Remote monitoring security applications
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay....
Each day, over 55,000 electrical substations in the United States funnel massive amounts of energy to homes and businesses across the country. An array of specialized equipment allows these facilities to keep up with demand, and each component must run smoothly to adequately transfer and distribute energy. Housing mission-critical assets vital to the community means that substations must track everything—from condition monitoring to intrusion and sabotage threats. Thermal imaging cameras,...
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individu...
Allianz Parque has become one of the most modern multi-purpose arenas in Latin America since it was built in 2014 by WTorre Properties. The stadium is located at the same place of the old Palestra Itália Stadium with a capacity of more than forty thousand spectators. The stadium not just meets FIFA standards but was also awarded various prizes including the Master Award in the 11th edition of the Grand Prize for Corporate Architecture, the Accessibility Seal, delivered by the Permanent A...
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, rangi...
Pengsheng Industrial Park is the first investment project by a Chinese private enterprise in Uzbekistan that has been acknowledged and ratified by the governments of the two countries. Located in Uzbekistan's Sirdaryo state, the Pengsheng Industrial Park is the biggest non-energy cooperation project between China and the Central Asian country. At present, there are over 10 workshops covering various fields with a total number of more than 1,500 employees. As a model project of China-Uzbekistan...
MOBOTIX is the first manufacturer in Europe to receive the “CNPP certified” product certification, offering a commitment to resist IT and electronic cyber-attacks. “This recognition is proof of quality, performance, and also of the trust of our customers at a time when digital security is becoming a key issue for all stakeholders,” says Patrice Ferrant, Regional Sales Manager, France. MOBOTIX announced its intention to focus more on cyber-security over one and a half years ago, in particular by launching the “MOBOTIX Cactus Concept.” Video protection and telephony The objective of this initiative is to promote cyber-security in the area of video protection and video-telephony" “The objective of this initiative is to promote cyber-security in the area of video protection and video-telephony. An integral part of our strategy is to develop a series of product-integrated tools and features that allow IT security administrators to protect their systems. Now that we have passed a series of tests validated by CNPP, it is truly rewarding to announce our certification today,” added Ferrant. "We are particularly proud to be the first European manufacturer to receive the CNPP certification. It confirms our efforts to offer cyber secure products and solutions to our customers worldwide," emphasizes Thomas Lausten, CEO of MOBOTIX AG. Fire/Explosion security expert CNPP is a key player in France in risk prevention and control in the areas of fire/explosion security, security/malicious acts, cyber-security, environmental issues, and occupational risks. “After several years of R&D and confronted with rising threats of cyber-attacks, CNPP developed a method for assessing the robustness of security/safety products against cyber-attacks. This approach allows us to add resistance to cyber-attacks to the functional security/safety characteristics that are already certified. This new acknowledgment, represented by the @ symbol combined with our certification marks, allows for the addition of a third-party assessment of the products’ ‘security by design.’” says Nathalie Labeys, Head of Pôle Electronique de Sécurité CNPP Cert. CNPP-ANSSI partnership The cyber-security work was led by CNPP in association with the ANSSI"Nathalie adds, “The cyber-security work was led by CNPP in association with the National Cyber-security Agency of France (ANSSI) with the aim of providing suitable validation for security/safety products that is completely compatible and complementary to specific ANSSI acknowledgments (FLSC*, common criteria, etc.).” She furthers states, “Today, these new CNPP Certified trust passports delivered for video surveillance cameras add a cyber-security dimension to the list of electronic security equipment already certified @ (NF & A2P @, A2P @, CNPP Certified), which allows the overall inclusion of the cyber-security dimension by CNPP, with the integration of best practices for installation and IP-connected security/safety maintenance and with the frame of reference APSAD D32 through APSAD service certifications.”
