. This includes reducing the number of cameras, cables, poles, and housings plus the requirement for less ongoing maintenance and fewer VMS licenses. Additional savings are derived from the reduction in manpower needed to watch video feeds and guard the facility. Beyond the financial benefits, CIH management recognises the intangible ROI achieved from maintaining high security, which makes the facility a safer place for patients, staff and visitors. “The International Hi-Tech Healthcare Park will be the first integrated healthcare development in Vietnam to provide a comprehensive healthcare environment employing high-tech medical equipment and a professional medical staff. Our new video surveillance system is an important element of that environment,” said Mr. Lai Voon Hon.
Hamilton Health Sciences, a March Networks customer since 2004, is the second largest healthcare organization in Ontario with seven hospitals and 11,000 employees serving 2.3 million residents in Hamilton and the surrounding area. Keeping patients, staff and visitors safe, and protecting the organization’s physical assets in so many locations is a demanding job, but a monitoring center with a video wall and March Networks DecodeStation VX software has been a game changer. State-of-the-art Monitoring Center For years, security officers in each hospital or clinic monitored video locally on desktop computers. Now, video is monitored centrally in a purpose-built facility with three, 60-inch overhead monitors, a smartboard and four workstations for conducting investigations. Housed in the brand new Ron Joyce Children’s Healthcare Center, the monitoring center operates 24/7 with video feeds from surveillance cameras in a dozen or more locations across the healthcare organization’s footprint. “Security staff in their individual locations still have access to local video, but the central monitoring facility serves as the security department’s nerve center and gives us an extra set of eyes that we didn’t have before,” said security manager Derek Bailey. “If there’s an issue with someone acting out or posing a threat to staff, the call goes to the central monitoring facility. They’ll dispatch officers on site and use live camera views to give them a heads-up about what to expect. If the person causing a disturbance leaves the scene prior to the arrival of security, we can track them throughout the facility with our March Networks system and relay that information to our officers.” "You can sit down in front of a March Networks system and pick it up very quickly. The graphical user interface is straightforward" Hybrid Capability NVRs Hamilton Health Sciences recently transitioned to March Networks Command Enterprise video management software, which ties together one Command Enterprise server, 30 previous generation and new 8000 Series Hybrid NVRs and approximately 500 cameras. “The hybrid capability of the March Networks NVRs is a big plus,” said Bailey, “because they allow us to use both analog and IP cameras. We’d like to upgrade to an all-IP system today, but budgets are tight in healthcare, so it’s important for us to be able to transition to IP over time.” Hamilton Health Sciences almost ended up with a different video surveillance system at the new Ron Joyce Children’s Healthcare Center when consulting engineers specified a competitor’s product, but Bailey and co-manager Darren Hayes were able to make a business case in favour of enterprise-wide uniformity with March Networks. “We’ve always liked the fact that the March Networks system is backward compatible and very user friendly,” said Bailey. “There isn’t a huge learning curve for someone who is new to the system or someone who isn’t particularly computer-savvy. You can sit down in front of a March Networks system and pick it up very quickly. The graphical user interface is straightforward. “I also like how we were able to migrate from the older Visual Intelligence video management system to Command Enterprise, with live monitoring, evidence manager and investigator functionality all accessible on one screen.” Customized User Management The March Networks Command software provides Bailey with extensive user management capabilities as well, allowing him to administer user credentials and audit what people are doing on the system. The system helps the organization manage the usual risks, including slip and falls, abandoned bags, threats to staff and thefts “We’re a big department with 80 security staff and other users at different levels throughout the organization, so it’s important for us to manage the number of cameras people are able to access. “For example, we have a volunteer association that runs all of our cafeterias,” said Bailey. “We give them access to certain cameras in their area for process monitoring. They can see how busy they are and adjust staffing levels if necessary. The system allows us to limit their access to live video only.” Hamilton Health Sciences relies primarily on existing third-party surveillance cameras, but uses March Networks PTZ cameras in its parking garages. The cameras are used to capture video in main lobbies, hallways, clinics, registration desks and Emergency Department waiting areas. Managing Risk, Accidents And Theft The system helps the healthcare organization manage the usual risks, including slip and falls, abandoned bags, threats to staff and thefts. For example, shortly after the installation of the new video surveillance system at the Ron Joyce Children’s Healthcare Center, a Nintendo gaming system disappeared. “We reviewed our recorded video and were able to see a member of the cleaning staff walking out with the item,” said Bailey. “We brought the employee in for questioning and told him we knew he did it. He denied it at first, but confessed when we showed him the video. He told us he took the gaming system to a pawn shop, so we persuaded him to buy it back and return it, then terminated his employment.” Hamilton Health Sciences relies on Stokoe Communications, a March Networks certified partner in Hamilton, for service and support. “We use them as our first-tier support for all of our cameras and NVRs,” said Bailey. “They’re very responsive and great to deal with. We also contact March Networks tech support from time to time. They’re a great bunch of people. I have nothing but great things to say about the level of service we get.”
