Retail security applications
Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more. When they evaluated their security solutions in 2016, they determined they needed to upgrade the analog video surveillance systems in use at their existing locations and plan for new stores....
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer...
Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the c...
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent Video Solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabi...
Coop wanted a security system to protect a number of their valuable instore goods, such as home electronics, cell phones, and tablets, perfumes, and jewelry. They wanted a modular alarm system that could transmit reliably with the most modern means of communication to the standard alarm receiving centers in Switzerland. They also wanted a solution that had proven reliability and fast alarm detection, and that was certified according to SES EN standards. It was essential that this solution would...
With growing concerns over the COVID-19 coronavirus, Motorola Solutions and its Avigilon brand have released a statement on their decision to pull out of this year's ISC West. The trade show, one of the biggest in the security industry, hosts over 30,000 security professionals and over 1000 exhibitors each year. The company states: "After careful consideration, we have withdrawn from this year’s ISC West trade show due to the widespread impact of the coronavirus." Official sources of updates "While ISC West is one important opportunity to demonstrate the power of Motorola Solutions' video security and analytics portfolio, the safety and well-being of our employees, customers and partners is our top priority. We are grateful to the ISC West organizers for their understanding and look forward to attending and supporting future ISC West events." ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions, despite the concerns. A statement from the show organizers is as follows: "While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors."
ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions. Following is a statement from show organizers: We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies and are working diligently to ensure ISC West 2020 and our other events live up to our high standards. While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors. Close Monitoring Over the last few weeks, Reed Exhibitions and our partners in ISC West have been closely monitoring the COVID-19 virus and its impact on members of the global security community. We are collaborating closely with the Sands Expo Center and local public health authorities and following local, state and federal public health guidelines, including those issued by the CDC. We have additional precautionary measures in place, including enhanced cleaning and sanitization across all public areas and customer touchpoints in the show and we are constantly reviewing our health protection activities, public health messaging, hygiene and medical control measures with the aim of strengthening our COVID-19 response further in line with up to date public health advice and guidance, including that of the CDC. Health and Safety We will continue to provide updates on our website as we get closer to ISC West. The health and safety of our team members and guests is our utmost priority. Our policies and best practices are in close collaboration with our venue partner, Sands Expo Center. The Sands Emergency Management Team works closely with local officials and are taking appropriate steps to protect team members and guests as outlined by the Centers for Disease Control and Prevention (CDC) and the Southern Nevada Health District (SNHD). Sands is prepared to follow any additional protocols or guidance, as they are made available by the CDC or SNHD.
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionized the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-Speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognized”. By February 2021, all cargo shipments leaving, entering or traveling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognized their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognized their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organizations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. SureCloud’s Penetration Testing services have been CHECK approved since 2009 Minimizing risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organizations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognized ISO/ IEC 27001 for achieving operational excellence, minimizing the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
ExtraHop, the leader in cloud-native network detection and response, announced its top predictions for the cybersecurity and technology industries in 2020. Informed by insight from customers, partners and industry analysts and insiders, ExtraHop leaders predict a year of tool consolidation, headline-grabbing breaches and a shifting industry focus on what makes a successful tech start-up. The Year of Deeper Scrutiny for Fast-Growth Companies: “2019 was a tough year for heavily hyped, fast-growth companies going public in Silicon Valley. Several companies that raised huge rounds ultimately failed to deliver expected results or even approach profitability after they went public, and Wall Street was not amused. In 2020, we expect the investment community to more deeply scrutinize companies' financials and business fundamentals, ultimately leading to the support of companies who deliver on their promises, are capital-efficient with sound vision and innovation, and have truly sustainable business results