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 10053 Seagate develops computer drives and storage to store the world’s data from consumer to client specialized drives (i.e. surveillance optimized drives) to the enterprise. Q: What Was The First Year Your Company Exhibited At ISC West? 2014 Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We meet customers, use digital marketing, and display eco-system partnerships in our booth. Q: How Do You Quantify Your Success At ISC West? Our success is based on relationship building with new and existing customers and lead generation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is definitely one of the biggest shows in US, where all the industry professionals, system integrators and dealers converge. The attendees are a highly knowledgeable base with expertise in security and surveillance – making it a great place to have conversations with customers and partners alike.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
Technology is expanding passenger screening functions and other capabilities at airport security checkpoints. For example, Smiths Detection is exploring the concept of a security checkpoint that integrates biometric identity management with screening solutions, says Richard Thompson, Global Market Director Aviation, Smiths Detection. Biometrics is the “unique identifier’” for passengers, and through integration of biometrics directly into the checkpoint, passengers can be matched with their luggage trays to enable real-time risk-based screening (RBS). The system is now able to trigger differentiated workflows for each passenger and their bags. Risk-based screening Risk-based screening optimizes security operator resources through enhanced screening of passengers who represent a higher risk, while passengers deemed to be low risk enjoy a more seamless journey.Passengers deemed to be low risk enjoy a more seamless journey Easily integrated with existing infrastructure, biometric checkpoints deliver operational efficiencies and a competitive advantage to airports through accelerating the screening process, thus enabling a more seamless free flow of passengers. Passenger and tray identification Through passenger and tray identification, new data insights can also be gathered to inform decision-making. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities. For example, airlines could monitor passenger flow through security for specific flights or track the number of trays per flight to predict overhead compartment capacity. Checkpoint data could also be combined with hold luggage screening results or shared with transit and arrival airports to better inform security assessments. Advanced data analysis based on flights, airlines or destinations could be utilized by airlines and security authorities Advanced screening of carry-on baggage Smiths Detection’s HI-SCAN 6040 CTiX offers advanced screening of carry-on baggage using Computed Tomography (CT), an advanced X-ray technology originally intended for medical applications, which allows for detailed, layered 3D images to be rotated and dissected. Electronic devices and liquids do not need to be removed from baggageThis enables detailed detection, meaning electronic devices and liquids do not need to be removed from baggage, thus expediting screening and further improving the passenger journey. Smith Detection’s iLane.evo is an automatic tray return system. By delivering a steady flow of trays, it plays a critical role in streamlining the screening process and delivering increased throughput; optimized operational costs; and an improved passenger experience. AI for Object Recognition In other trends, the use of artificial intelligence (AI) in aviation security is on the rise due to the exponential growth in computing power. It has the potential to significantly boost the performance of screening equipment – allowing for the deployment of new object recognition functions at the checkpoint, which could pave the way for a more automated, alarm-resolution-only passenger screening. Smiths Detection has developed a family of smart algorithms, called iCMORE, which use machine learning to reliably detect prohibited or dangerous goods in baggage, including weapons, to reduce the burden on image analysts and improve screening outcomes.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, Global President of Stanley Security Products and Solutions. Stanley Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, Stanley is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics Stanley manages very large, multi-national clients. As a consequence, the Stanley security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, Stanley is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at Stanley,” says Kushner. Stanley’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) Stanley has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to Stanley’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the Stanley brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that Stanley is “open and actively looking for properties that fit our commercial growth strategy.” He notes that Stanley focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers Stanley has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. Stanley is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. Stanley is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. Stanley is also developing a tight integration with Lenel’s mobile credentialing system. Stanley is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says Stanley heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” Stanley is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms. The cameras detect minute increases in temperature, triggering an alarm in YHN’s central enquiry center before any fire has had a chance to take hold, meaning within seconds of a possible fire starting the alarm is raised with the fire service. The camera continually monitors the temperature in the room, with information relayed back to the fire service, enabling them to better prepare for