Background When the security team at Palmetto Health Baptist, an acute care Medical Center in Columbia, S.C., invested in an upgrade to their surveillance cameras from black-and-white to color, they did so with the expectation that it would significantly improve the quality of video they were capturing. Unfortunately, this turned out to be the equivalent of putting new paint and tires on a car that really needs a new engine. In the hospital’s case, the new cameras only made it more evident that its entire signal transmission and recording infrastructure was obsolete and that, without replacement, the system was simply not capable of providing the quality of picture and recording required. Problems With three medical office buildings, three parking garages, an employee office building, plus the five buildings comprising the medical center complex itself, Bernard Bourne, security manager for the hospital, knew that more was needed to bring state-of-the-art security to this 21st century medical complex. “We are located in the downtown area, four blocks from the state capital,” Bourne says. “We have everything going on around our hospital. Our campus footprint stretches across several city blocks with city streets going in between our buildings.” “When we started out, we were using old VHS tapes and were recording at three locations,” adds Bourne. “We weren’t doing a good job of capturing anything, because the way the video was multiplexed and then recorded to tape, we were losing too much detail. There was very little, if anything, that was acceptable for use in prosecuting cases in court.” For example, in one specific instance, a female employee of the hospital had her purse snatched and was then dragged up a flight of stairs – all on supposedly “protected” hospital property. However, when video was reviewed that should have captured the event on tape, the only preserved image was that of the employee by herself on the stairs. There was nothing recorded that could help identify the perpetrator. This incident made it eminently clear that it was time for a better system. “The solution was to invest in a top-of-the-line system,” Bourne says. “We went out for bids and looked at quite a few equipment brands. Everything we wanted, Vicon was either able to do or would be able to do with their next software release. We made a decision and went with the ViconNet digital video management platform.” Putting Things In Place When it came to the installation, Bourne found the process to be fairly simple – so much so that he did it himself! “Most of the equipment was installed by me with the help of one other person at the hospital,” Bourne says. “We had a contractor run some additional video line and AC power lines, but since we already had existing CCTV systems running, we just disconnected the old monitoring and recording equipment and were able to hook up the new system, set it up and put it on the network. It was user-friendly enough to do that. I needed very little help from the distributor or Vicon. It was like hooking up a DVD player at home.” "We made a decision and went with the ViconNet digital video management platform" The hospital started out monitoring roughly 130-135 cameras, most of which they shifted over from their previous system. In some locations, Bourne changed out the existing camera to put in pan-tilt-zoom. “We took the Kollector 240,” Bourne says. “All those systems have 900 gigabyte hard drive capacity. We had 16 of those. We also took two additional Kollectors and added RAID units for extra storage.” The hospital uses the extra storage to maintain a disaster recovery site, he explains. “We record in five individual locations. We have also connected the systems to the hospital computer network. The disaster recovery is located offsite. It records every camera on the network 24/7 as a backup. You could literally set one of the recording locations on fire, and still have the information up to the point that the network was disconnected to see what happened at the backup location.” Setting up this system required the cooperation of the IT department. “We weren’t on the network before,” he says. “Vicon did a good job of showing IT the bandwidth we’d be using. IT didn’t have any problems with it. Whenever I was setting up an area, I told IT what connections I needed, they gave us the IP addresses for them and we went up and started working.” Bourne says he took about three months to get everything changed over. He would change out one recording location and let it run for several weeks before moving to the next location. “And that was with me doing my regular job as well,” he adds. Difference Between Night And Day Since the initial installation was completed at the beginning of 2004, Bourne has noticed big benefits to the new Vicon system. “We’ve had a lot of usable video for prosecution,” he says. “Just the other day there was a bank robbery down the street. The police weren’t sure which direction the suspect went. Our outside cameras were able to help. We also have a guy in jail right now awaiting trial, accused of stealing a large amount of computers from us. We have excellent video on that too.” Beyond the evidentiary value, Bourne is pleased with the system’s ability to view from multiple locations with any combination of cameras. “The technology is