Remote monitoring security applications
Pengsheng Industrial Park is the first investment project by a Chinese private enterprise in Uzbekistan that has been acknowledged and ratified by the governments of the two countries. Located in Uzbekistan's Sirdaryo state, the Pengsheng Industrial Park is the biggest non-energy cooperation project between China and the Central Asian country. At present, there are over 10 workshops covering various fields with a total number of more than 1,500 employees. As a model project of China-Uzbekistan...
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of...
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras T...
Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. The ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realizing late-on the benefits available from cloud management. Essentially, the client needed unified management of access poi...
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety at more than 100 schools, Fulton has installed a full Avi...
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organization that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 10053 Seagate develops computer drives and storage to store the world’s data from consumer to client specialized drives (i.e. surveillance optimized drives) to the enterprise. Q: What Was The First Year Your Company Exhibited At ISC West? 2014 Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We meet customers, use digital marketing, and display eco-system partnerships in our booth. Q: How Do You Quantify Your Success At ISC West? Our success is based on relationship building with new and existing customers and lead generation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is definitely one of the biggest shows in US, where all the industry professionals, system integrators and dealers converge. The attendees are a highly knowledgeable base with expertise in security and surveillance – making it a great place to have conversations with customers and partners alike.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
Workforce management systems gather and analyze information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimizes operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customizable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organizations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimized to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyze current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyze current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalize resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customizable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecutions, they may look at newer HD or IP-based video systems. Upgrading to a hybrid DVR system Applications include perimeter monitoring, public parking, city transportation, square/town safetyTo stretch a tight budget, a migration plan to an IP-based camera system could be phased in over time by centering the upgrade on a new hybrid DVR system. This way, both existing analog and newer IP-based cameras can be hooked into the system. For example, Hikvision’s Smart City Solutions include systems for government services, transportation and traffic management, or any combinations of these. Applications include perimeter monitoring, public parking, city transportation, square/town safety and temporary surveillance. Data capture form to appear here! Heart of City strategy Dahua Technology, a video-centric smart IoT solution and service provider, has introduced its ‘Heart of City (HOC)’ strategy, which is in line with the top-level design experience from hundreds of city projects. The strategy is based on the maturity of five technologies – artificial intelligence (AI), big data, cloud computing, IoT and 5G. The combination will enable the evolution of smart city 3.0 and bring great changes to our life, according to Dahua. A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using Dahua's cameras, monitors and switching equipment A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Future-proof radio network design Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Wearables for city surveillance Wearables are another new aspect of city surveillance system. For example, FLIR Systems, Inc. has announced FLIR TruWITNESS, a wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. TruWITNESS is worn on an individual’s body or mounted inside vehicles and is designed for any public safety organization that requires on-scene, real-time mobile surveillance TruWITNESS is designed for any public safety organization that requires on-scene, real-time mobile surveillance. Worn on an individual’s body or mounted inside vehicles, TruWITNESS includes visible-video, audio, global navigation satellite system (GNSS), gyroscope, accelerometer and magnetometer sensors. These sensors combine to send alerts and stream data to a central command center in real-time to ensure full situational awareness and global event handling. Featuring FLIR Neighbor Aware inter-device connectivity, TruWITNESS acts as an IoT device, triggering nearby TruWITNESS devices, fixed and motorized Pan-Tilt-Zoom (PTZ) security cameras, and other connected sensors to act upon an alarm event. TruWITNESS becomes a key component of FLIR Systems’ Video Management System, United VMS, which command centers