responding to the fire. David Langhorne, YHN’s Assets and Development Director, said: “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-story blocks under a microscope, but we have been trialing new measures in our multi-story properties for some time. Faster Fire Detection “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere. The early detection system provided by the camera has many benefits, but, most importantly, the faster response time from the fire service means the potential impact on residents and their properties is minimized and they and their homes are far safer as a result.” “This trial system is one of many fire safety measures currently in place in the blocks we manage across the city, where we also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers, and bin room sprinklers.” Reducing False Fire Alarms Alan Robson, Assistant Chief Officer at Tyne and Wear Fire and Rescue Service said “It’s great that YHN is innovating in this way. Using technology to support the monitoring of storage areas such as this helps improve the information we receive about incidents. This technology can reduce false alarm calls and improve our response to confirmed fires.” The standard CCTV lens provides a live feed for further verification of events OpenView Security Solutions is the UK’S largest privately-owned independent security company and a leading national supplier of fire, electrical and mechanical services to the public and private housing sectors. Thermal Imaging The Mobotix M16 Thermal camera’s lens is triggered when an unexpected heat pattern occurs and automatically sends an alert to the central control room. Images from the thermal lens are automatically presented to operators enabling the exact location of hotspots, such as smouldering fires, to be pinpointed. The standard CCTV lens provides a live feed for further verification of events. YHN’s existing infrastructure, which uses Openview installed equipment in the blocks to link alarms through to its enquiry center via Jontek, meant the new approach could be easily implemented without any disruption to residents. Innovative Fire Protection Solutions Andy Ward, Sales Director of OpenView Security Solutions, added “This innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimize the incidence of false alarms. It now forms part of our expanding portfolio of fire and life safety solutions, one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sector.” Commenting on the partnership with YHN and OpenView, Frank Graham, Mobotix Regional Sales Manager, said: “We are very happy to be working so closely with both YHN and Openview in the development and provision of an innovative solution for such a serious issue. Mobotix cameras have inbuilt intelligence to meet all the requirements of integrator and end users alike and we look forward to a longstanding and fruitful partnership with both organizations moving forward.”
Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. The ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realizing late-on the benefits available from cloud management. Essentially, the client needed unified management of access points and video, both locally and remotely. It was for these reasons that ACT365 was chosen for the task. Remote Monitoring Capabilities ACT365 allows the system user to activate doors and analyze their status from any major web browser or the ACT365 appImportantly, ACT365’s remote monitoring capabilities deliver a force that gives business owners far greater visibility and control of their property. For instance, at the London Fields site, ACT365 allows the system user to activate doors and analyze their status from any major web browser or the ACT365 app. This allows Work.Life to make immediate remote adjustments to a user’s details, including updating access privileges when a lapsed membership is renewed. Crucially, ACT365 can also generate muster reports during a building evacuation, with marshals being able to see instantly from their phone or smart device if members have mustered out. Again, this function can be used remotely if required. Controlling Doors Through Smartphone Devices Vision Security Services operates as an integrator across access control, video surveillance, intruder alarms and barrier systems across the south of England and London from a base in Sittingbourne, Kent. Commenting on the installation of ACT365, Reg Butler, Director of Vision Security Services, stated: “There are very few true cloud-based access control solutions, and the ability of Vanderbilt’s ACT365 to synchronize access control events instantly to camera footage from a single platform means no time is wasted searching through video. Vanderbilt’s ACT365 appeals to our end-users regarding functionality and price point. They also appreciate being able to view sites and even open and lock doors based on what they see on a camera feed, all from a smartphone or web browser.” Protecting People And Assets During Emergency ACT365’s real-time management enables the kind of flexibility that system users need to instantly protect people and assets in the event of an emergency Overall, ACT365’s real-time management enables the kind of flexibility that system users need to instantly protect people and assets in the event of an emergency. Essentially, ACT365’s remote monitoring feature puts business owners first by eradicating once heavy responsibilities that can now be promptly completed through the click of a button on smartphone or desktop devices. This gives business owners convenience through simplicity. As explained by Ross Wilks, Head of Marketing Communications at Vanderbilt: “ACT365 deals with convenience. It deals with things that are at the heart of customer pain points. Vanderbilt has always looked to invest in technology that will match our values of collaboration, empowerment and customer-first. "Products like ACT365 excel with these criteria. ACT365’s distinguishing characteristics deliver information rapidly, cost-effectively, and can be upgraded with the latest features as and when they become available.”