state-of-the-art,” he says. “It’s like night and day. We can do everything we always wanted to do. We have map overlays where we can put a map of the building up, click on a camera icon and it automatically brings up cameras for that area.” "Vicon did a good job of showing IT the bandwidth we’d be using. IT didn’t have any problems with it" And perhaps most importantly, Bourne says, the hospital employees feel safer with the system. “It provides peace of mind for our employees. It’s an extra sense of security because they know now that we are watching. It gives them an extra eye in the sky.” Results Bourne is pleased to work with Vicon. When he had some ideas for a software change to one of the products, the manufacturer asked him if he would test the product. As a result, the hospital now acts as a beta site for Vicon. This has led to the hospital’s adoption of some new technology that has been released since their initial installation. “We have beta tested IP cameras, servers and domes,” Bourne says. The hospital is in the process of purchasing a new building in the fall. Bourne has already ordered the Vicon equipment for that building, including the IP equipment he has beta tested at the main hospital. “We are adding the IP equipment,” he says. If the testing phase continues to go as well as it currently has, “the IP server will be a tremendous benefit for us. If I have a problem arise, I will be able to take cameras to an area, plug them into the IP Server and the server into the network, and boom - we have video coming from that area. No more massive amounts of cable to pull.” Bourne also has plans for expansion on the main system. “We have two out of the three parking garages fully operational with cameras,” he says. “The third garage has one floor completely installed. The five upper floors have limited camera coverage and need to be fully installed. There is also a warehouse about a mile away that will be hooked into the Vicon system.” “The greatest benefit to me,” adds Bourne, “is that I can take my laptop and connect to the internet anywhere outside the hospital, access our VPN and can view cameras, control cameras or make administrative changes to the camera systems layout or functionality."
Virtua called on the services of CM3 Building Solutions of Fort Washington, Pennsylvania to design and install their new system, as well as local manufacturer’s representative, ASR Enterprises, Inc. to assist with equipment selection. After choosing ExacqVision NVRs, Virtua’s management team met with various megapixel camera suppliers to review their product lines and to see demos. After extensive testing and analysis, Arecont Vision megapixel cameras were selected for Virtua’s new system as a result of their superior resolution, processing power, product selection and use of H.264 compression technology. New Arecont Vision megapixel cameras added to the security systems throughout Virtua’s facilities are connected to ExacqVision’s hybrid network video recorders (NVRs). The system design allows for the seamless transition to a networked platform over time, eliminating the need to immediately replace all existing analog cameras. The hybrid recording solution also enables Virtua to immediately capitalize on the performance and cost efficiencies of Arecont Vision megapixel cameras in locations where they are most needed, with the ability to easily integrate additional megapixel cameras overtime. To preserve the integrity of security operations, new Arecont Vision megapixel cameras and ExacqVision NVRs are installed on a dedicated network connected by an NVR server with dual network interface controller (NIC) cards. This method isolates video bandwidth from the hospital’s data network until video needs to be viewed via a remote client. The NVRs are installed locally with varying storage requirements based on current camera counts and anticipated future expansion. Virtua’s smaller facilities have 2 Terabytes of storage, while hospitals and larger facilities have storage capacities ranging from 8 to 40 Terabytes. Surveillance and access control systems for Virtua’s hospitals, long-term care facilities, health and fitness centers, and corporate business services facilities are monitored centrally at the company’s Incident Command Center (ICC) located in Camden, New Jersey. The ICC is the location that also dispatches security personnel to all facilities. The megapixel cameras used throughout the Virtua system include Arecont Vision models AV8185, AV3155DN-1HK, AV2155 and AV3105. Arecont Vision’s SurroundVideo® AV8185 is an 8 megapixel, 180-degree panoramic H.264 IP camera that incorporates four 2-megapixel CMOS image sensors to provide 6400x1200-pixel panoramic images at 5.5 frames-per-second (fps). Th e panoramic view can also be set at lower resolutions to provide faster frame rates, such as 1600x1200-pixel images at 22 fps or 800x600-pixel images at 88 fps. Low-light sensitivity is 0.2 lux at F2.0. The 180-degree panoramic camera can substitute up to 24 analog cameras. Features include image cropping and up to four regions of interest for forensic examination and digital PTZ. The megapixel cameras used throughout the Virtua system include Arecont Vision models AV8185, AV3155DN-1HK, AV2155 and AV3105 Virtua also uses 2 and 3 megapixel Mega- Dome® IP cameras from Arecont