and models to back them up.” - Arif Kareem, CEO File hashing has been the default mechanism for detecting malicious threat activity" Antiquated Threat Detection Methods like File Hashing and Signature-Based IDS Waste Time: “Since the 1990s, file hashing has been the default mechanism for detecting malicious threat activity, despite the fact that it's ineffective against modern attacks that use polymorphic or fileless methods to go undetected. The same goes for signature-based IDS, which are extremely noisy while providing very little actual alert context. Security teams will continue to rely on these antiquated methods of detection because they are expected to, regardless of how well they work in today's threat landscape.” - Jesse Rothstein, CTO and co-founder Accountability for the Ethical Use of Users’ Data: “Recent headlines tell of giant data corporations like Google and Facebook monetizing users' data and lacking sufficient transparency in these activities. There’s already been significant social backlash, but in 2020 we predict that users will demand companies not just follow the often-dated laws, but that they also do what’s right. Regulations like GDPR and CCPA are helping to bring more clarity around what’s appropriate, but 2020 will be the year that the industry is held accountable for the ethical, in addition to regulatory-compliant, use of personal data.” - Raja Mukerji, CCO and co-founder A Slowing Economy Will Force Tool Consolidation: “In security programs, it's been very difficult to turn tools off. What gaps will I create? What unintended consequences will I see? As the economy has rolled along over the last decade, most security programs have had the necessary funding to add new tools and retain legacy tools under the guise of risk management. Economic slowdown is likely to change all of that, as investments in new technology will require cost savings elsewhere. A tighter economy will finally cause us to pull the plug on legacy security tools.” - Bill Ruckelshaus, CFO A tighter economy will finally cause us to pull the plug on legacy security tools""Observability" Will Gain Ground as Both a Concept and a Vocabulary Term in Security and DevOps: “Observability is a term that several companies are using to describe the practice of capturing metrics, logs and wire telemetry, or sometimes other data sources, mostly in the DevOps space. The value of correlating insights from these data sources has gained enough ground that vendors need a word for it. Observability, The SOC Visibility Triad, and other terms have been spotted in marketing materials and on big screens and main stages at security and analytics conferences. In 2020, we'll see heated competition to control the vocabulary and mental models that enterprises and vendors use to discuss and market security best practices regarding gathering multiple data sources and correlating insights between them.”- John Matthews, CIO A Major Information Leak from a Cloud Provider is Coming: “In 2020, we are likely to see a major information leak from a cloud provider. While at the same time the cloud providers are providing many useful built-in tools, it's not clear that they are using their own tools to secure themselves. As a further prediction, the leak will not effectively diminish migration to the cloud. As we have noticed with other breaches, they do not significantly erode confidence in the services.” - Jeff Costlow, CISO 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers" The Wave Begins Towards Security Tool Consolidation: “Organisations will take a strong look at the number of security vendors within their ecosystem in 2020 to determine overlap and begin a move towards consolidation of tools. The winners will include those that have proven their API superiority and ability to work together within an organisation’s ecosystem. The losers will be those who have not proven their ability to strengthen core security.” - Chris Lehman, SVP of Worldwide Sales A Vendor Will Be Responsible for a Major Breach of Data Due to Phoning Home: “In 2019, ExtraHop issued a security advisory about the vendor practice of phoning data home and how this is happening without the knowledge of customers. The problem with this practice is that it expands the attack surface via which that data can be breached, exposing it to threats within the vendor’s environment. 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers. Regulations like GDPR have imagined exactly this type of scenario and laid out specific requirements for data controllers and data processors. But when such a breach occurs, it will have broad impact and implications.” - Matt Cauthorn, VP Security The Big IoT Breach is Coming: “In 2017, major ransomware attacks crippled the networks, and operations, of major global organisations. While those attacks did billions in damage, for the most part, IoT devices were left unscathed. But sooner or later, and probably sooner, the big IoT breach is coming, and it could have global implications. Whether it happens in the US or abroad, in healthcare, shipping and logistics, or manufacturing, IoT devices around the globe are fertile hunting grounds for attackers. Taking down every connected device, from telemetry sensors to infusion pumps to mobile points-of-sale, could easily grind operations to a halt.” - Mike Campfield, VP of Global Security Programs
