Remote monitoring security applications
Pengsheng Industrial Park is the first investment project by a Chinese private enterprise in Uzbekistan that has been acknowledged and ratified by the governments of the two countries. Located in Uzbekistan's Sirdaryo state, the Pengsheng Industrial Park is the biggest non-energy cooperation project between China and the Central Asian country. At present, there are over 10 workshops covering various fields with a total number of more than 1,500 employees. As a model project of China-Uzbekistan...
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of...
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras T...
Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. The ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realizing late-on the benefits available from cloud management. Essentially, the client needed unified management of access poi...
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organizations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety at more than 100 schools, Fulton has installed a full Avi...
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organization that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 10053 Seagate develops computer drives and storage to store the world’s data from consumer to client specialized drives (i.e. surveillance optimized drives) to the enterprise. Q: What Was The First Year Your Company Exhibited At ISC West? 2014 Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We meet customers, use digital marketing, and display eco-system partnerships in our booth. Q: How Do You Quantify Your Success At ISC West? Our success is based on relationship building with new and existing customers and lead generation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is definitely one of the biggest shows in US, where all the industry professionals, system integrators and dealers converge. The attendees are a highly knowledgeable base with expertise in security and surveillance – making it a great place to have conversations with customers and partners alike.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air Established in 2011 in Kyiv, Ukraine, Ajax Systems produces wireless security equipment for end users and small-medium-sized businesses. Ajax is a complete eco-system. The devices are ready to work out of the box. There are 24 devices for protecting residential and commercial properties from intrusion, fire, and floods as well as a set of automation modules. Users treat them as gadgets that make their homes smarter. Ajax wireless systems are easier to maintain, configure, and monitor for installers as well as for security companies, according to Ajax. The systems are resistant to false alarms, regularly update over the air, and can be easily expanded to cover premises of any size. IoT-based security systems “Our IoT-product approach to security systems, gadget-like industrial design, and user-friendly interfaces disrupted the market in 2016,” says Valentine Hrytsenko, Chief Marketing Officer at Ajax Systems. “After receiving global recognition in the security market, the company grew 80-fold.” Today, Ajax IoT-based security systems protect more than 200,000 people in 80 countries around the world from break-ins, fires, leaks and other threats. “Our mission is to reshape security and make it a common attribute of every household,” says Hrytsenko. Ajax wireless systems are easier to maintain, configure, and monitor for installers Ajax smart technology Ajax smart technology features a combination of reliable hardware and intelligent software. A proprietary Jeweler two-way radio protocol allows placing devices at a distance of up to 2000 meters from the hub in an open space. The system is encrypted, resistant to jamming and code grabbing. Ajax detectors feature false alarm-preventing algorithms: Haze Flow, ZOE, LISA, SmartDetect. The hubs run on a real-time operating system, Malevich OS that processes the commands and sends the alarms. Ajax Cloud service helps to control the system from anywhere in the world using native apps. Easy and seamless installation Ajax features system scalability, flexible management of administrative rights" Easy installation facilitates Ajax on-boarding. The company says 67% of Ajax users purchase additional security devices within the first six months. And an average system configuration consists of nine items. “We focus primarily on the residential, small and medium-sized businesses,” says Hrytsenko. “In the residential segment, Ajax covers the needs to detect break-ins, prevent fires and floods. Ajax devices are visually appealing to fit any home and business interior seamlessly. For the small and medium-sized business, Ajax features system scalability, flexible management of administrative rights, informative notifications, professional maintenance software, as well as integration of the security camera streams for centralized monitoring.” Route-to-market approach Ajax Systems’ route-to-market approach is two-fold. First, they develop strategic partnerships with the local professional security equipment distributors in each country. From the distributors, Ajax equipment goes to the installers, system integrators, security companies, etc. In addition, Ajax seeks to build brand recognition and actualize the concept of security by weaving it into the daily routine of a general audience. “We form a good understanding of their security needs,” says Hrytsenko. As with any new technology, there is an adoption curve for both B2B and B2C clients. Thus, the educational challenge is persistent for Ajax from country to country. Ajax Systems’ route-to-market approach is two-fold Wireless security systems “On a professional market, new products are often met with understandable suspicion,” says Hrytsenko. However, a huge misconception is that user-friendly equipment is either hard to customize or unreliable. Not true, he says. After testing in five accredited laboratories, Ajax devices successfully earned Grade 2 certification for compliance with the requirements of the international standard EN50131-1:2006. Grade 2 is the highest reliability grade a wireless security system can get.