Vision. Model AV3155DN-1HK is a 3 megapixel H.264 network (IP) MegaDome integrated camera, lens and IP66-rated dome providing 2048x1536-pixel images at 15 fps and 0.2 lux light sensitivity at F1.4. Features of the all-in-one camera include a 1/2” CMOS sensor and Arecont Vision’s Mega-Video® image processing at 80 billion operations per second. The camera employs H.264 (MPEG 4, Part 10) compression to minimize bandwidth and storage requirements while maintaining real-time image resolution. Capabilities include motion detection, image cropping, region-of-interest viewing and the ability to zoom into an image after it is archived (forensic zooming). Virtua uses the day/night (DN) model featuring a motorized IR cut filter which is removed in low light conditions to provide increased sensitivity. The 2 megapixel Arecont Vision AV2155 MegaDome® has similar features and provides 1600x1200-pixel images at 24 fps, with low-light sensitivity of 0.1 lux at F1.4. Both domes feature a camera gimbal with 360-degree pan and 90-degree tilt adjustments for easy installation. Also used at various Virtua sites is the Arecont Vision’s AV3105 3 megapixel box camera, which has specifications similar to the Arecont Vision AV3155 dome. Megapixel Benefit The image quality and digital PTZ capabilities of Arecont Vision megapixel cameras far exceed analog and conventional IP cameras allowing Virtua to capture and record extremely detailed video images over large coverage areas. Combined with recent cost reductions in NVR storage and network switches, the use of fewer cameras allows Virtua to transition to high-quality video with the highest levels of cost-efficiency, which translates into lower total cost of ownership and overall higher ROI. Arecont Vision’s megapixel cameras also allow for significant upgrades in system functionality compared to standard-resolution IP cameras. In addition to lower bandwidth and storage requirements, megapixel cameras dramatically decrease costs related to other elements of a system, including fewer software licenses, fewer lenses and a decrease in man-hours needed to install and operate systems. Additionally, Arecont Vision megapixel cameras’ ability to provide highly accurate digital PTZ functionality translates into fewer moving parts than traditional PTZ systems, which reduces maintenance costs and the potential for failure. “Due to the exceptional resolution provided by Arecont Vision’s megapixel cameras, and the deployment of several AV8185 panoramic cameras, we have easily expanded our coverage capabilities using fewer cameras with outstanding results,” said Paul M. Sarnese, System Safety Director, Virtua Health. “The performance of our new surveillance systems has helped us to improve overall security. It has been a win-win situation for Virtua.” The Arecont Vision system proves its value on a daily basis monitoring more than 4 million square feet of coverage area. After a recent incident at one facility, Virtua’s ICC staff reviewed crystal clear megapixel images within minutes and quickly distributed them to security managers and personnel throughout the enterprise for immediate action.
Security surveillance specialist AD Network Video is introducing its enhanced integrated HD IP video solution for hospitals. Virtual NVR delivers high definition IP video images for evidential purposes which directly tackle theft and anti-social behavior in a completely secure way. The Virtual NVR aims to offer hospitals secure environments, a culture of safety for patients, visitors and staff. The new solution offers video of high quality that can be used for whatever action is appropriate, including legal action if necessary. The Virtual NVR solution intelligently distributes video storage across single or multiple locations, with IP cameras recording and storing images on the in-camera server. These will carry on recording even in the event of a network outage as the devices operate as if they were standalone systems resulting in no single point of failure. The evidential recordings are easily accessible locally or from the control room via a single user interface and are exported in compliance with police and home office guidelines. Recordings can be archived and managed from a central location driving greater efficiency and flexibility in locating and retrieving video from multiple sites. Virtual NVR's secure and segregated network enables hospital operators to implement the HD IP camera solution and integrate event triggers. Virtual NVR has flexible and scalable qualities, from general practices to large hospital trusts. AD Group, of which AD Network Video is the solutions arm, has developed security surveillance solutions for more than 30 years. Current solutions include FireVu for early fire detection, and for logistics losses, TransVu. Both can be used in healthcare environments
Round table discussion
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
People are an essential component of any physical security system. Automation hasn’t taken over completely yet! But how has innovation changed the skillsets security operators need to operate systems effectively? The two elements – technology and manpower – must operate seamlessly and hand-in-glove to ensure that modern systems live up to their full potential. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?