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety at more than 100 schools, Fulton has installed a full Avigilon security solution that includes Avigilon cameras with self-learning video analytics, Avigilon network video recorders, and Avigilon Control Center™ (ACC) video management software with Avigilon Appearance Search™ technology. Fulton is also deploying Avigilon Access Control Manager to secure physical access points, providing an integrated security solution for the district. Simplifying Recording And Capturing Of Footage Fulton sought to replace analogue cameras with an end-to-end high definition security system camera system in order to maximise protectionFulton sought to replace analog cameras with an end-to-end high definition security system camera system in order to maximize protection, enable proactive event response, and facilitate the recording, capturing and sharing of clear footage with its school board, police and the concerned public. Securing more than 100 buildings is no easy feat, but it’s of utmost importance to the Department of Safety and Security at Fulton, which also includes the School Police and Student Health Services and Emergency. Upgrading Video Security System With recent data showing above average student incident rates and student disciplinary concerns at some schools, upgrades to the security system were needed to allow better local and remote monitoring in important areas. “One of the biggest security challenges we face is our ability to reliably monitor important areas throughout our schools, especially during an emergency. With Avigilon, we not only benefit from exceptional image quality, but their advanced video analytics, like Avigilon Appearance Search technology, save us valuable time and effort, ultimately making our schools a safer place.” - Paul Hildreth, Emergency Operations, Safety and Security, Fulton County School System. Appearance Search Technology Avigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schoolsAvigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schools. ACC 6 video management software with Avigilon Appearance Search technology is a particularly exciting new development for the district. “We chose Avigilon because of the capabilities it offers in its advanced video analytics search technologies, including Avigilon Appearance Search,” said Paul Hildreth, Emergency Operations, Safety and Security for Fulton. “Their analytics are easy to set up and use, and can save us valuable time and effort, ultimately making our schools a safer place for generations to come.” Video Data Analysis Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence search engine to sort through hours of footage with ease. This technology allows Fulton’s operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently. This can save Fulton time and effort during critical investigations as Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route and identify previous and last-known locations. Avigilon self-learning video analytics enable proactive, real-time event response. Built from the ground up to manage high-definition video, Avigilon offers self-learning analytics on camera resolutions of up to 5K (16 MP). Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area Avigilon H4 Platform Avigilon H4 bullet and dome cameras from the new H4 platform were installed, offering self-learning video analytics, greater resolution performance and Wide Dynamic Range support. Avigilon H4 cameras are available in 1 to 5 MP and 4K Ultra HD (8 MP) resolutions. Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area. Upgrading the district’s security solutions began three years ago with a single high school as a pilot program. The success of this replacement led the district to integrate ACC in other school projects and, in 2014, Fulton opened new administrative centers with both Avigilon access control and video security solutions. At the start of 2017, Fulton began implementing a three-year approach to completing the upgrade. Image Quality And Resolution Before switching to the Avigilon solution, the district was challenged with low system reliability, which resulted in not having video evidence when needed. Furthermore, in situations where there was recorded footage, it was not of high enough quality to provide value. With the installation of Avigilon video security, Fulton has benefited from exceptional image quality and resolution across wide areas in all lighting conditions. The ongoing Avigilon implementation will provide the district with crucial and powerful insights that can help save time and effort during critical investigations. With the help of Avigilon trusted security solutions, the future looks bright for Fulton County Schools.