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyze real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and parking security. Vehicle recognition systems Rekor Systems is a provider of vehicle recognition systems in more than 60 countries Using AI to enable video cameras, Rekor Systems is a provider of vehicle recognition systems in more than 60 countries. Applications include security and surveillance, public safety, electronic toll collection, brand loyalty, parking operations, banking and insurance, logistics, and traffic management. AI allows Rekor’s products to recognize and read license plates, while also providing information about each vehicle, including color, make, year, and model. Rekor’s products are powered by OpenALPR software, an AI-based solution that enables any IP (internet protocol) surveillance camera to scan license plates and provide vehicle data including tag number, make, model, and color in real time with 99% accuracy, according to the company. Rekor’s products are powered by OpenALPR software Integrated solutions “Rekor's software started as an open source project, and we have done our best to keep the commercial software as open as possible,” says Rod Hillman, Chief Operating Officer, Rekor Systems. “One of the challenges we see with others in our space is a tendency to ‘close off’ and ‘silo’ their solutions. Our goal is to make it as simple as possible to deploy, integrate, and ultimately use.” Rekor has numerous application programming interfaces (APIs) and ways the solution can be integrated into partners' solutions with a software development kit (SDK). Rekor solutions can be purchased directly or through a worldwide partner network of integrators, wholesalers, and within integrated solutions such as Nokia's smart city platform. Electronic toll collection Rekor’s solutions have viable applications within multiple markets While many systems are hardware-based, Rekor’s software-as-a-solution offering can turn an IP camera into an automatic license plate reader. Rekor’s solutions have viable applications within multiple markets, including law enforcement, security and surveillance, electronic toll collection, parking operations, banking and insurance, logistics, traffic management, and customer experience. “Rekor offers a cost-effective alternative to traditional LPR systems with a much higher accuracy rate at 99% allowing more cameras to be present and active at any given time,” says Hillman. “Traditional LPRs need someone to go through hours of footage to find what they are looking for while Rekor’s technology will send alerts in real time, resulting in much quicker response times.” Move Over Camera mounts onto roadside worker’s vehicles to capture ‘Move Over’ violations Two-Part authentication Rekor’s products include: NUMERUS, a cloud-based solution for high-volume vehicle recognition, designed to reduce costs and increase efficiencies for the electronic toll collecting industry. Two-part authentication instantly identifies the vehicle’s make, model, color and body type along with the license plate read. Machine-learning-enabled software recognizes license plates from all 50 U.S. states, in addition to plates from more than 70 countries on six continents. Edge, an all-in-one camera and vehicle recognition system that instantly reads vehicle license plates, along with the vehicle’s make, model, color and body type. Move Over Camera, which mounts onto roadside worker’s vehicles (police, tow truck, etc.) to capture ‘Move Over’ violations. ‘Move Over’ laws state that vehicles must move over one lane and/or slow down if they cannot move over to avoid incident while roadside workers are in the shoulder lane. The camera can detect what lane vehicles are in and how fast they are moving. Violators are flagged in the system for law enforcement’s review.
A high majority of Americans (83%) are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals. More than one in five (22% of) Americans say they have canceled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data. Across the pond, three in 10 Britons think twice about attending large-scale events due to data or physical security issues. Although less than half of U.K. survey respondents have changed their plans to attend large events, some 45% are taking extra security precautions. Brits are as afraid of using public Wi-Fi at an event as of a physical criminal attack. These are some of the insights from the 2019 Unisys Security Index survey of more than 13,000 consumers in 13 countries, including 1,000 in the U.S. and another 1,000 in the United Kingdom. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed Security index scores of countries Unisys gauged attitudes on a range of security-related issues and created an index based on survey results. The index is a calculated score from zero to 300 based on concern about eight specific issues within the categories of national, financial, Internet and personal security. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed. In contrast, the U.S. index is now at 165, considered a serious level of concern and the highest among developed countries surveyed. Globally, the index average stands at 175, with the Philippines scoring highest with an index score of 234 and the Netherlands registering the lowest concern ratings with a score of 115. Concerns about misuse of information Privacy is an area where concern is growing. “This year more than half of U.K. citizens expressed concerns about the misuse of their personal information,” says Unisys’ Global Chief Security Architect, Salvatore Sinno. Another 49% expressed serious concerns that intelligence services listen in on them through electronic devices such as mobile phones or smart speakers. The summer calendar of major sporting events, concerts and festivals raises the levels of security concern The summer calendar of major sporting events, concerts and festivals raises the levels of security concern. Nick Aldworth, former National Counter Terrorism Co-Ordinator, tells the BBC that the government is not doing enough to ensure venues are secure. He supports a campaign for more rigorous checks at venues in the U.K., named Martyn’s Law, after Martyn Hett, a victim of the Manchester Arena attack in 2017. safety Pointers while attending event Salvatore Sinno of Unisys provides the following pointers on keeping safe this summer: If planning to attend a crowded event alone, let someone know. Make sure friends or family know where you are going, when you plan to arrive and when you are expected to return. Plan ahead and check local authorities’ alerts; sign up for any travel or news alerts to receive updates on traffic or news of any disturbances. As soon as you get to an event, survey your surroundings. Make sure you know where the exits are and agree on a meeting place with friends in case you should get separated from the group. Know where stewards and information points are so you can speak to someone if you need to. Be vigilant for suspicious activity at an event. Don’t be afraid to report something you think is unusual, such as unattended baggage or people behaving in a suspicious or threatening way. In an emergency, stay calm and move to the edges of crowds. Try to leave the area quickly and calmly. If you need to, follow the standard police advice of ‘Run, Hide and Tell’. Only buy event tickets from official channels or trusted websites. Update your mobile device with the latest, most secure software and avoid unsecured Wi-Fi networks; keep your phone charged and take along a battery charger pack. Don’t make electronic transactions at unofficial event vendors; be careful with contactless cards or making mobile transactions. “Whether it’s your physical security or the security of your data, you can take precautions around major events so you do not make it easy for criminals to take advantage,” says Sinno.
