Hotels, leisure & entertainment security applications
LILIN announced that Aida traffic management solution will be released and unveiled at ISC West 2020. With the success of LILIN Aida number plate recognition (ANPR), LILIN Aida adds AI traffic management to Aida product line. LILIN Aida can be installed on the edge for traffic analysis where the metadata gets sent to remote Navigator Control Center. LILIN Aida ANPR and traffic management can integrate with LILIN Navigator VMS products including Navigator Control Center, Navigator Corporate, an...
Recently, Planet Fitness, with the help of their preferred system integrator Adirondack Direct, incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security, but also improves operations. When leadership evaluated security at their 70-plus corporate run locations a few years ago, they chose to incorporate a video surveillance solution that would address security needs and would be advanced enough to help with management and operations. Each of...
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay....
Allianz Parque has become one of the most modern multi-purpose arenas in Latin America since it was built in 2014 by WTorre Properties. The stadium is located at the same place of the old Palestra Itália Stadium with a capacity of more than forty thousand spectators. The stadium not just meets FIFA standards but was also awarded various prizes including the Master Award in the 11th edition of the Grand Prize for Corporate Architecture, the Accessibility Seal, delivered by the Permanent A...
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and serv...
Since renovation began in the 1990s, the Custard Factory in central Birmingham has grown into an important center for the creative and digital industries, as well as a destination for leisure, retail and cultural activities. The 15-acre site, which in Victorian days was a pioneering center for food and ingredients production, has been transformed into a thriving working community for hundreds of small businesses, benefiting from several phases of development. The Custard Factory now comprises mu...
ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions. Following is a statement from show organizers: We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies and are working diligently to ensure ISC West 2020 and our other events live up to our high standards. While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors. Close Monitoring Over the last few weeks, Reed Exhibitions and our partners in ISC West have been closely monitoring the COVID-19 virus and its impact on members of the global security community. We are collaborating closely with the Sands Expo Center and local public health authorities and following local, state and federal public health guidelines, including those issued by the CDC. We have additional precautionary measures in place, including enhanced cleaning and sanitization across all public areas and customer touchpoints in the show and we are constantly reviewing our health protection activities, public health messaging, hygiene and medical control measures with the aim of strengthening our COVID-19 response further in line with up to date public health advice and guidance, including that of the CDC. Health and Safety We will continue to provide updates on our website as we get closer to ISC West. The health and safety of our team members and guests is our utmost priority. Our policies and best practices are in close collaboration with our venue partner, Sands Expo Center. The Sands Emergency Management Team works closely with local officials and are taking appropriate steps to protect team members and guests as outlined by the Centers for Disease Control and Prevention (CDC) and the Southern Nevada Health District (SNHD). Sands is prepared to follow any additional protocols or guidance, as they are made available by the CDC or SNHD.
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionized the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-Speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognized”. By February 2021, all cargo shipments leaving, entering or traveling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognized their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognized their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organizations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. SureCloud’s Penetration Testing services have been CHECK approved since 2009 Minimizing risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organizations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognized ISO/ IEC 27001 for achieving operational excellence, minimizing the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
ExtraHop, the leader in cloud-native network detection and response, announced its top predictions for the cybersecurity and technology industries in 2020. Informed by insight from customers, partners and industry analysts and insiders, ExtraHop leaders predict a year of tool consolidation, headline-grabbing breaches and a shifting industry focus on what makes a successful tech start-up. The Year of Deeper Scrutiny for Fast-Growth Companies: “2019 was a tough year for heavily hyped, fast-growth companies going public in Silicon Valley. Several companies that raised huge rounds ultimately failed to deliver expected results or even approach profitability after they went public, and Wall Street was not amused. In 2020, we expect the investment community to more deeply scrutinize companies' financials and business fundamentals, ultimately leading to the support of companies who deliver on their promises, are capital-efficient with sound vision and innovation, and have truly sustainable business results and models to back them up.” - Arif Kareem, CEO File hashing has been the default mechanism for detecting malicious threat activity" Antiquated Threat Detection Methods like File Hashing and Signature-Based IDS Waste Time: “Since the 1990s, file hashing has been the default mechanism for detecting malicious threat activity, despite the fact that it's ineffective against modern attacks that use polymorphic or fileless methods to go undetected. The same goes for signature-based IDS, which are extremely noisy while providing very little actual alert context. Security teams will continue to rely on these antiquated methods of detection because they are expected to, regardless of how well they work in today's threat landscape.” - Jesse Rothstein, CTO and co-founder Accountability for the Ethical Use of Users’ Data: “Recent headlines tell of giant data corporations like Google and Facebook monetizing users' data and lacking sufficient transparency in these activities. There’s already been significant social backlash, but in 2020 we predict that users will demand companies not just follow the often-dated laws, but that they also do what’s right. Regulations like GDPR and CCPA are helping to bring more clarity around what’s appropriate, but 2020 will be the year that the industry is held accountable for the ethical, in addition to regulatory-compliant, use of personal data.” - Raja Mukerji, CCO and co-founder A Slowing Economy Will Force Tool Consolidation: “In security programs, it's been very difficult to turn tools off. What gaps will I create? What unintended consequences will I see? As the economy has rolled along over the last decade, most security programs have had the necessary funding to add new tools and retain legacy tools under the guise of risk management. Economic slowdown is likely to change all of that, as investments in new technology will require cost savings elsewhere. A tighter economy will finally cause us to pull the plug on legacy security tools.” - Bill Ruckelshaus, CFO A tighter economy will finally cause us to pull the plug on legacy security tools""Observability" Will Gain Ground as Both a Concept and a Vocabulary Term in Security and DevOps: “Observability is a term that several companies are using to describe the practice of capturing metrics, logs and wire telemetry, or sometimes other data sources, mostly in the DevOps space. The value of correlating insights from these data sources has gained enough ground that vendors need a word for it. Observability, The SOC Visibility Triad, and other terms have been spotted in marketing materials and on big screens and main stages at security and analytics conferences. In 2020, we'll see heated competition to control the vocabulary and mental models that enterprises and vendors use to discuss and market security best practices regarding gathering multiple data sources and correlating insights between them.”