use to manage video surveillance. United VMS combines video, audio, and other related data and makes it available for real-time situation management and forensic purposes. Video analytics for crowd monitoring Crowd monitoring video analytics solutions monitor vast areas instantly alerting police of any overcrowding areasCrowd monitoring video analytics solutions continuously monitor vast areas instantly alerting police of any overcrowding areas. Qognify’s crowd monitoring video analytics solution was successfully used during the Maratha Morcha in the city of Kolhapur, India, on October 15th, 2016. The system monitored approximately one million protestors through 165 cameras installed across city. Smart threshold alerts were streamed directly into the control room while the crowd was building up, so that action could be taken before the crowd density reached dangerous levels, alleviating crowd safety and stability. At the core of the solution is Situator, Qognify’s advanced PSIM/Situation Management solution, which manages a myriad of security systems and sensors, including Qognify’s video management solution, from a newly built state-of-the-art Command and Control Center. Security operators and officials have advanced situational awareness of what is happening in their city and where. Automated, pre-defined Standard Operating Procedures (SOPs) were designed, in the local language Marathi, for handling routine security incidents as well as disaster management, ensuring that the most effective response is initiated, and procedures are executed in a consistent manner. Maintaining law, order and safety Qognify also implemented its Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai, India. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. Qognify’s Video Management Solution controls hundreds of surveillance camerasAs a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing them to maximize Qognify’s Safe City solution. The Qognify Situator is an advanced Situation Management platform, and Qognify’s Video Management Solution controls the hundreds of surveillance cameras throughout the city. Role of standards in smart cities “Standards can assist in successfully deploying a comprehensive [safe cities] system with multiple technologies into a single, cohesive entity,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “With the ability to integrate various sensors and data from many different devices synthesized through one interface, government officials and law enforcement are afforded a more complete picture of their city’s security.” Deployment of facial recognition technology Live video streaming within the smart and safe city’s infrastructure means video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. Facial recognition technology can be added on to any video surveillance camera that is recording at a high quality This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police.
Public safety and the protection of property initiatives led the city of Mankato, Minnesota to deploy a city-wide IP-based video surveillance system. Founded in 1852, the city is the seat of Blue Earth County. It encompasses 18.26 square miles of land and water, and supports a population of about 41,000 (2015 US census estimate). Home to a variety of natural landmarks and higher educational institutes, Mankato provides a dynamic lifestyle for its citizens all year round. Surveillance For Key Community Areas The new city surveillance system uses a range of Arecont Vision megapixel cameras to cover key areas of the community, with the largest concentration of cameras deployed in the popular downtown entertainment district. Surveillance is also in place throughout Mankato’s city hall, civic event center, shopping areas, parking ramps, public safety center, municipal water plant, public work center, regional airport, and for multiple public parks and community streets. The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project. The original system NVR supported primarily analog technology cameras, with a small percentage of early generation IP cameras supporting only JPEG video. The image quality of megapixel cameras could not be matched by this system, nor could it be cost effectively grown to address city requirements. In order to enjoy enhanced security, increased public safety, and the protection of property, a more modern and capable surveillance system was required. The city thus engaged security and communications integrator WW Communications to design and deploy such a project.The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project WW Communications WW Communications’ COO Mike Bales led the effort and selected Arecont Vision’s IP megapixel cameras as the core of the new project. With regards as to why Arecont Vision was selected for the project, Bales explained: “A variety of factors led to the use of Arecont Vision, not least of which was the commitment and quality they provide as an American-based manufacturer. They are one of the few vendors who design and build their cameras in the U.S., and their cameras’ features and reliability reflect that.” Delving further into what features specifically appealed to them, Bales concluded, “Simplified installation features such as remote focus, along with advanced features such as true WDR (wide dynamic range) were key factors in the decision. Additionally, the