Public safety and the protection of property initiatives led the city of Mankato, Minnesota to deploy a city-wide IP-based video surveillance system. Founded in 1852, the city is the seat of Blue Earth County. It encompasses 18.26 square miles of land and water, and supports a population of about 41,000 (2015 US census estimate). Home to a variety of natural landmarks and higher educational institutes, Mankato provides a dynamic lifestyle for its citizens all year round. Surveillance For Key Community Areas The new city surveillance system uses a range of Arecont Vision megapixel cameras to cover key areas of the community, with the largest concentration of cameras deployed in the popular downtown entertainment district. Surveillance is also in place throughout Mankato’s city hall, civic event center, shopping areas, parking ramps, public safety center, municipal water plant, public work center, regional airport, and for multiple public parks and community streets. The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project. The original system NVR supported primarily analog technology cameras, with a small percentage of early generation IP cameras supporting only JPEG video. The image quality of megapixel cameras could not be matched by this system, nor could it be cost effectively grown to address city requirements. In order to enjoy enhanced security, increased public safety, and the protection of property, a more modern and capable surveillance system was required. The city thus engaged security and communications integrator WW Communications to design and deploy such a project.The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project WW Communications WW Communications’ COO Mike Bales led the effort and selected Arecont Vision’s IP megapixel cameras as the core of the new project. With regards as to why Arecont Vision was selected for the project, Bales explained: “A variety of factors led to the use of Arecont Vision, not least of which was the commitment and quality they provide as an American-based manufacturer. They are one of the few vendors who design and build their cameras in the U.S., and their cameras’ features and reliability reflect that.” Delving further into what features specifically appealed to them, Bales concluded, “Simplified installation features such as remote focus, along with advanced features such as true WDR (wide dynamic range) were key factors in the decision. Additionally, the SurroundVideo camera series’ cost effectiveness and coverage capabilities placed Arecont Vision ahead of its competitors for the job.” SurroundVideo cameras were first designed and pioneered in the surveillance industry by Arecont Vision in 2006. Now in their fifth generation, they provide non-stop coverage with four individual megapixel sensors for superior situational awareness and image quality while reducing the total number of cameras required for surveillance projects. After deciding on a manufacturer, Milestone Systems was then brought on as the video management software for Mankato’s new surveillance system. Arecont Vision and Milestone are proven integration partners, having completed thousands of seamlessly-integrated city surveillance projects around the world. Arecont Vision And Milestone Systems Additionally, Milestone is a top-tier participant in the Arecont Vision Technology Partner Program and its VMS software is among those used in Arecont Vision’s MegaLab. “The close technology and support integration between Arecont Vision and Milestone helped ensure that a best-in-class surveillance system was delivered to the Mankato,” commented Bales. “The result is a single system for the city that is second to none in capabilities and can grow with the community’s needs.” The surveillance system has exceeded the expectations of the city to protect both people and property City Surveillance Project Phases Phase one of the project included deploying thirteen cameras to the newly-built public safety center. Phase two resulted in the deployment of thirty-seven cameras to the city’s entertainment district. The effectiveness of these cameras led to additional installations at city sites which greatly assisted in reducing common vandalisms and other public safety crimes. Phase three of the project involved the installation of twenty-three MegaDome 2 single sensor cameras onto the fourth floor of a brand-new, four-story parking facility in the downtown area. Surveillance of the structure was further enhanced through use of a SurroundVideo Omni — a unique omni-directional camera introduced to the industry by Arecont Vision in 2014. Unmatched Surveillance Capabilities The Omni camera series offers four megapixel sensors that are mounted on three-axis gimbals inside a low-profile dome enclosure. The sensors can be individualized to cover virtually any direction, providing unmatched surveillance capabilities with a single high-resolution camera that is fully integrated with the VMS. With the recent Public Works Center campus construction project, another three MicroDome G2 and five SurroundVideo Omni cameras were added to the city’s overall surveillance system. Five SurroundVideo Omni cameras and MicroDome G2 cameras were also installed along a pedestrian walkway that stretches from local hotels to the city’s civic center and entertainment district. The system is expected to continue growing in order to address public safety and property protection concerns as they arise. Security And City-Wide Situational Awareness After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime Depending upon the location and local requirement, the Mankato’s city surveillance system uses a range of Arecont Vision cameras. These include single sensor 2 – 5MP MegaDome 2 and MicroDome G2 cameras. 