- John Matthews, CIO A Major Information Leak from a Cloud Provider is Coming: “In 2020, we are likely to see a major information leak from a cloud provider. While at the same time the cloud providers are providing many useful built-in tools, it's not clear that they are using their own tools to secure themselves. As a further prediction, the leak will not effectively diminish migration to the cloud. As we have noticed with other breaches, they do not significantly erode confidence in the services.” - Jeff Costlow, CISO 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers" The Wave Begins Towards Security Tool Consolidation: “Organisations will take a strong look at the number of security vendors within their ecosystem in 2020 to determine overlap and begin a move towards consolidation of tools. The winners will include those that have proven their API superiority and ability to work together within an organisation’s ecosystem. The losers will be those who have not proven their ability to strengthen core security.” - Chris Lehman, SVP of Worldwide Sales A Vendor Will Be Responsible for a Major Breach of Data Due to Phoning Home: “In 2019, ExtraHop issued a security advisory about the vendor practice of phoning data home and how this is happening without the knowledge of customers. The problem with this practice is that it expands the attack surface via which that data can be breached, exposing it to threats within the vendor’s environment. 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers. Regulations like GDPR have imagined exactly this type of scenario and laid out specific requirements for data controllers and data processors. But when such a breach occurs, it will have broad impact and implications.” - Matt Cauthorn, VP Security The Big IoT Breach is Coming: “In 2017, major ransomware attacks crippled the networks, and operations, of major global organisations. While those attacks did billions in damage, for the most part, IoT devices were left unscathed. But sooner or later, and probably sooner, the big IoT breach is coming, and it could have global implications. Whether it happens in the US or abroad, in healthcare, shipping and logistics, or manufacturing, IoT devices around the globe are fertile hunting grounds for attackers. Taking down every connected device, from telemetry sensors to infusion pumps to mobile points-of-sale, could easily grind operations to a halt.” - Mike Campfield, VP of Global Security Programs
Traka, from ASSA ABLOY Global Solutions, has integrated with Maxxess’ award-winning security management software, eFusion, to present users with a powerful route to achieving operational efficiencies across a wide range of systems and functions. Complete site control Traka, in conjunction with Maxxess Systems, has developed a seamless integration with Maxxess’ eFusion open platform, to allow complete site control, centralize site visibility and present real-time monitoring, ensuring situational awareness for all assets, safely and securely. eFusion with Traka makes it simple for authorized staff to gain access to a wide range of controlled assets, from keys and premises to high value equipment, vehicles and machinery. The new integration enables full traceability and audit reports that can include video and audio recordings, as well as transactional data from systems such as access control, intruder, HR and fire. eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems" Integration with third party systems Martin Woodhouse, Traka Head of Asia Pacific, Middle East, India and Africa (APACMEA), “Maxxess is one of the foremost global innovators within the security industry, its eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems. Now together with Traka, we can deliver a significant futureproof technology that paves the way for users to benefit from one all-encompassing building control system.” “The power of this new integration brings together Traka’s intelligent key and equipment management systems with eFusion’s flexible cloud architecture, developing a solution that will deliver exciting advances in security and operational efficiency.” “It will not only benefit major new build projects, but also open new opportunities for existing users of eFusion and Traka. We look forward to building on this exciting partnership with Maxxess, which we jointly believe continues to deliver real benefits to our valued customers.” Audit capabilities across key cabinets and lockers As with all Traka solutions, the integration with Maxxess’ eFusion presents audit capabilities across its key cabinets and lockers, and enables instant traceability and reporting. Other important features include fault logging, curfews and multiple authorizations, which provide tangible returns on investment by improving operational efficiency, increasing productivity and minimizing costly down time. Integration with eFusion opens the way for more powerful joint opportunities" Lee Copland, Managing Director, Maxxess EMEA adds, “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with many third-party systems - this integration with eFusion opens the way for more powerful joint opportunities to be developed.” “There are huge benefits to be gained from integrating Traka’s capability with wider functions and operations, including building management systems, security, fire and the many application-specific systems used by our customers in different sectors.” To see Traka’s integration with Maxxess eFusion in action, one can visit Traka in hall 2, stand G20 at Intersec Dubai, taking place at Dubai’s International Convention and Exhibition Centre from 19 - 21 January 2020.
Steel fencing manufacturer Zaun Ltd has appointed Mat White from Highway Care Security Solutions. Zaun boasts a long-standing working relationship with White extending back over many years. For the past five years, he has been at Highway Care, initially as project manager on security and major highways contracts, and more recently as commercial manager and director for H2S2, a joint venture business between Highway Care and Hill & Smith business Hardstaff Barriers. White said, “I’m really excited to be joining the Zaun team and can’t wait to get my teeth stuck into my new role, while strengthening long term customer relationships and opening new doors to help create a sustainable future for the business. Zaun is picking up momentum thanks to the high-quality products it manufactures, and the dedicated and enthusiastic team that represent the business.” White project managed the design, program and deployment of security measures utilising the National Barrier Asset (NBA) Deployment of security measures Prior to Highway Care, White spent 12 years at Hardstaff, starting out as a plant operator and quickly progressing through the ranks to site supervisor and then operations manager overseeing highways and security projects. As the UK terrorist threat increased, he project managed the design, program and deployment of security measures utilizing the National Barrier Asset (NBA) for high-profile events including the Nuclear Security Summit in Holland, Champions League Final, G8 and NATO conferences. High security environment Zaun sales and marketing director Chris Plimley said, “Mat brings a wealth of experience to Zaun in the high security environment, having previously worked alongside us on various high profile critical projects over the years. His product and design experience is exceptional, as is his ability to communicate at all levels from the teams on the ground to the end client means, building confidence that the project gets over the line. I’m delighted to welcome Mat into the team.” White joins four other recent recruits at Zaun. Andy Holloway has joined as internal sales manager, alongside sales estimator father and son Dave and Tommy Calvin together with design and production engineer Shane Rowton. Plimley concluded, “These appointments put the Zaun sales team on a stronger footing than ever and are key to driving forward our plans for continued growth coupled with ever improved customer service.”