SurroundVideo camera series’ cost effectiveness and coverage capabilities placed Arecont Vision ahead of its competitors for the job.” SurroundVideo cameras were first designed and pioneered in the surveillance industry by Arecont Vision in 2006. Now in their fifth generation, they provide non-stop coverage with four individual megapixel sensors for superior situational awareness and image quality while reducing the total number of cameras required for surveillance projects. After deciding on a manufacturer, Milestone Systems was then brought on as the video management software for Mankato’s new surveillance system. Arecont Vision and Milestone are proven integration partners, having completed thousands of seamlessly-integrated city surveillance projects around the world. Arecont Vision And Milestone Systems Additionally, Milestone is a top-tier participant in the Arecont Vision Technology Partner Program and its VMS software is among those used in Arecont Vision’s MegaLab. “The close technology and support integration between Arecont Vision and Milestone helped ensure that a best-in-class surveillance system was delivered to the Mankato,” commented Bales. “The result is a single system for the city that is second to none in capabilities and can grow with the community’s needs.” The surveillance system has exceeded the expectations of the city to protect both people and property City Surveillance Project Phases Phase one of the project included deploying thirteen cameras to the newly-built public safety center. Phase two resulted in the deployment of thirty-seven cameras to the city’s entertainment district. The effectiveness of these cameras led to additional installations at city sites which greatly assisted in reducing common vandalisms and other public safety crimes. Phase three of the project involved the installation of twenty-three MegaDome 2 single sensor cameras onto the fourth floor of a brand-new, four-story parking facility in the downtown area. Surveillance of the structure was further enhanced through use of a SurroundVideo Omni — a unique omni-directional camera introduced to the industry by Arecont Vision in 2014. Unmatched Surveillance Capabilities The Omni camera series offers four megapixel sensors that are mounted on three-axis gimbals inside a low-profile dome enclosure. The sensors can be individualized to cover virtually any direction, providing unmatched surveillance capabilities with a single high-resolution camera that is fully integrated with the VMS. With the recent Public Works Center campus construction project, another three MicroDome G2 and five SurroundVideo Omni cameras were added to the city’s overall surveillance system. Five SurroundVideo Omni cameras and MicroDome G2 cameras were also installed along a pedestrian walkway that stretches from local hotels to the city’s civic center and entertainment district. The system is expected to continue growing in order to address public safety and property protection concerns as they arise. Security And City-Wide Situational Awareness After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime Depending upon the location and local requirement, the Mankato’s city surveillance system uses a range of Arecont Vision cameras. These include single sensor 2 – 5MP MegaDome 2 and MicroDome G2 cameras. 20MP SurroundVideo multi-sensor cameras provide 180° situational awareness coverage, while omni-directional SurroundVideo Omni G1 and G2 cameras cover an even wider range of deployments. The city surveillance system is managed and monitored from a command center with a multitude of large screens displayed across a wall. “The surveillance system and the screens are critically important during high-traffic events in the city,” said Mr. Bales. “With three colleges here in town, homecoming is a very busy time of the year. There are also numerous festivals that take place in the city combined with a very dynamic downtown. Our staff is able to view the activities as they happen, enhancing security and city-wide situational awareness.” Video Streaming To Cellphone Devices It is not just the security center that can monitor this system either — video can also be streamed to cellphone devices and can be monitored for official use all over the city. The system provides public monitoring as well. There are about half a dozen locations downtown with indoor walkways and skyways that are covered by Arecont Vision cameras with live video, providing the public with supplementary awareness and security. The surveillance system has exceeded the expectations of the city to protect both people and property. An example of the system’s usefulness was evident in a recent incident that made national news. After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision cameras were crucial in solving the crime. The city surveillance system caught the incident on camera, providing detailed video evidence which assisted law enforcement in proceeding accordingly. The cameras prompted the ideal outcome in an unfortunate situation, helping make the legal process more efficient and serving to greater deter the occurrence of future incidents. When probed on how the system has performed to date, Bales responded that Arecont Vision “exceeded the expectations.” Arecont Vision looks forward to continuing this legacy throughout its work with the City of Mankato.