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organization that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal is to deliver global standards of excellence in technical education for all its students. Looking to provide a more secure environment and enhance education management, both inside its college campuses and within classrooms, DTE enlisted the help of Prama Hikvision India to evaluate their needs and recommend a practical solution. Enhancing Education Processes Working closely with the client, Hikvision undertook site surveys at 43 campuses across Gujarat and in respect of DTE’s management and system performance needs, proposed a cost-effective solution that would provide the required level of indoor and outdoor surveillance coverage. The considerations for the surveillance solution would also take-in DTE’s objective of enlisting the new system to play a role in enhancing the day-to-day education processes, where it could also be used to remotely monitor examinations, as well as being a time-saving facilities management tool for use across the large Western India state.The Hikvision control software fully supports smart search, playback, and smart detection Centralized Surveillance Monitoring Providing centralized remote surveillance and alarm monitoring, Hikvision proposed an IP-based solution that would use DTE’s existing secure virtual private network (VPN), which connects all education sites across Gujarat to a central point at the Directorate of Technical Education, in the capital city of Gandhinagar, Gujarat. At two control rooms, Hikvision iVMS-5200 Professional VMS software was installed to control and monitor the new surveillance system 24/7. Ideal for controlling any mix of surveillance system products, the iVMS-5200 Professional software fully supports all Hikvision products, including DVRs, NVRs, cameras and speed domes, as well as any mix of third party manufacturer products that conform to ONVIF standard. Allowing DTE’s security and management application needs to be addressed, regardless of its size and complexity, the Hikvision control software fully supports the installed Hikvision products’ smart features, including smart search, playback, and smart detection. Low-Light Surveillance Capability To provide affordable high-quality surveillance imaging across the 43 college campuses covered, Hikvision specified a mix of DS-2CD2620F-IS HD 2 Megapixel vari-focal IR network bullet, and DS-2CD2720F-IS HD 2 Megapixel outdoor network IR dome cameras. Both camera models provide 1920×1080 resolution, and true day and night (ICR) low-light capabilities, along with back-light compensation (BLC). Approximately 1,300 Hikvision cameras installed now provide comprehensive surveillance within the campuses lobbies, classrooms, laboratories, staff rooms, examination halls, auditoriums, storerooms, exit and entry doors, and open campus area access gates and car parks. Integrated Campus Security The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably"The Hikvision IP-based surveillance solution successfully illustrates just what can be achieved with large-scale integration,” explains Pinkal Shah, Asst. Manager - Technical Support, at Prama Hikvision India. “The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably, encompassing central video management, integration and failover mechanism." "Supporting all remote sites’ local storage and camera SD storage, the system uses Hikvision’s Center Video Record (CVR) mode using NAS to receive data streams directly from network cameras. With CVR mode, there is no need for an intermediate storage server, which not only increases storage efficiency and system stability, but also greatly reduces system hardware cost for the end-user.” DTE system operators can remotely check the status of facilities or presence/absence of support staff Remote Surveillance "The Hikvision video surveillance system utilizes a WAN/VPN to connect each of the separate locations in this massive multi-site project,” explains Mr. Dayashankar of Progility Technologies Pvt. Ltd., systems integration company responsible for the installation of the project. “The excellent Hikvision iVMS-5200 Professional VMS software enabled us to integrate the many existing third-party manufacturers cameras into the new system, as well as providing out of office hours remote alarm configuration and monitoring. We found the quality of the Hikvision networked camera images to be exceptional under every operating condition.” Viewed from the central monitoring stations, DTE system operators can now remotely check the status of facilities or presence/absence of support staff across Western India. In addition, on examination of the high definition play back, since the installation went live, incidents of petty theft have been recorded, and stolen belongings of students and facilities recovered.
Public safety and the protection of property initiatives led the city of Mankato, Minnesota to deploy a city-wide IP-based video surveillance system. Founded in 1852, the city is the seat of Blue Earth County. It encompasses 18.26 square miles of land and water, and supports a population of about 41,000 (2015 US census estimate). Home to a variety of natural landmarks and higher educational institutes, Mankato provides a dynamic lifestyle for its citizens all year round. Surveillance For Key Community Areas The new city surveillance system uses a range of Arecont Vision megapixel cameras to cover key areas of the community, with the largest concentration of cameras deployed in the popular downtown entertainment district. Surveillance is also in place throughout Mankato’s city hall, civic event center, shopping areas, parking ramps, public safety center, municipal water plant, public work center, regional airport, and for multiple public parks and community streets. The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project. The original system NVR supported primarily analog technology cameras, with a small percentage of early generation IP cameras supporting only JPEG video. The image quality of megapixel cameras could not be matched by this system, nor could it be cost effectively grown to address city requirements. In order to enjoy enhanced security, increased public safety, and the protection of property, a more modern and capable surveillance system was required. The city