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
The software-based technology running today’s access control systems is ideal for creating custom solutions for very specific end-user needs. Those needs may vary from delaying bar patrons’ access to a shooting range to reducing the risk of diamond miners pocketing precious stones. The ability to tightly integrate with and control video, intrusion, and other equipment puts access control at the heart of enterprise security. Often, off-the-shelf access systems provide most of the features an end user requires, but due to their type of business, facility or location, some organizations still have unaddressed needs. That’s where a custom solution can fulfill an essential task. Custom solutions are frequently requested by end users or the reseller to expand access control to meet those needs. Here’s a look at some custom solutions designed for end users. Area & time-based access control The owners of a popular shooting range also operate an onsite, full-service bar, and the owners wanted to delay entry to the shooting range once a customer had consumed alcoholic beverages at the bar. The custom solution works with the access cards customers use to enter the range. When a patron orders an alcoholic beverage, the bartender presents the patron’s credential to a reader at the cash register. With each drink, the access control system puts an automatic delay on the card being used to enter the shooting range. An area and time-based control solution was created An area and time-based control solution was created for a major pharmaceutical manufacturer concerned with potential contamination between laboratories testing viral material and others designing new vaccines. If an employee uses a badge to enter a room with viral material, that employee can be denied access to a different area (typically a clean room in this case), for a customized period of time. This reduces the potential of cross contamination between ‘dirty’ and ‘clean’ rooms. The software can be customized by room combinations and times. Random screening A mine operator wanted to prevent easily portable precious stones from being taken by miners. The custom solution uses the access control system integrated with time and attendance software. As the miners clock in, the system randomly and secretly flags a user-defined percentage of them to be searched as their shifts end. Security guards monitor displays and pull selected employees aside. A nice feature of this solution is that the random screening can be overridden at a moment’s notice. For example, if the process causes excessive delays, guards can override the system to enable pre-selected miners to pass until the bottleneck is relieved. The solution has also been adopted by a computer manufacturer looking to control theft by employees and vendors. Scheduler The system automatically unlocks and locks doors A custom solutions team integrated a university’s class scheduling and access control software to lock doors to classrooms that are not in use. With the custom solution in place, the system automatically unlocks and locks doors 15 minutes prior to and after a class. The doors remain unlocked if the room will be used again within the next 30 minutes. Readers mounted at each door enable faculty to enter rooms early for class setup or to work in a lab knowing students or others won’t be able to walk in. Event management This solution simplifies the visitor check-in process, especially for larger events with multiple guests. Efficiently moving people in and out of events booked at a working intelligent office building and conference center required integrating the access control system with a web-based solution storing the names, email addresses and phone numbers of invited guests. Before an event, guests receive an email invitation that includes a link to a downloadable smartphone mobile credential. Upon arrival, guests present that credential to Bluetooth readers at the building’s gated parking garage. The same credential enables smaller groups (up to 50 guests) to enter the building through turnstile-mounted readers – also used throughout the day by hundreds of building employees. To avoid long lines for larger groups of visitors, the turnstiles are kept open with security guards using handheld readers to authenticate credentials as guests enter the lobby. Additionally, a third-party emergency notification system was added to this custom solution. Guests receive instructions on their smartphones should there be a need to shelter in place or evacuate during an event. The credentials and notifications are disabled as guests leave the building through the turnstiles. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution Similar custom solutions have been deployed at hospitals searching for a way to provide secure access to patients only expected to be staying a short time for surgery. Patients are emailed a mobile credential to access both the hospital’s parking structure and surgical reception area. They can also designate family members and other visitors to receive emailed mobile credentials. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution for patients and visitors. Custom solutions are about problem solving. It’s finding answers to needs not specifically addressed by an access control system. The robust software of modern access control systems enables the design of custom solutions to efficiently enhance security, save time and reduce redundant tasks through automated processes.