20MP SurroundVideo multi-sensor cameras provide 180° situational awareness coverage, while omni-directional SurroundVideo Omni G1 and G2 cameras cover an even wider range of deployments. The city surveillance system is managed and monitored from a command center with a multitude of large screens displayed across a wall. “The surveillance system and the screens are critically important during high-traffic events in the city,” said Mr. Bales. “With three colleges here in town, homecoming is a very busy time of the year. There are also numerous festivals that take place in the city combined with a very dynamic downtown. Our staff is able to view the activities as they happen, enhancing security and city-wide situational awareness.” Video Streaming To Cellphone Devices It is not just the security center that can monitor this system either — video can also be streamed to cellphone devices and can be monitored for official use all over the city. The system provides public monitoring as well. There are about half a dozen locations downtown with indoor walkways and skyways that are covered by Arecont Vision cameras with live video, providing the public with supplementary awareness and security. The surveillance system has exceeded the expectations of the city to protect both people and property. An example of the system’s usefulness was evident in a recent incident that made national news. After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision cameras were crucial in solving the crime. The city surveillance system caught the incident on camera, providing detailed video evidence which assisted law enforcement in proceeding accordingly. The cameras prompted the ideal outcome in an unfortunate situation, helping make the legal process more efficient and serving to greater deter the occurrence of future incidents. When probed on how the system has performed to date, Bales responded that Arecont Vision “exceeded the expectations.” Arecont Vision looks forward to continuing this legacy throughout its work with the City of Mankato.
Trust and track record are vital attributes in any locking system designed for critical infrastructure. French water utility Eau de Valence set themselves a challenge upgrading an old-fashioned mechanical locking system. They demanded access control that could manage multiple and dispersed utility sites; perform reliably outdoors in any weather; and log and monitor all system users from a single control point. CLIQ® key-based access control technology from ASSA ABLOY was the solution. PROTEC2 CLIQ® Mechatronic Locks Eau de Valence selected PROTEC2 CLIQ® mechatronic locks with mechanical disc cylinders and encrypted electronics. ASSA ABLOY partner AC Pro installed around 40 programmable PROTEC2 CLIQ® cylinders and padlocks across Eau de Valence sites, and issued 20 battery-powered keys, one for every authorized user. Now, a comprehensive audit trail for every lock and padlock is available on demand, so monitoring the frequency of contractor and other key-holder visits is easy. It is straightforward to tailor anyone’s access rights by restricting key validation to specific times or dates, if needed. Removing access permission from lost or stolen keys is easy with the CLIQ® admin software. Weekly mandatory key revalidation provides yet another layer of security. Updating Key Access Permission Five Eau de Valence keys are also equipped with CLIQ® Connect technology, to allow supervisors to update their key access permissions on the move, via Bluetooth and the CLIQ® Connect app, in the event of a problem arising when they were away from base or on-call. With CLIQ®, power to each cylinder is supplied by a standard battery inside every CLIQ® key, so installation was fast and cost-effective. There’s no wiring at all — making it an ideal retrofit solution for doors and padlocks at sites where connecting mains electricity is difficult or impossible. “All the energy is in the key,” says Christophe Nublat, Head of Study and Works Division at Eau de Valence. “There is no power supply to the lock, and therefore very little maintenance.” In addition, CLIQ® padlocks can handle weather extremes and secure almost any opening, making the CLIQ® solution much more adaptable than standard electronic access control systems. It is also easy for Eau de Valence to manage mechanical and electronic locks in the same installation: “The electronic and mechanical cylinders are managed by one and the same key,” adds Christophe Nublat. Encrypted Lock And Key Communications Despite all this extra convenience, there have been no compromises on site security. Communications between lock and key are encrypted. Because there are up to 1.97 billion unique key combinations, there is unlimited scope for any utility to design its own mechatronic key-based access system to suit its own specific needs — however challenging. This is why CLIQ® technology is already trusted to protect critical infrastructure sites all over Europe.