Trust and track record are vital attributes in any locking system designed for critical infrastructure. French water utility Eau de Valence set themselves a challenge upgrading an old-fashioned mechanical locking system. They demanded access control that could manage multiple and dispersed utility sites; perform reliably outdoors in any weather; and log and monitor all system users from a single control point. CLIQ® key-based access control technology from ASSA ABLOY was the solution. PROTEC2 CLIQ® Mechatronic Locks Eau de Valence selected PROTEC2 CLIQ® mechatronic locks with mechanical disc cylinders and encrypted electronics. ASSA ABLOY partner AC Pro installed around 40 programmable PROTEC2 CLIQ® cylinders and padlocks across Eau de Valence sites, and issued 20 battery-powered keys, one for every authorized user. Now, a comprehensive audit trail for every lock and padlock is available on demand, so monitoring the frequency of contractor and other key-holder visits is easy. It is straightforward to tailor anyone’s access rights by restricting key validation to specific times or dates, if needed. Removing access permission from lost or stolen keys is easy with the CLIQ® admin software. Weekly mandatory key revalidation provides yet another layer of security. Updating Key Access Permission Five Eau de Valence keys are also equipped with CLIQ® Connect technology, to allow supervisors to update their key access permissions on the move, via Bluetooth and the CLIQ® Connect app, in the event of a problem arising when they were away from base or on-call. With CLIQ®, power to each cylinder is supplied by a standard battery inside every CLIQ® key, so installation was fast and cost-effective. There’s no wiring at all — making it an ideal retrofit solution for doors and padlocks at sites where connecting mains electricity is difficult or impossible. “All the energy is in the key,” says Christophe Nublat, Head of Study and Works Division at Eau de Valence. “There is no power supply to the lock, and therefore very little maintenance.” In addition, CLIQ® padlocks can handle weather extremes and secure almost any opening, making the CLIQ® solution much more adaptable than standard electronic access control systems. It is also easy for Eau de Valence to manage mechanical and electronic locks in the same installation: “The electronic and mechanical cylinders are managed by one and the same key,” adds Christophe Nublat. Encrypted Lock And Key Communications Despite all this extra convenience, there have been no compromises on site security. Communications between lock and key are encrypted. Because there are up to 1.97 billion unique key combinations, there is unlimited scope for any utility to design its own mechatronic key-based access system to suit its own specific needs — however challenging. This is why CLIQ® technology is already trusted to protect critical infrastructure sites all over Europe.
GRW is one of South Africa’s leading providers of sophisticated road transport trailers; designing, manufacturing and servicing a wide range of bespoke vehicles, each configured to provide a solution to the unique transportation needs of an individual client. GRW has now invested in a state-of-the-art IP CCTV system to protect its premises against unauthorized access and monitor the large, modern production facilities, and is already reaping the benefits from the integration of analytics with the IP cameras. GRW Transport Operations Founded in South Africa in 1996, GRW’s operations have always revolved around the transport of commercial goods. Whether it’s carrying petroleum, chemicals, temperature-controlled perishables, FMCG, pallets or bulk general cargo, the trailers manufactured by GRW are specifically designed to meet the individual transportation requirements of customers throughout Southern Africa, the Middle East, Australia and the UK. All the company’s products emerge from its large, ultra-modern manufacturing complex in Worcester, in South Africa’s Western Cape. As well as housing the extensive production facilities and spare parts department, the facility is also home to GRW Services and GRW Financial Services, which are responsible for worldwide customer care and after-sales contract servicing and the supply of rental units. Surveillance of the perimeter of this large facility and protecting the plant from unauthorized access was a key security concern for the company. However, manned patrols of the perimeter proved ineffective and Sensor Security was tasked with designing a solution that would automate the process of securing the boundary and eliminate the possibility of human error. At the same time, GRW recognized that an intelligent camera infrastructure might enable remote monitoring of the production process and Sensor Security was asked to investigate.Surveillance of the perimeter of this large facility and protecting the plant from unauthorized access was a key security concern for the company Integration Of Analytics With IP Cameras “From the outset we knew that the proposed CCTV system should successfully serve a dual purpose, helping supervisors and managers monitor the workshop operations during opening hours and securing the perimeter 