ISC West, the world's largest security industry trade show, is just around the corner. This in-person show gathered more than 1,000 manufacturers and over 30,000 visitors from all over the world in 2019. On top of that, more than 200 brands exhibited at ISC West for the first time. This year's event promises to be just as exciting, if not more so. Let’s overview some leading security trends in video management systems development, and what's worth your time and attention at ISC West 2020. AI analytics Emerging two or three years ago, the AI-based video analytics market is experiencing a boom in growth. The prototypes and ideas displayed at ISC West 2019 could This year's event promises to be just as exciting, if not more soalready be part of a functioning system today. There's a lot of hype around this new trend. So, if you're looking for solutions for your needs, it is important to be able to tell the difference between technologies that work and marketing bluster. To do that, you have to understand what today's AI-based analytics (also often referred to as a neural network, deep learning, or machine learning) can and can't do. Let's start with what AI can't do in video surveillance. It can't analyze the sequence in which events occur or understand the 'logic' of what's happening in the scene. In other words, there's no such thing as a 'suspicious behavior detection tool'. Nevertheless, neural networks are really good at recognizing and classifying objects. For instance, they can distinguish humans from vehicles, vehicles from other moving objects, and cyclists from pedestrians. Neural network trackers This technology is primarily used as a neural network tracker or object tracker that can identify and track objects of a specific type. Usually, it's applied to complex scenes with a large amount of non-relevant details where a classic tracker would drown in false alarms. The neural tracker can be used to detect people in dangerous areas at production facilities, cyclists riding on pedestrian lanes, or poachers trying to sneak into a nature preserve. Neural networks are really good at recognizing and classifying objectsObject identification function can be used for other site-specific tasks, such as detecting people without a helmet or a high-visibility vest at facilities where those are required by safety regulations. It can also be used to detect fire and smoke in open spaces, or at big premises with high ceilings or active air circulation, where common fire alarm systems can't be used or may go off too late. Behavior analytics Behavior analytics is another field of analytics based on artificial neural networks. Even if recognizing suspicious or inappropriate behavior is nearly impossible, it can detect risky situations based on human postures, such as an active shooter pose, raised arms, crouching, or man down. In addition to that, AI has been successfully used to perform facial and license plate recognition for quite some time now. Although these systems aren't new, their recognition quality improves each year. Looking for solutions? You'll definitely find some interesting and new options from developers specializing in VMS and modular AI analytics at ISC West 2020. Even if recognizing suspicious or inappropriate behavior is nearly impossible, AI can detect risky situations based on human postures Smart search The ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance system. In many ways, it's even more AI has been successfully used to perform facial and licence plate recognition for quite some time nowimportant than real-time monitoring itself. Constantly keeping an eye out for what's happening onsite is the security service's job. Medium- to large-sized companies usually have that kind of department. Meanwhile, lots of small businesses and households use video footage to investigate accidents, resolve conflicts, or analyze employee's work. They generally don't need real-time monitoring, but video search is a crucial element. The most basic search tools offer an interface that enables easy access to recorded video and event-based search (from video analytics, detectors, etc.). Smart systems with forensic search features that allow the user to set criteria enhance the system's search capabilities even more. How it works VMS analyzes the video as it is recorded and saves the resulting metadata to a database. In the most basic case, the metadata contains information about motion in the scene as well as the moving object's coordinates. When searching, you can select an area of interest within the frame and take a quick look at all video segments containing motion in this area. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction. TThe ability to perform a quick, flexible search in a video archive is one of the most important features of a video surveillance systemYou'll quickly find what you're looking for by setting more precise criteria. The first VMS with forensic search features appeared in the early 2010s. Since then, a growing number of users and VMS developers have recognized the importance of these tools. More and more manufacturers enrich their products with forensic search features, starting from basic search by motion detection. Integrating search functions with AI Recently, search technologies have gone even further by integrating search functions with AI analytics. Some systems are capable to recognize all faces and number plates captured by cameras and save them to the database. You can quickly find all videos containing an image of a person or a car just by searching a photo or a number plate across multiple camera archives at a time. One usage scenario for these systems can be seen in law enforcement deploying them to find suspects using CCTV cameras around the city. Another option for integrating smart search and AI is searching by criteria based on a neural network tracker. When you use it, you can set object's size, color, motion speed and direction in the scene, as well as object's type (such as a human or a vehicle). So, if you need to find out when a red car appeared in the surveillance area, the system will show you only red cars while ignoring other objects like people in red clothes. This technology lets you find what you're looking for even faster. If you or your clients use VMS primarily to record video, be sure to ask the manufacturers you'll talk to at the show what search capabilities they offer. More advanced systems save the parameters of moving objects, such as their size, color, motion speed and direction Hardware AI acceleration High CPU resource consumption is one of the hardest challenges that stem from implementing a neural network–based video analytics system. This significantly decreases the number of cameras that can be connected to a server that hosts AI analytics. It also makes the system much more expensive. AI technology lets you find what you're looking for even fasterThe solution is to use AI accelerators. GPUs and dedicated accelerator cards are used on servers to provide hardware acceleration for the neural networks' workload. These devices are mostly manufactured by Intel and NVIDIA. Intel also offers the OpenVINO™ toolkit, a software package for developers that helps distribute workload between CPU, GPU, and accelerators as effectively as possible using all available resources. New solutions Due to AI's growing popularity, lots of minor microchip manufacturers became interested in developing neural accelerator chips. The healthy competition will work in the market's favor, serving to stimulate tech development and cut prices. New solutions in the field were on display at ISC West 2019; they'll definitely be present at ISC West again in 2020. Developers specializing in VMS and modular AI video analytics should absolutely check these out. But users should understand that it's impossible to build a cost-effective video surveillance system with significant number (10–20 and more) of AI analytics channels without using neural accelerators. That said, various accelerator models may significantly differ in price and power consumption. So, when you talk to developers specializing in VMS and AI analytics modules, ask what accelerator makes and models they support. In conclusion Whether you're an integrator looking for interesting VMS offers for clients or an end-user searching for solutions to your own tasks, check out what AI analytics can do. This sector is developing very fast and is continuously introducing new features that may be just what you're looking for. Incorporating forensic search in recorded video footage is key to building an effective video surveillance system for users, and important to creating a unique product offering for integrators. Needless to say, you can't build a cost-effective video surveillance system without using CPU resources wisely. If a system's functionality completely aligns with what you're looking for, ask what neural accelerator hardware it supports to correctly estimate the cost of your video servers.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organizers globally have canceled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was canceled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theater offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local /national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