thus engaged security and communications integrator WW Communications to design and deploy such a project.The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project WW Communications WW Communications’ COO Mike Bales led the effort and selected Arecont Vision’s IP megapixel cameras as the core of the new project. With regards as to why Arecont Vision was selected for the project, Bales explained: “A variety of factors led to the use of Arecont Vision, not least of which was the commitment and quality they provide as an American-based manufacturer. They are one of the few vendors who design and build their cameras in the U.S., and their cameras’ features and reliability reflect that.” Delving further into what features specifically appealed to them, Bales concluded, “Simplified installation features such as remote focus, along with advanced features such as true WDR (wide dynamic range) were key factors in the decision. Additionally, the SurroundVideo camera series’ cost effectiveness and coverage capabilities placed Arecont Vision ahead of its competitors for the job.” SurroundVideo cameras were first designed and pioneered in the surveillance industry by Arecont Vision in 2006. Now in their fifth generation, they provide non-stop coverage with four individual megapixel sensors for superior situational awareness and image quality while reducing the total number of cameras required for surveillance projects. After deciding on a manufacturer, Milestone Systems was then brought on as the video management software for Mankato’s new surveillance system. Arecont Vision and Milestone are proven integration partners, having completed thousands of seamlessly-integrated city surveillance projects around the world. Arecont Vision And Milestone Systems Additionally, Milestone is a top-tier participant in the Arecont Vision Technology Partner Program and its VMS software is among those used in Arecont Vision’s MegaLab. “The close technology and support integration between Arecont Vision and Milestone helped ensure that a best-in-class surveillance system was delivered to the Mankato,” commented Bales. “The result is a single system for the city that is second to none in capabilities and can grow with the community’s needs.” The surveillance system has exceeded the expectations of the city to protect both people and property City Surveillance Project Phases Phase one of the project included deploying thirteen cameras to the newly-built public safety center. Phase two resulted in the deployment of thirty-seven cameras to the city’s entertainment district. The effectiveness of these cameras led to additional installations at city sites which greatly assisted in reducing common vandalisms and other public safety crimes. Phase three of the project involved the installation of twenty-three MegaDome 2 single sensor cameras onto the fourth floor of a brand-new, four-story parking facility in the downtown area. Surveillance of the structure was further enhanced through use of a SurroundVideo Omni — a unique omni-directional camera introduced to the industry by Arecont Vision in 2014. Unmatched Surveillance Capabilities The Omni camera series offers four megapixel sensors that are mounted on three-axis gimbals inside a low-profile dome enclosure. The sensors can be individualized to cover virtually any direction, providing unmatched surveillance capabilities with a single high-resolution camera that is fully integrated with the VMS. With the recent Public Works Center campus construction project, another three MicroDome G2 and five SurroundVideo Omni cameras were added to the city’s overall surveillance system. Five SurroundVideo Omni cameras and MicroDome G2 cameras were also installed along a pedestrian walkway that stretches from local hotels to the city’s civic center and entertainment district. The system is expected to continue growing in order to address public safety and property protection concerns as they arise. Security And City-Wide Situational Awareness After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime Depending upon the location and local requirement, the Mankato’s city surveillance system uses a range of Arecont Vision cameras. These include single sensor 2 – 5MP MegaDome 2 and MicroDome G2 cameras. 20MP SurroundVideo multi-sensor cameras provide 180° situational awareness coverage, while omni-directional SurroundVideo Omni G1 and G2 cameras cover an even wider range of deployments. The city surveillance system is managed and monitored from a command center with a multitude of large screens displayed across a wall. “The surveillance system and the screens are critically important during high-traffic events in the city,” said Mr. Bales. “With three colleges here in town, homecoming is a very busy time of the year. There are also numerous festivals that take place in the city combined with a very dynamic downtown. Our staff is able to view the activities as they happen, enhancing security and city-wide situational awareness.” Video Streaming To Cellphone Devices It is not just the security center that can monitor this system either — video can also be streamed to cellphone devices and can be monitored for official use all over the city. The system provides public monitoring as well. There are about half a dozen locations downtown with indoor walkways and skyways that are covered by Arecont Vision cameras with live video, providing the public with supplementary awareness and security. The surveillance system has exceeded the expectations of the city to protect both people and property. An example of the system’s usefulness was evident in a recent incident that made national news. After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision cameras were crucial in solving the crime. The city surveillance system caught the incident on camera, providing detailed video evidence which assisted law enforcement in proceeding accordingly. The cameras prompted the ideal outcome in an unfortunate situation, helping make the legal process more efficient and serving to greater deter the occurrence of future incidents. When probed on how the system has performed to date, Bales responded that Arecont Vision “exceeded the expectations.” Arecont Vision looks forward to continuing this legacy throughout its work with the City of Mankato.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?