24 hours a day,” says Edmund Casaleggio, Sensor Security’s Sales Executive. “There was also a need to make the combined system as simple and easy to operate as possible, ensuring that operations staff had unrestricted access to the workshop video feeds while not being distracted by the security cameras and vice versa for the security officers, who are best served by complete concentration on securing the premises.” Following extensive consultations with GRW staff, the final design of the dual-purpose system involved a total of 18 Hikvision cameras, eleven on the perimeter and seven in the workshop area, all feeding in to a 32-channel Hikvision NVR at GRW, and to Security Sensor’s control room. “GRW was actively involved in the whole consultation and design process, right from day one, with suggestions on key sites needing monitoring and protecting and information and advice on the flow of work and personnel around the workshop area” continues Edmund Casaleggio. “This was hugely beneficial and one of the main contributory factors in the successful installation. In my experience it is always more challenging, risky even, to install any security-related system without sufficient input and collaboration from the end-user client.” A Smart Perimeter Perimeter patrolling with guards having proved ineffective, GRW was also keen that the introduction of cameras did not mean that an individual would have to be assigned to constantly manage the CCTV system around-the-clock. Therefore, the Hikvision DS-2CD4012F-A Smart 1.3MP low-light box camera was selected to monitor the perimeter of the plant, with active use of the cameras Smart Analytics intrusion flags ensuring that GRW’s security officers and Sensor Security’s control room are pro-actively notified of any unauthorized movement around the premises. According to Edmund Casaleggio, “The integration of analytics with the Smart IP CCTV cameras is a significant added advantage, flagging alarms only when intrusion occurs within the specified range. We do not have to use alarm inputs and outputs to connect passives and actives on the DVR/NVR, which saves significantly on maintenance of the system. It also reduced installation time significantly. What’s more, the accuracy of these Smart cameras with analytics is far better than beams, as long as the cameras are correctly calibrated when installed. In this regard, the Auto Back Focus on these Smart cameras greatly assists the installation technicians to achieve the best possible viewing quality.” As well as the Smart Intrusion Detection, the Hikvision DS-2CD4012F-A also features Smart Codec, Smart Focus, Smart VQD, Smart Face Detection and Smart Audio Detection. They also benefit from 3D DNR and Digital WDR, and the Day & Night IR cut filter allows successful video operation down to 0.001 Lux. Remote Monitoring Of Perimeter And Workshop Seven Hikvision DS-2CD2132-I 3MP Mini Dome Cameras keep watch over all operations in the workshop area, assisting the supervisors and managers to remotely monitor processes on the floor. This process is made much easier and more efficient for these staff due to the integration of the Hikvision DS-9632NI-ST 32-channel NVR with a PC, ensuring that operational staff are only presented with images relevant to the production area.GRW is already reaping the benefits from the integration of analytics with the IP cameras and is set to continue for many years" “The full HD, 1080p real-time video is a huge asset for the supervisory staff and the camera itself, protected within its IP66 vandal-proof housing, has withstood the rigours of a harsh industrial environment really well,” continues Edmund Casaleggio. “True day/night operation thanks to its 30m IR range and Digital WDR and 3D DNR also contribute to the high-quality video at all times.” A Real Success “This newly-installed state-of-the-art IP CCTV system automates the process of protecting GRW’s premises against unauthorized access and monitoring the production facilities while eliminating the possibility of human error,” says Edmund Casaleggio. “GRW is already reaping the benefits from the integration of analytics with the IP cameras and is set to continue for many years. “At the same time, they are benefitting from the user-friendly nature of Hikvision’s technology. This deceptively “simple” platform helps GRW staff to operate the software easily with minimal training while Smart features, such as ABF, aids our technicians to achieve the best possible video quality. “However, the quality of Hikvision’s hardware and software does not come with an unaffordable price tag. In fact, since Hikvision’s iVMS-4200 software allows for the integration of analog and IP cameras free-of-charge, this serves to increase the affordability of their products. What’s more, the free Hikvision software allows the feeds from analog and IP cameras to be integrated on one screen. “In conclusion, Hikvision’s huge range of cameras, NVRs, DVRs and software allows us to propose unitary solutions to their security needs and to more successfully back-up and service the installation over many years. Quite simply, it is easier to provide post-sales service and support with a single, reliable brand.”