J.D. Power is a well-known name when it comes to measuring customer satisfaction, and they have been measuring satisfaction in the home security industry since 2016. Changes affecting the marketplace – both in terms of disruptors and technology – make this a unique time. For example, in 2019, J.D. Power expanded the Home Security Satisfaction Study to not only measure the traditional pro-install/pro-monitor companies, but to separately evaluate self-install/pro-monitor brands. “At J.D. Power our rankings are meant to support an industry in two key ways,” says Christina Cooley, J.D. Power's Director, @Home Intelligence. “First, we provide consumers who are shopping for products and services with a ‘report card’ of who provides customers with high levels of customer satisfaction. Second, we provide companies with actionable insights to help them prioritize their initiatives to improve and maintain high levels of customers satisfaction that drive loyalty and growth.” Differentiating between companies The traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another In home security, J.D. Power is in a unique position to report on the changes taking place in the evolving industry. The 2019 rankings show that the traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another, as each have their individual strengths and opportunities, but overall the score range is relatively tight. On the do-it-yourself (DIY) side, there is more differentiation. A set of brands has been able to challenge the traditional industry by achieving extremely high customer satisfaction levels. Price is always an important factor that impacts customer satisfaction, whether for security or another market J.D. Power serves. The equation is simple, says Cooley: Does the price paid equal the value the customer feels they have received from the product or service? “For Home Security, we didn’t specifically look at price until this year,” says Cooley. “With the changes that have occurred in the market, price can be a differentiator as we’ve seen with the emergence of DIY-installed systems. However, lower pricing does not have a direct relationship to quality of service.” The price factor For example, there are some higher-priced pro-installed brands that perform lower on customer satisfaction than lower-priced competitors. And DIY-installed systems as a whole are less expensive, and price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment. Price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment The equation is: Performance minus Expectations equals Customer Satisfaction. “Obviously, price point will be a factor in the purchase decision and the expectations the customer has about the product and service,” says Cooley. “Any pro or DIY system has the opportunity to differentiate the customer experience regardless of price point.” There are clear differences in the pro vs. DIY experience, which is why J.D. Power evaluates the brands in separate rankings. However, Cooley says the drivers of satisfaction are consistent across both groups. The key to each group goes back to the equation above. Evaluating the purchase process For the both pro and DIY companies, J.D. Power evaluates the purchase process the same. Though the customer may take a different path to purchase based on the offering they seek, the drivers are still the same: Usefulness of information provided Reasonableness of contract terms Professionalism of sales representative Ease of purchasing home security system. For installation, there are clear differences. DIY systems are evaluated based on: Ease of completing installation Quality of installation instructions provided Timeliness of receiving home security system. Pro systems are evaluated based on: Professionalism of technician Timeliness of completing installation Quality of work performed. Interestingly, purchase and installation are the customer satisfaction driver where both pro and DIY providers (as a whole) are most closely aligned on performance. Customer loyalty The price a customer is paying must align with the quality of the system they receive What drives a customer to purchase a home security system initially will often be very different than what will keep them as a loyal customer, Cooley notes. The price a customer is paying must align with the quality of the system they receive, and the service provided through the professional monitoring and customer service. “With the expansion of home security offerings, it’s more important than ever for home security companies to understand the motivations, intentions, and usage patterns across different customer segments to ensure that regardless of the decision to go pro or DIY-install, they are able to meet their customers’ needs and differentiate in the very competitive market. The J.D. Power Home Security Study provides these actionable insights.” The study is focused on the companies/brands that comprise the top two-thirds of market share in each segment, pro and DIY installed. A number of the brands included may work with local dealers or retailers for sales and install, but the customer is essentially evaluating those services as part of the system purchased. It is one and the same from the customer’s perspective, and the sales/install process can either delight or frustrate a customer from the beginning, which can then set the foundation for the entire experience moving forward. Reasons for shopping for a security system tend to differ between pro and DIY shoppers: Both sets are most focused on wanting a newer, more up-to-date system Between the two, pro customers are more often moving into a new home or wanting to take advantage of a discount or bundling opportunity with other products For DIY customers, they are shopping for a system to give them more peace of mind and to protect their property. Reasons for selecting the provider also vary: A pro company is often selected based on brand reputation or a special offer/promo A DIY company is primarily chosen based on price or a positive review. In terms of brand image, we see that customers see both pro and DIY providers similarly in terms of reliability. However, when it comes to being customer-driven, DIY providers receive higher image ratings compared to pro-installed companies.
On December 11 to 16, 2018, the 14th FINA World Swimming Championships was held at the Olympic and International Expo Center in Hangzhou, China. Nearly 1,000 world swimming stars from 178 countries and regions competed here, creating a new glory with breaking 9 world records and 22 event records. The Chinese team won three gold medals, five silver medals and five bronze medals with the total medal number ranking the third in the world. The World Swimming Championships is one of the world's highest-level international swimming events. It is also the highest-standard individual international sporting event ever held in Hangzhou. For an international sporting event of this scale, the safety and security of the venues are of paramount importance. Security Monitoring Equipment As an important guarantee force for the security of the World Swimming Championships, Dahua Technology ensured the event’s safety with the host spirit and a great sense of responsibility. Dahua Technology once again shouldered the mission of guarding international events after successfully guaranteeing the G20 Hangzhou Summit. Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions In the periphery and outside of the venue, important entrances and exits, various passages and commanding points in the venues and security commanding headquarters, Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions, assisted the security department to establish security command headquarters, refined the security deployment of the venues and realized the full coverage of security monitoring from the periphery to the stadium and from the bottom to the commanding heights, facilitating the safe and smooth host of the 2018 Hangzhou FINA World Swimming Championships. Dahua turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships Intelligence Equipment At the venue of the 2018 Hangzhou FINA World Swimming Championships - the surrounding area and interior of the Hangzhou Olympic and International Expo Center, Dahua Technology has teamed up to deploy a number of professional intelligent HD PTZ cameras, fiber cameras, bullet cameras, domes, transmission and other intelligence equipment, covering all areas within the venue, which helped the security department to control all corners inside and outside the stadium in real time so that to ensure the safety of the venue and the event. Dahua Technology combined the requirements of ‘first-class venue facilities, first-class organization guarantee, first-class opening and closing ceremonies, and first-class city image’ in the Championships, focused on key links and built a set of intelligent security video management system with the support of advanced technology platform. Integrated Control System It integrated control system, storage and management, and enjoyed the advantages of simple deployment and operation, flexible combination, excellent performance, and a high level of security and stability. It turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships, meeting the high-level security needs of the event. Dahua Technology set the command and dispatch of the security department as the core At the security command headquarters of the site, Dahua Technology set the command and dispatch of the security department as the core, with high-definition tiled LCD screens as the display carriers and brought more intuitive and flexible display and control to the security management of the venues before and after the event to ensure the real-time handling, efficient command and visual control of the entire venues, thus winning the praise of the security department leaders. Display Control Equipment On the evening of December 16, the 2018 FINA Annual Awards Ceremony was held at the Hangzhou International Expo Center. As a ceremony of the most authoritative awards, with the largest scale and the greatest number of world-class swimming athletes in the global water sports field, Dahua Technology assisted the security units to reuse a large number of equipment around the venue, including intelligent cameras, storage, management platforms and display control equipment, making sure the ceremony was successfully being held. As an essential force in the escort 2018 World Swimming Championships, Dahua Technology actively devoted to the security work. Stationed professional and technical personnel were responsible for on-site equipment support, achieving zero failure of the equipment, successfully completion of the tasks, and winning the praise of the security department leaders.