GRW is one of South Africa’s leading providers of sophisticated road transport trailers; designing, manufacturing and servicing a wide range of bespoke vehicles, each configured to provide a solution to the unique transportation needs of an individual client. GRW has now invested in a state-of-the-art IP CCTV system to protect its premises against unauthorized access and monitor the large, modern production facilities, and is already reaping the benefits from the integration of analytics with the IP cameras. GRW Transport Operations Founded in South Africa in 1996, GRW’s operations have always revolved around the transport of commercial goods. Whether it’s carrying petroleum, chemicals, temperature-controlled perishables, FMCG, pallets or bulk general cargo, the trailers manufactured by GRW are specifically designed to meet the individual transportation requirements of customers throughout Southern Africa, the Middle East, Australia and the UK. All the company’s products emerge from its large, ultra-modern manufacturing complex in Worcester, in South Africa’s Western Cape. As well as housing the extensive production facilities and spare parts department, the facility is also home to GRW Services and GRW Financial Services, which are responsible for worldwide customer care and after-sales contract servicing and the supply of rental units. Surveillance of the perimeter of this large facility and protecting the plant from unauthorized access was a key security concern for the company. However, manned patrols of the perimeter proved ineffective and Sensor Security was tasked with designing a solution that would automate the process of securing the boundary and eliminate the possibility of human error. At the same time, GRW recognized that an intelligent camera infrastructure might enable remote monitoring of the production process and Sensor Security was asked to investigate.Surveillance of the perimeter of this large facility and protecting the plant from unauthorized access was a key security concern for the company Integration Of Analytics With IP Cameras “From the outset we knew that the proposed CCTV system should successfully serve a dual purpose, helping supervisors and managers monitor the workshop operations during opening hours and securing the perimeter 24 hours a day,” says Edmund Casaleggio, Sensor Security’s Sales Executive. “There was also a need to make the combined system as simple and easy to operate as possible, ensuring that operations staff had unrestricted access to the workshop video feeds while not being distracted by the security cameras and vice versa for the security officers, who are best served by complete concentration on securing the premises.” Following extensive consultations with GRW staff, the final design of the dual-purpose system involved a total of 18 Hikvision cameras, eleven on the perimeter and seven in the workshop area, all feeding in to a 32-channel Hikvision NVR at GRW, and to Security Sensor’s control room. “GRW was actively involved in the whole consultation and design process, right from day one, with suggestions on key sites needing monitoring and protecting and information and advice on the flow of work and personnel around the workshop area” continues Edmund Casaleggio. “This was hugely beneficial and one of the main contributory factors in the successful installation. In my experience it is always more challenging, risky even, to install any security-related system without sufficient input and collaboration from the end-user client.” A Smart Perimeter Perimeter patrolling with guards having proved ineffective, GRW was also keen that the introduction of cameras did not mean that an individual would have to be assigned to constantly manage the CCTV system around-the-clock. Therefore, the Hikvision DS-2CD4012F-A Smart 1.3MP low-light box camera was selected to monitor the perimeter of the plant, with active use of the cameras Smart Analytics intrusion flags ensuring that GRW’s security officers and Sensor Security’s control room are pro-actively notified of any unauthorized movement around the premises. According to Edmund Casaleggio, “The integration of analytics with the Smart IP CCTV cameras is a significant added advantage, flagging alarms only when intrusion occurs within the specified range. We do not have to use alarm inputs and outputs to connect passives and actives on the DVR/NVR, which saves significantly on maintenance of the system. It also reduced installation time significantly. What’s more, the accuracy of these Smart cameras with analytics is far better than beams, as long as the cameras are correctly calibrated when installed. In this regard, the Auto Back Focus on these Smart cameras greatly assists the installation technicians to achieve the best possible viewing quality.” As well as the Smart Intrusion Detection, the Hikvision DS-2CD4012F-A also features Smart Codec, Smart Focus, Smart VQD, Smart Face Detection and Smart Audio Detection. They also benefit from 3D DNR and Digital WDR, and