A five-acre logistics site in the UK blighted by break-ins and theft of diesel is now being protected by a system that includes a combination of 30 highly reliable detectors from OPTEX, one of the world’s leading detection technology manufacturers. Established in 1995, Intake Transport operates one of the largest fleets on the British road today with one main depot and three satellites around the country. The main depot experienced a number of incidents where diesel was being stolen directly from the tanks of the trucks, most severely over a bank holiday weekend when it was closed for three days. Each vehicle holds at least £600 worth of diesel, and added to the cost of the damage to the bespoke painted vehicles when intruders tried to enter the cabs and steal scrap metal from the trailer, the overall cost to the business ran into many thousands of pounds. OPTEX Intrusion Detection Sensors Eyewatch Security was approached by the Director of Intake Transport for a solution. The system designed by Eyewatch includes 30 OPTEX intrusion detection sensors to provide a layered protection around the site. Five AX infrared beams create a ‘virtual perimeter fence’ around the compound where the trucks are parked; six BX-80 outdoor PIRs provide a curtain of detection to protect the outdoor perimeter along the fence. Ten battery-operated high mount HX-80 sensors provide volumetric detection to secure the approach to the office building; and 25 VX-402 hardwired detectors add additional security at the entrance and around the rest of the site. The extensive system is linked to five cameras that are remotely monitored at Eyewatch’s HQ so that if an intrusion is detected, the incident can be ‘seen’ and responded to. Each of the Intake drivers is given a code to set and unset the system so that they do not cause any false alarms. System Success Richard Burgin, director of Intake Transport: “Since the system was installed, we haven’t had any attempted break-ins and no false alarms either, now that the drivers have become used to the routine. I am incredibly impressed with the reliability of the OPTEX detectors and the peace of mind this has provided us as a business. “Diesel and scrap metal theft has become a prevalent problem nationwide and in Scunthorpe, we are seeing many businesses suffering from similar problems as Intake Transport,” says Dean Bolton, Managing Director of Eyewatch. “We have now installed a top level security system that will protect the compound and all of the valuable trucks within it for many years to come.”
Customer Located in the Meadowlands and part of the MetLife Sports Complex in East Rutherford, New Jersey, MetLife Stadium is home to the New York Football Giants and the New York Jets. The $1.6 billion stadium was financed and built by a joint venture between the two teams, who operate it through the New Meadowlands Stadium Company. The stadium opened in April 2010 and boasts a seating capacity of 82,500, making it one of the NFL's largest stadiums. On February 2, 2014, MetLife Stadium played host to Super Bowl® XLVIII. Challenge MetLife Stadium wanted to replace 26 IP cameras located at the perimeter gates of the stadium and also to deploy 180° panoramic-view cameras in place of the 27 pan-tilt-zoom (PTZ) cameras that covered the exterior perimeter. Given the large crowds they attract, each football game, concert or other event has its share of unique challenges, including monitoring fan conduct, crowd management situations and dealing with medical emergencies. MetLife Stadium's main goal in upgrading its surveillance system was to ensure a safe, secure environment that would contribute to a memorable guest experience. Incident prevention and monitoring were additional key goals of the project. MetLife Stadium staff members are challenged with trying to determine what happened after an incident occurred. There are often various versions and accounts from those involved and from independent witnesses. Clear recorded video is needed to reveal what actually happened. Prior to the new camera system being installed, MetLife Stadium used four PTZ cameras to monitor the seating bowl area and these cameras were only used reactively when an incident came to the attention of the stadium's Command Center. With the new camera system, every seat in the seating bowl is monitored at all times. Being able to have their Command Center personnel go back in time and review everyone’s actions is an extremely valuable investigative tool for stadium security personnel and for public safety agencies. Among the stadium security management team's other goals are to identify and examine objects left behind, monitor security screening procedures, investigate slip-and-fall incidents, observe staff performance and provide surveillance for counter terrorism efforts. Solution Because MetLife Stadium was designed to be a network-controlled building, IP cameras were part of the original design. When it came