A comprehensive video surveillance solution consisting of 96 cameras from Dahua Technology UK is being installed at the striking Fort Dunlop commercial and retail site, overlooking the M6 motorway in Birmingham. Dahua-Champion Security’s Video Solution Built for Dunlop Rubber, Fort Dunlop became the tyre-maker’s flagship production facility and at one time was the world’s largest factory, employing 3,200 workers. After production stopped in the 1980s, the building lay derelict before being redeveloped into 360,000 square feet of office and retail space, also now with an adjoining hotel. Much of the site’s previous video surveillance system was installed during the refurbishment in 2006, but with advances in modern technology, it was felt that the current system was no longer meeting basic requirements. An external consultant assessed the site and put forward plans for an upgrade. Bromsgrove-based Champion Security Installations won the bid for the upgrade project. Installed over two phases, the design consists of a total of 96 static and PTZ cameras from full HD to 4K resolutions 4K NVR, PTZ and Dome Cameras Installed over two phases, the design consists of a total of 96 static and PTZ cameras from full HD to 4K resolutions. Cameras include the 12MP panoramic internal IPC-EBW81230 fisheye camera, which uses H.265/H.264 triple-stream encoding, and the external panoramic IPC-PDBW8802 dome camera, with four 2-Megapixel progressive scan CMOS sensors and day/night functionality. Images are managed and recorded by a 128-channel, Ultra 4K NVR 616 network video recorder. “Having undertaken a full review of the security systems at Fort Dunlop, it became clear that a replacement CCTV system was required to ensure protection of the staff, visitors and building,” said a spokesperson from Savills. “Three different options were presented by contractors, but it quickly became clear that the Dahua system presented by Champion Security met our brief. The system installed has changed the way we monitor and protect our asset, and its ease of use has been a revelation to our site staff.” IP CCTV Security System A spokesperson from Champion Security Installations added, “We have worked with the management of Fort Dunlop for a number of years now, so we designed the new IP CCTV system in consultation with them. The aim was to meet all of the different security, health and safety criteria, as well as ensure ease of use for the operators. "Having installed Dahua equipment at a number of sites, we invited them to assist with the design of the Fort Dunlop system using a number of their new products. Working in conjunction with Dahua and Oprema Ltd, the project was delivered on time and within budget.”
The large crowds that regularly flock to downtown Houston, Texas, known as GreenStreet, call for heightened security measures. However, the 570,000-square-foot mixed-use center needed to balance a high level of security while maintaining an open and inviting environment that accommodates numerous businesses, delivery drivers, service providers and others who need open access to the property. With an eye towards improving both security and efficiency, the property’s owners decided it was time for a system upgrade. Choosing Hanwha Techwin Working with Houston-based Today’s Integration Inc., GreenStreet evaluated offerings from a number of vendors before selecting Hanwha Techwin as its video surveillance solutions provider. The decision was based on the quality, functionality, versatility and expandability of Hanwha Techwin’s products. Through SSM, GreenStreet’s security personnel can also enter log notes to maintain detailed activity records Today’s Integration designed an advanced video surveillance solution built on Samsung Security Manager (SSM) video management software. The system allows GreenStreet’s security staff to monitor live and recorded video, control PTZ cameras and communicate via two-way audio from a central command center. The system employs multiple Samsung 5080R IP dome cameras, SNP-5200H PTZ dome cameras and 6084R fixed cameras. The system’s NVRs are located in a server room and are connected directly to cameras for recording and to SSM for video playback. Video is transmitted across GreenStreet’s network via hybrid fiber, connecting the multi-site buildings to distribution switches, which also provide PoE to the Samsung cameras also implemented by Today’s Integration, Inc. providing a turn-key solution. Implementing New Security Measures When vendors, contractors or service providers arrive at the bay doors, they press the intercom’s call button to contact GreenStreet’s security staff at the control center. Simultaneously, a live video feed pops up on-screen in the security command center, allowing staff to see and communicate with the individual at the door. Through SSM, GreenStreet’s security personnel can also enter log notes to maintain detailed activity records. The system has also proven effective in assisting the Houston Police Department, which requests video from time. Best of all, the video surveillance solution is easily scalable, allowing more cameras and NVRs to be added as GreenStreet continues to grow and expand.