the Day & Night IR cut filter allows successful video operation down to 0.001 Lux. Remote Monitoring Of Perimeter And Workshop Seven Hikvision DS-2CD2132-I 3MP Mini Dome Cameras keep watch over all operations in the workshop area, assisting the supervisors and managers to remotely monitor processes on the floor. This process is made much easier and more efficient for these staff due to the integration of the Hikvision DS-9632NI-ST 32-channel NVR with a PC, ensuring that operational staff are only presented with images relevant to the production area.GRW is already reaping the benefits from the integration of analytics with the IP cameras and is set to continue for many years" “The full HD, 1080p real-time video is a huge asset for the supervisory staff and the camera itself, protected within its IP66 vandal-proof housing, has withstood the rigours of a harsh industrial environment really well,” continues Edmund Casaleggio. “True day/night operation thanks to its 30m IR range and Digital WDR and 3D DNR also contribute to the high-quality video at all times.” A Real Success “This newly-installed state-of-the-art IP CCTV system automates the process of protecting GRW’s premises against unauthorized access and monitoring the production facilities while eliminating the possibility of human error,” says Edmund Casaleggio. “GRW is already reaping the benefits from the integration of analytics with the IP cameras and is set to continue for many years. “At the same time, they are benefitting from the user-friendly nature of Hikvision’s technology. This deceptively “simple” platform helps GRW staff to operate the software easily with minimal training while Smart features, such as ABF, aids our technicians to achieve the best possible video quality. “However, the quality of Hikvision’s hardware and software does not come with an unaffordable price tag. In fact, since Hikvision’s iVMS-4200 software allows for the integration of analog and IP cameras free-of-charge, this serves to increase the affordability of their products. What’s more, the free Hikvision software allows the feeds from analog and IP cameras to be integrated on one screen. “In conclusion, Hikvision’s huge range of cameras, NVRs, DVRs and software allows us to propose unitary solutions to their security needs and to more successfully back-up and service the installation over many years. Quite simply, it is easier to provide post-sales service and support with a single, reliable brand.”
A five-acre logistics site in the UK blighted by break-ins and theft of diesel is now being protected by a system that includes a combination of 30 highly reliable detectors from OPTEX, one of the world’s leading detection technology manufacturers. Established in 1995, Intake Transport operates one of the largest fleets on the British road today with one main depot and three satellites around the country. The main depot experienced a number of incidents where diesel was being stolen directly from the tanks of the trucks, most severely over a bank holiday weekend when it was closed for three days. Each vehicle holds at least £600 worth of diesel, and added to the cost of the damage to the bespoke painted vehicles when intruders tried to enter the cabs and steal scrap metal from the trailer, the overall cost to the business ran into many thousands of pounds. OPTEX Intrusion Detection Sensors Eyewatch Security was approached by the Director of Intake Transport for a solution. The system designed by Eyewatch includes 30 OPTEX intrusion detection sensors to provide a layered protection around the site. Five AX infrared beams create a ‘virtual perimeter fence’ around the compound where the trucks are parked; six BX-80 outdoor PIRs provide a curtain of detection to protect the outdoor perimeter along the fence. Ten battery-operated high mount HX-80 sensors provide volumetric detection to secure the approach to the office building; and 25 VX-402 hardwired detectors add additional security at the entrance and around the rest of the site. The extensive system is linked to five cameras that are remotely monitored at Eyewatch’s HQ so that if an intrusion is detected, the incident can be ‘seen’ and responded to. Each of the Intake drivers is given a code to set and unset the system so that they do not cause any false alarms. System Success Richard Burgin, director of Intake Transport: “Since the system was installed, we haven’t had any attempted break-ins and no false alarms either, now that the drivers have become used to the routine. I am incredibly impressed with the reliability of the OPTEX detectors and the peace of mind this has provided us as a business. “Diesel and scrap metal theft has become a prevalent problem nationwide and in Scunthorpe, we are seeing many businesses suffering from similar problems as Intake Transport,” says Dean Bolton, Managing Director of Eyewatch. “We have now installed a top level security system that will protect the compound and all of the valuable trucks within it for many years to come.”