time to install cameras to cover the seating bowl, IP was the only platform considered, according to Daniel DeLorenzi, Director of Security for MetLife Stadium. "To run an analog system would have been cost-prohibitive due to cabling, and the cables would be single-purpose. If upgrades were necessary, the project would have to be completed all over again," DeLorenzi said. The excellent image quality provided by the Arecont Vision megapixel cameras makes it possible for stadium security to identify individuals DeLorenzi and the rest of MetLife Stadium's security management team turned to Robert McCabe, owner of Corporate Security Services, Inc., located in Edison, N.J., to assist in selecting IP surveillance components and to design and implement the video surveillance solution. After a careful evaluation process, an optimal surveillance solution was built around megapixel imaging technology from Arecont Vision to ensure wide area coverage with extreme detail and to enable forensic zooming on live and recorded video. Corporate Security Services deployed more than 130 Arecont Vision megapixel cameras throughout MetLife Stadium, including MegaVideo® Compact 10-megapixel (MP) cameras located around the bowl of the stadium to provide a view of every seat in every section; SurroundVideo® panoramic 8MP cameras provide 180° coverage of entrances and common areas; and MegaDome® 2 3MP cameras with remote focus and wide dynamic range (WDR) are located in the stadium’s security entrance areas. Arecont Vision WDR cameras provide detailed video where bright and dark images exist in the same scene. The Arecont Vision megapixel cameras are controlled using Genetec Security Center, a unified video management system (VMS) which is monitored by a centralized security command center within the stadium. Arecont Vision worked with Corporate Security Services' designers to provide a layout of the camera locations required to cover the area, which McCabe says helped with the installation. In the end, all the cameras were installed in easily accessible and serviceable locations. Megapixel Benefit Because of the high level of detail it provides, one Arecont Vision SurroundVideo panoramic camera covers the same area as multiple IP VGA resolution cameras. By using Arecont Vision cameras to reduce overall camera counts, MetLife Stadium’s security team was able to achieve its goal of implementing an unobtrusive high-performance video surveillance system. With a reduction in the total number of cameras implemented, the system can be more efficiently managed. MetLife Stadium's policy is to initiate real-time recording 24-hours prior to game day, at which time every camera within the stadium is recorded at its full frame rate. Incidents are recorded prior to, during and for several hours after a game or other event. This allows the security staff to easily search and play back detailed video of any reported incidents from any of the cameras to determine what happened. Because of the high level of detail it provides, one Arecont Vision SurroundVideo panoramic camera covers the same area as multiple IP VGA resolution cameras The excellent image quality provided by the Arecont Vision megapixel cameras makes it possible for stadium security to identify individuals, and the high frame rates allow them to see actions that occur. Additional benefits of the Arecont Vision cameras include Day/Night video capabilities where mechanical infrared (IR) cut filters are used for clear images in low light, H.264 compression to reduce network and storage costs and Power over Ethernet (PoE) to reduce cabling costs. Arecont Vision MegaVideo Compact series box cameras are available in 1.3MP to 10MP resolutions with features that include dual H.264/MJPEG encoding, fast frame rates, privacy masking, pixel binning to increase light sensitivity in 3MP, 5MP and 10MP models, extended motion detection grid, flexible cropping and PoE. They are available in color and Day/Night configurations. SurroundVideo series megapixel cameras from Arecont Vision are all-in-one 180° and 360° panoramic solutions that are available in 8MP, 12MP WDR, 20MP and 40MP resolutions. Housed in environmental rated IP66 domes, the units feature dual H.264/MJPEG encoding, true Day/Night functionality, IR corrected megapixel lenses, privacy masking, extended motion detection, bit rate control, binning mode to increase light sensitivity in 12MP, 20MP and 40MP models, fast image rates and WDR in 12MP models. Arecont Vision MegaDome 2 all-in-one cameras with remote focus and remote zoom are available in 1080p, 3MP, 5MP and 10MP resolutions. Features include an IP66-rated / IK-10 impact-resistant dome chassis with a 3-axis camera gimbal for easy adjustment, dual H.264/MJPEG encoding, integrated megapixel vari-focal lens, optional WDR in 1080p and 3MP models, pixel binning in 3MP, 5MP and 10MP models, total PoE and optional IR illumination, audio functionality and heater kit.