With a history dating back to the 1850s, the Sioux City Public Museum has evolved from its original focus on natural science to a broader emphasis on preserving the area’s heritage, offering a variety of educational programmes, events, and historical exhibitions valued at more than $2 million. Having outgrown its former location in a prominent Victorian-era mansion, the museum moved to a new downtown site in April 2011—a modern, open-concept building that has become known as one of the premier cultural destinations in Siouxland and beyond. With more than 5,000 visitors each month, the Sioux City Public Museum has made public safety and asset protection top priorities. Chosen for its advanced management features, ease-of-use, and exceptional image clarity, the Avigilon high-definition security system has played a key role in helping the museum meet its security goals.The Avigilon high-definition security system is used to deter criminal behavior and to safeguard valuable artefacts Crime Mitigation Located in the heart of downtown, the Sioux City Public Museum is a 55,000 square foot facility with an outdoor plaza, loading dock at the rear, and skyway connected to public parking. “Because of the size of the building, as well as its location in an area known for attracting a transient crowd, we wanted an advanced, high-definition security system to monitor people coming and going from our facility around the clock,” explained Steven Hansen, museum director at the Sioux City Public Museum. “We use the Avigilon high-definition security system to deter criminal behavior and to safeguard our valuable artefacts.” Based on research and a strong recommendation from the City of Sioux City facilities manager, Hansen chose to work with Electric Innovations, a local provider of security system design, installation, and service who installed the Avigilon high-definition security system to monitor the entrances, permanent exhibition area, temporary exhibition area, and loading dock. “We needed an advanced, high-definition security system that would provide broad coverage, overcome architectural challenges in our open-concept building, and remain unobtrusive,” explained Hansen. “Providing excellent local support, Electric Innovations has installed the best quality security solution possible to deliver optimal system performance.”Each user can select relevant camera views from their own desktop Live Monitoring And Broad Coverage Administrators and exhibition staff at the Sioux City Public Museum manage the Avigilon high-definition security system using the Avigilon Control Center network video management software (NVMS) monitoring the system live throughout the day from their desktop computers. A permanent monitor has been set up in the main reception area to monitor visitors as they enter and exit the permanent exhibit space. The museum installed a suite of Avigilon cameras in the main exhibit areas as well as in hallways, key entry points, and at the loading dock, and can store 29 days of continuous security video on an Avigilon network video recorder (NVR). Without a permanent security staff, the museum’s administrators are responsible for the facility’s security in addition to all other operational responsibilities, so ease-of-use was a key requirement for the new system. “The Avigilon high-definition security system is very simple to use, providing each of us with a variety of camera views right from our desktop, making it much easier and less time-consuming to monitor throughout the day,” said Deanna Mayo, administrative assistant at the Sioux City Public Museum. “Because each user can select relevant camera views from their own desktop, we can ensure broader coverage of the museum at all times.”Avigilon’s image quality makes it much easier to identify events with greater accuracy Effective security “While our needs are pretty basic, we can quickly and easily identify people and events because of Avigilon’s simple and intuitive user interface,” confirmed Mayo. Avigilon Control Center provides full control over security video playback, making it easy for users to quickly retrieve evidence and speed up response times. “Avigilon Control Center software is 1,000 percent more effective than our previous analog-based system,” added Hansen. Hansen and Mayo have also been very impressed with Avigilon’s image quality, which makes it much easier to identify events with greater accuracy than before. “I recently spoke with the captain of the police force who is very pleased that we have invested in the Avigilon high-definition security system,” noted Hansen. “We are located in an area that has caused concern for the police, and we have noticed a marked reduction in trespassing since deploying the Avigilon high-definition security system.”Sioux City Public Museum will be able to reduce its insurance costs and protect itself against the threat of false liability claims Safe Educational Experience The Avigilon high-definition security system has played a critical role in helping the museum ensure public safety and protect its assets worth more than $2 million. “I am confident that the Avigilon high-definition security system will deliver a lower total cost of ownership than other solutions because it offers greater image quality and reliability, requires less maintenance, and will free up our time for other important tasks,” explained Hansen. By installing such an advanced security system, Sioux City Public Museum will also be able to reduce its insurance costs and can more effectively protect itself against the threat of false liability claims. “Most traveling exhibits stipulate strict security guidelines before they can be displayed in a new location,” commented Mayo. “With the Avigilon system in place, we are in a much better position to host new exhibits and share the latest collections to attract new audiences,” said Mayo. With the knowledge that activity is being accurately captured around the clock by the Avigilon high-definition security system, Sioux City Public Museum administrators and patrons alike can enjoy a greater sense of security as they experience the region’s past at this leading cultural institution. “Avigilon has delivered the quality, reliability, and ease-of-use we need to help us deliver a safe, enjoyable, and educational experience,” concluded Hansen. “We have invested in the best quality and most reliable products in the industry.”
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organizations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white shark. It is therefore no surprise that the Monterey Bay Aquarium desired the most innovative and state-of-the-art cameras as a key component for its security system, and Arecont Vision was able to deliver what they required. Until recently, the Monterey Bay Aquarium relied upon up to 60 analog cameras for its video security needs Constant Surveillance And Monitoring The aquarium has a huge campus, with multiple separate properties and an average annual visitation of two million people. Until recently, the Monterey Bay Aquarium relied upon up to 60 analog cameras for its video security needs. With such a large area to cover and with so many people to monitor, this type of system proved increasingly unreliable and insufficient to its growing security needs. The aquarium’s security staff also found it a major inconvenience that accessories and other parts for the system were exclusive to the original provider, limiting the security team’s options both technically and financially. The footage from the analog cameras was monitored on monochrome screens and useful viewing of surveillance video was quite difficult at times. The quality of the images was low, and the inflexible nature of the cameras resulted in a number of blind spots throughout the aquarium’s large campus. Difficult Lighting Conditons The aquarium also has some very challenging lighting situations, requiring more specialized, versatile