Customer Located in the Meadowlands and part of the MetLife Sports Complex in East Rutherford, New Jersey, MetLife Stadium is home to the New York Football Giants and the New York Jets. The $1.6 billion stadium was financed and built by a joint venture between the two teams, who operate it through the New Meadowlands Stadium Company. The stadium opened in April 2010 and boasts a seating capacity of 82,500, making it one of the NFL's largest stadiums. On February 2, 2014, MetLife Stadium played host to Super Bowl® XLVIII. Challenge MetLife Stadium wanted to replace 26 IP cameras located at the perimeter gates of the stadium and also to deploy 180° panoramic-view cameras in place of the 27 pan-tilt-zoom (PTZ) cameras that covered the exterior perimeter. Given the large crowds they attract, each football game, concert or other event has its share of unique challenges, including monitoring fan conduct, crowd management situations and dealing with medical emergencies. MetLife Stadium's main goal in upgrading its surveillance system was to ensure a safe, secure environment that would contribute to a memorable guest experience. Incident prevention and monitoring were additional key goals of the project. MetLife Stadium staff members are challenged with trying to determine what happened after an incident occurred. There are often various versions and accounts from those involved and from independent witnesses. Clear recorded video is needed to reveal what actually happened. Prior to the new camera system being installed, MetLife Stadium used four PTZ cameras to monitor the seating bowl area and these cameras were only used reactively when an incident came to the attention of the stadium's Command Center. With the new camera system, every seat in the seating bowl is monitored at all times. Being able to have their Command Center personnel go back in time and review everyone’s actions is an extremely valuable investigative tool for stadium security personnel and for public safety agencies. Among the stadium security management team's other goals are to identify and examine objects left behind, monitor security screening procedures, investigate slip-and-fall incidents, observe staff performance and provide surveillance for counter terrorism efforts. Solution Because MetLife Stadium was designed to be a network-controlled building, IP cameras were part of the original design. When it came time to install cameras to cover the seating bowl, IP was the only platform considered, according to Daniel DeLorenzi, Director of Security for MetLife Stadium. "To run an analog system would have been cost-prohibitive due to cabling, and the cables would be single-purpose. If upgrades were necessary, the project would have to be completed all over again," DeLorenzi said. The excellent image quality provided by the Arecont Vision megapixel cameras makes it possible for stadium security to identify individuals DeLorenzi and the rest of MetLife Stadium's security management team turned to Robert McCabe, owner of Corporate Security Services, Inc., located in Edison, N.J., to assist in selecting IP surveillance components and to design and implement the video surveillance solution. After a careful evaluation process, an optimal surveillance solution was built around megapixel imaging technology from Arecont Vision to ensure wide area coverage with extreme detail and to enable forensic zooming on live and recorded video. Corporate Security Services deployed more than 130 Arecont Vision megapixel cameras throughout MetLife Stadium, including MegaVideo® Compact 10-megapixel (MP) cameras located around the bowl of the stadium to provide a view of every seat in every section; SurroundVideo® panoramic 8MP cameras provide 180° coverage of entrances and common areas; and MegaDome® 2 3MP cameras with remote focus and wide dynamic range (WDR) are located in the stadium’s security entrance areas. Arecont Vision WDR cameras provide detailed video where bright and dark images exist in the same scene. The Arecont Vision megapixel cameras are controlled using Genetec Security Center, a unified video management system (VMS) which is monitored by a centralized security command center within the stadium. Arecont Vision worked with Corporate Security Services' designers to provide a layout of the camera locations required to cover the area, which McCabe says helped with the installation. In the end, all the cameras were installed in easily accessible and serviceable locations. Megapixel Benefit Because of the high level of detail it provides, one Arecont Vision SurroundVideo panoramic camera covers the same area as multiple IP VGA resolution cameras. By using Arecont Vision cameras to reduce overall camera counts, MetLife Stadium’s security team was able to achieve its goal of implementing an unobtrusive high-performance video surveillance system. With a reduction in the total number of cameras implemented, the system can be more efficiently managed. MetLife Stadium's policy is to initiate real-time recording 24-hours prior to game day, at which time every camera within the stadium is recorded at its full frame rate. Incidents are recorded prior to, during and for several hours after a game or other event. This allows the security staff to easily search and play back detailed video of any reported incidents from any of the cameras to determine what happened. Because of the high level of detail it provides, one Arecont Vision SurroundVideo panoramic camera covers the same area as multiple IP VGA resolution cameras The excellent image quality provided by the Arecont Vision megapixel cameras makes it possible for stadium security to identify individuals, and the high frame rates allow them to see actions that occur. Additional benefits of the Arecont Vision cameras include Day/Night video capabilities where mechanical infrared (IR) cut filters are used for clear images in low light, H.264 compression to reduce network and storage costs and Power over Ethernet (PoE) to reduce cabling costs. Arecont Vision MegaVideo Compact series box cameras are available in 1.3MP to 10MP resolutions with features that include dual H.264/MJPEG encoding, fast frame rates, privacy masking, pixel binning to increase light sensitivity in 3MP, 5MP and 10MP models, extended motion detection grid, flexible cropping and PoE. They are available in color and Day/Night configurations. SurroundVideo series megapixel cameras from Arecont Vision are all-in-one 180° and 360° panoramic solutions that are available in 8MP, 12MP WDR, 20MP and 40MP resolutions. Housed in environmental rated IP66 domes, the units feature dual H.264/MJPEG encoding, true Day/Night functionality, IR corrected megapixel lenses, privacy masking, extended motion detection, bit rate control, binning mode to increase light sensitivity in 12MP, 20MP and 40MP models, fast image rates and WDR in 12MP models. Arecont Vision MegaDome 2 all-in-one cameras with remote focus and remote zoom are available in 1080p, 3MP, 5MP and 10MP resolutions. Features include an IP66-rated / IK-10 impact-resistant dome chassis with a 3-axis camera gimbal for easy adjustment, dual H.264/MJPEG encoding, integrated megapixel vari-focal lens, optional WDR in 1080p and 3MP models, pixel binning in 3MP, 5MP and 10MP models, total PoE and optional IR illumination, audio functionality and heater kit.