Background Delivering the future of guarding through technology and expertise The emergence of high-tech virtual guarding as a powerful and cost-effective alternative to traditional manned patrol approaches is a direct realization of the promise seen in the industry’s most innovative and high-performing technology. Currently, emergent leaders in the virtual guarding space are those who successfully leverage guarding and security expertise and match it with the right technology to move beyond mere “remote monitoring” to true, comprehensive virtual guarding. The Arizona-based Surveillance Acquisition Response Center (SARC) has quickly staked out a place of leadership in the virtual guarding space—with its exclusive use of highly-trained security professionals with extensive law enforcement, military, and security technology background as operators—to deliver a pro-active guarding solution that leverages critical expertise and carefully cultivated relationships with clients and local law enforcement. This provides a second-to- none virtual guarding experience with an unsurpassed track record. When SARC needed a technology standard to power their virtual guard operations, they turned to IDIS for technology that is as powerful, reliable, and innovative as SARC itself. Challenges Next-generation security requires next-generation technology In the constantly evolving and progressing security market, it’s essential to deliver solutions that deliver a wide range of customizable options for solutions of any size, scope, or circumstance, while also keeping both the installation and user experience streamlined and simple for installers and operators. When selecting a technology standard for their virtual guarding operations, SARC needed simple IP configuration, while maintaining third party IPC support, to accommodate installers who had grown accustomed to analog installation methodologies. Maximizing flexibility to cater to each of their client’s needs was also a priority and any solution had to have surveillance components that were scalable, ONVIF® compliant, and were compatible with a wide range of third party products in order to build off of existing analog installations while still reaping the benefits of HD quality. Finding highest quality solutions with low maintenance requirements and no licensing fees—and resulting lower total cost of ownership for end users—was another requirement for SARC. Solution - IDIS DirectIP IDIS technology as a flexible and powerful force multiplier SARC leverage guarding and security expertise and match it with the right technology to provide comprehensive virtual guarding IDIS technology proved a perfect match for SARC. DirectIP™ is an optimized HD surveillance platform based on an IP framework consisting of a complete range of IP cameras, network video recorders (NVRs), network equipment, and client software, all offered as a complete package or available as individual, optimized components. The simple plug-and-play functionality and automatic network detection of DirectIP made the entire surveillance system quick and easy to set up for SARC’s installer partners, and centralized functionality allowed every IP camera to be installed without the need for individual configuration. The IDIS “future proof” guarantee further met SARC’s needs by guaranteeing backwards compatibility with future IDIS surveillance components, eliminating security vulnerabilities that come with hiccups in future system upgrades. The powerful video management software (VMS) options offered by IDIS also allowed SARC to provide its clients with a flexible and cost effective surveillance virtual guarding solution. IDIS Center is a completely license-free VMS, with no upgrade charges or annual fees, and, for more specific or complicated requirements, IDIS Solution Suite provided a powerful modular functionality, affordably customizable to any user need. Near identical user interfaces between IDIS Center, IDIS Solution Suite, and IDIS Mobile simplified the user experience and reduced training requirements for SARC’s operators, allowing more time for a laser focus on client needs and not wrangling technology. Results And Benefits Industry-leading surveillance technology that delivers for operators and clients alike Partnering with IDIS allows SARC to effectively meet the needs of their clients, decreasing costs while increasing reliability, functionality, and their own operators’ positive user experience. IDIS technology offers a level of simplicity and ease of use that has reduced installation times, decreased training requirements for clients and SARC operators alike, and helped make SARC’s security solutions for clients more affordable over the long term. The uncomplicated, intuitive nature of IDIS technology better allows SARC operators to focus wholly on delivering world-class virtual guarding to their clients. “IDIS understands that each end user is unique and they design the user interface of their applications in a way that just makes sense to use. The applications team at IDIS understands the concept of how important true UX [user experience] is and they apply it to their entire product lineup. IDIS Center and IDIS Solution Suite are so intuitive that we haven‘t had a single client contact us after their initial training for technical support.” said San Kim, Director of Operations, SARC Monitoring.
Round table discussion
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
People are an essential component of any physical security system. Automation hasn’t taken over completely yet! But how has innovation changed the skillsets security operators need to operate systems effectively? The two elements – technology and manpower – must operate seamlessly and hand-in-glove to ensure that modern systems live up to their full potential. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?