cameras in order to properly capture images. “We have some very difficult light levels here. The reflections of the water tanks can make certain areas lighter on camera than they are in person, or vice-versa,” stated Thomas Uretsky, Director of Security and Emergency Management for the facility. The security team reached the point where they knew they needed to upgrade. “The system needed more flexibility, multiple views on one camera, the works,” Mr. Uretsky said. “Blind spots needed to be eliminated, and we wanted as close to a 360-degree view as possible.” After thorough research, San Jose, California-based security integrator NSI Systems recommended Arecont Vision for the camera solution. The aquarium has a huge campus, with an average annual visitation of two million people Arecont Vision Surveillance Expertise Mr. Uretsky and the team at Monterey Bay Aquarium collaborated with Arecont Vision regarding what they were looking for, where coverage was needed, and how to best fit in into their budget. Monterey Bay Aquarium chose ExacqVision as their video management system, another solid partner to help upgrade their prior surveillance system. A range of different Arecont Vision cameras were ultimately deployed to serve the aquarium’s varying needs. Arecont Vision MicroDome cameras were ideal for the ticketing area and customer lines. The series includes Wide Dynamic Range (WDR) models, which can achieve clear images across extreme lighting conditions, such as those found in some of the indoor spaces at the aquarium. MicroDome cameras have an extremely low profile and only a 4” diameter, making them ideal for discreet security surveillance. When asked for his thoughts about the MicroDome camera, Mr. Uretsky responded, “They are small and nearly invisible to anyone who doesn’t know what they’re looking for. The fact that they have such a small footprint makes them ideal for us in the ticketing and front entrance areas.” The Monterey Bay Aquarium now has the unique and flexible camera solution it required, utilising 360-degree video Another favorite at Monterey Bay Aquarium were Arecont Vision SurroundVideo Omni G1 and G2 adjustable-view cameras. The SurroundVideo Omni series utilises a patented 360º track where each of its four-megapixel sensors can be moved to cover virtually any angle. Remote motorised focus simplified installation with the Omni G2. Combined with the ability to interchange lenses, the Monterey Bay Aquarium now has the unique and flexible camera solution it required. The customizable features of the camera also simplify future changes that may occur at the aquarium, saving time and money if construction or remodeling were to occur. “The SurroundVideo Omni cameras are some of our favourites because we are getting four cameras in one. They have the most flexibility,” said Kevin Wright, Monterey Bay Aquarium’s security manager. “Our blind spots are much more limited, and we don’t need to use nearly as many cameras as we previously had in those areas.” Although each camera offers four separate views, only a single PoE (Power over Ethernet) cable and a single software license is required for integration with the Exacq software, further reducing costs. Megapixel Camera Performance The system has performed incredibly well to date. Not only was it installed on time, but it was completed within budget. The Monterey Bay Aquarium monitors the system locally, 24-hours per day. The images are viewed on a dynamic video wall in the new Security Operations Centre. While most footage is viewed on-site, some cameras have been enabled with the Exacq software for remote monitoring at satellite offices. For example, holding areas for rescued sea otters can be viewed remotely by a research team. Some cameras have been enabled with the Exacq software for remote monitoring off-site Arecont Vision cameras have helped the aquarium’s security department in a variety of ways, one of which is increasingly common: addressing bicycle theft. Individuals will sometimes access a public recreational trail that runs along the aquarium’s main campus to steal unattended bikes parked by visitors or staff. Unlike the previous analog surveillance system, Arecont Vision’s megapixel cameras are able to provide the security department with good views and high-resolution images when reporting such incidents to the police department. The project at Monterey Bay Aquarium fulfilled a vast array of surveillance requirements — indoor and outdoor scenes, large and small spaces, low- to high-lighting conditions — and Arecont Vision cameras addressed each of the challenges. The deployment of the new cameras made an impression on Mr. Uretsky and his team. Making Potential Security Solutions Reality One installation inspired ideas for another, and Arecont Vision helped make these potential security solutions a reality as well. The continual partnership between the aquarium, the system integrator, and Arecont Vision has resulted in an ongoing collaboration between the three entities. “The reason we went with Arecont Vision was because it has a niche where a lot of manufacturers don’t, with its multi-view cameras,” Mr. Uretsky stated. Arecont Vision pioneered the first multi-sensor megapixel panoramic cameras in the surveillance industry in 2006, and has continued to enhance their capabilities, introducing adjustable-view Omni cameras in 2014. “These cameras have been fundamental as we systematically replace our old cameras with newer, megapixel versions. We are always improving and always adding cameras, so each time we’ve installed them we’ve been pleased.”
Avigilon Corporation, provider of security solutions, announced it was selected to enhance security at Vodafone Park stadium, in Istanbul, Turkey, of Beşiktaş JK. Enhancing Spectator And Player Safety Vodafone Park opened in April 2016 and is the venue for national Süper Lig and UEFA Champions League games. It features over 43,000 stadium seats, 144 executive suites, and more than 4,000 sq. meters (43,055 sq. ft.) of restaurants, shops and parking. To enhance spectator and player safety Beşiktaş JK, in partnership with security systems integrator Sensormatic Güvenlik Hizmetleri, deployed a complete Avigilon surveillance solution that incorporated more than 500 Avigilon cameras, including the award-winning Avigilon 7K (30 MP) HD Pro camera line, Avigilon Dome, Bullet, and PTZ cameras, as well as Avigilon network video recorders and Avigilon Control Center (ACC) video management software. Avigilon’s complete solution has enabled Beşiktaş JK operators to monitor and track activities during matches more efficiently The use of the Avigilon 7K (30 MP) HD Pro cameras allows Beşiktaş JK to cover wide areas of the stadium while simultaneously delivering exceptional image detail to zoom in and quickly identify and respond to potential security events. Combined with the advanced search functions of ACC, Avigilon’s complete solution has enabled Beşiktaş JK operators to monitor and track activities during matches more efficiently. This has helped to decrease illegal entry at Vodafone Park, helping to create a safer, more enjoyable customer experience. Smooth Installation “Avigilon’s solutions have helped us create a safe and inviting environment for our fans, which has ultimately allowed us to sell more tickets,” said Serhan Abaç, Stadium Marketing and Event Director at Beşiktaş JK. “The installation of Avigilon’s solutions was smooth and the system has been providing such positive results that other clubs now want to reach this level of security and technology in their stadiums.” Avigilon’s high-resolution cameras, artificial intelligence driven video analytics technology, and video management software solutions are designed to meet the diverse needs of stadiums around the globe.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload
Genetec To Exhibit Security Center 5.9 Version, ClearID PIAM System And Sipelia Module At ISC West 2020