Background Delivering the future of guarding through technology and expertise The emergence of high-tech virtual guarding as a powerful and cost-effective alternative to traditional manned patrol approaches is a direct realization of the promise seen in the industry’s most innovative and high-performing technology. Currently, emergent leaders in the virtual guarding space are those who successfully leverage guarding and security expertise and match it with the right technology to move beyond mere “remote monitoring” to true, comprehensive virtual guarding. The Arizona-based Surveillance Acquisition Response Center (SARC) has quickly staked out a place of leadership in the virtual guarding space—with its exclusive use of highly-trained security professionals with extensive law enforcement, military, and security technology background as operators—to deliver a pro-active guarding solution that leverages critical expertise and carefully cultivated relationships with clients and local law enforcement. This provides a second-to- none virtual guarding experience with an unsurpassed track record. When SARC needed a technology standard to power their virtual guard operations, they turned to IDIS for technology that is as powerful, reliable, and innovative as SARC itself. Challenges Next-generation security requires next-generation technology In the constantly evolving and progressing security market, it’s essential to deliver solutions that deliver a wide range of customizable options for solutions of any size, scope, or circumstance, while also keeping both the installation and user experience streamlined and simple for installers and operators. When selecting a technology standard for their virtual guarding operations, SARC needed simple IP configuration, while maintaining third party IPC support, to accommodate installers who had grown accustomed to analog installation methodologies. Maximizing flexibility to cater to each of their client’s needs was also a priority and any solution had to have surveillance components that were scalable, ONVIF® compliant, and were compatible with a wide range of third party products in order to build off of existing analog installations while still reaping the benefits of HD quality. Finding highest quality solutions with low maintenance requirements and no licensing fees—and resulting lower total cost of ownership for end users—was another requirement for SARC. Solution - IDIS DirectIP IDIS technology as a flexible and powerful force multiplier SARC leverage guarding and security expertise and match it with the right technology to provide comprehensive virtual guarding IDIS technology proved a perfect match for SARC. DirectIP™ is an optimized HD surveillance platform based on an IP framework consisting of a complete range of IP cameras, network video recorders (NVRs), network equipment, and client software, all offered as a complete package or available as individual, optimized components. The simple plug-and-play functionality and automatic network detection of DirectIP made the entire surveillance system quick and easy to set up for SARC’s installer partners, and centralized functionality allowed every IP camera to be installed without the need for individual configuration. The IDIS “future proof” guarantee further met SARC’s needs by guaranteeing backwards compatibility with future IDIS surveillance components, eliminating security vulnerabilities that come with hiccups in future system upgrades. The powerful video management software (VMS) options offered by IDIS also allowed SARC to provide its clients with a flexible and cost effective surveillance virtual guarding solution. IDIS Center is a completely license-free VMS, with no upgrade charges or annual fees, and, for more specific or complicated requirements, IDIS Solution Suite provided a powerful modular functionality, affordably customizable to any user need. Near identical user interfaces between IDIS Center, IDIS Solution Suite, and IDIS Mobile simplified the user experience and reduced training requirements for SARC’s operators, allowing more time for a laser focus on client needs and not wrangling technology. Results And Benefits Industry-leading surveillance technology that delivers for operators and clients alike Partnering with IDIS allows SARC to effectively meet the needs of their clients, decreasing costs while increasing reliability, functionality, and their own operators’ positive user experience. IDIS technology offers a level of simplicity and ease of use that has reduced installation times, decreased training requirements for clients and SARC operators alike, and helped make SARC’s security solutions for clients more affordable over the long term. The uncomplicated, intuitive nature of IDIS technology better allows SARC operators to focus wholly on delivering world-class virtual guarding to their clients. “IDIS understands that each end user is unique and they design the user interface of their applications in a way that just makes sense to use. The applications team at IDIS understands the concept of how important true UX [user experience] is and they apply it to their entire product lineup. IDIS Center and IDIS Solution Suite are so intuitive that we haven‘t had a single client contact us after their initial training for technical support.” said San Kim, Director of Operations, SARC Monitoring.
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
People are an essential component of any physical security system. Automation hasn’t taken over completely yet! But how has innovation changed the skillsets security operators need to operate systems effectively? The two elements – technology and manpower – must operate seamlessly and hand-in-glove to ensure that modern systems live up to their full potential. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?