Traka, from ASSA ABLOY Global Solutions, has integrated with Maxxess’ award-winning security management software, eFusion, to present users with a powerful route to achieving operational efficiencies across a wide range of systems and functions. Complete site control Traka, in conjunction with Maxxess Systems, has developed a seamless integration with Maxxess’ eFusion open platform, to allow complete site control, centralize site visibility and present real-time monitoring, ensuring situational awareness for all assets, safely and securely. eFusion with Traka makes it simple for authorized staff to gain access to a wide range of controlled assets, from keys and premises to high value equipment, vehicles and machinery. The new integration enables full traceability and audit reports that can include video and audio recordings, as well as transactional data from systems such as access control, intruder, HR and fire. eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems" Integration with third party systems Martin Woodhouse, Traka Head of Asia Pacific, Middle East, India and Africa (APACMEA), “Maxxess is one of the foremost global innovators within the security industry, its eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems. Now together with Traka, we can deliver a significant futureproof technology that paves the way for users to benefit from one all-encompassing building control system.” “The power of this new integration brings together Traka’s intelligent key and equipment management systems with eFusion’s flexible cloud architecture, developing a solution that will deliver exciting advances in security and operational efficiency.” “It will not only benefit major new build projects, but also open new opportunities for existing users of eFusion and Traka. We look forward to building on this exciting partnership with Maxxess, which we jointly believe continues to deliver real benefits to our valued customers.” Audit capabilities across key cabinets and lockers As with all Traka solutions, the integration with Maxxess’ eFusion presents audit capabilities across its key cabinets and lockers, and enables instant traceability and reporting. Other important features include fault logging, curfews and multiple authorizations, which provide tangible returns on investment by improving operational efficiency, increasing productivity and minimizing costly down time. Integration with eFusion opens the way for more powerful joint opportunities" Lee Copland, Managing Director, Maxxess EMEA adds, “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with many third-party systems - this integration with eFusion opens the way for more powerful joint opportunities to be developed.” “There are huge benefits to be gained from integrating Traka’s capability with wider functions and operations, including building management systems, security, fire and the many application-specific systems used by our customers in different sectors.” To see Traka’s integration with Maxxess eFusion in action, one can visit Traka in hall 2, stand G20 at Intersec Dubai, taking place at Dubai’s International Convention and Exhibition Centre from 19 - 21 January 2020.
Leap years occur every four years as a way to help synchronize the calendar year with the solar year, or how long it takes the Earth to orbit the sun. While this is necessary, leap years require our security systems to account for an extra day, apart from its normal schedule. As a result, leap years create problems with computing and can cause major issues to access control system functionality if a provider is not leap year compatible. There are a few things to keep in mind as we near February 29 to ensure you and your system are prepared for this uncommon occurrence. Why doesn't my access control system work on a leap year day? A leap year doesn’t occur that often, but if your system is newer than four years old, then this may be the first time you are being hit with this issue. It may be something as simple as the fact that the manufacturer of the system failed to account for leap day in their QA/testing procedures when designing the product. Regardless of the reasoning, it is important to recognize the issues that could arise so you can be prepared. An access control system malfunctioning never leads to a good outcome. What are some of the issues I could run into if my system isn’t leap year compatible? If you have your doors on a schedule, it could lead to doors being open on a Saturday or Sunday — which is the case this leap year — when they should not be open. This could naturally lead to unauthorized individuals gaining access to sensitive areas, putting company assets at risk. This could also lead to problems with credentials that were set to start or expire on a certain date, which could cause problems for new employees needing access, or could extend access privileges to contract workers whose employment terms have ended. In addition to credentialing, other scheduled events will also be off in the system. For example, some access control systems automatically lock or unlock doors on a set schedule based on business hours. With no defined schedules in place for a day that only occurs once every four years, this could lead to issues with scheduling for both authorized and unauthorized individuals. What can I do to ensure my system is ready for Feb. 29? Anything? If your manufacturer hasn’t alerted you that your system is leap year compatible, it is best to set up your system in a test lab and simulate the leap year date. This allows you to verify that all of your scheduling type events work correctly. If it works in a simulation, it will work on the actual day. However, beware waiting until the last moment to test your system, in case you do run into challenges that need to be addressed. Are there solutions available that account for this already? This is an important question to ask if you are evaluating a new system. While there are some systems that do not account for a leap day, many systems, like Hirsch Velocity, already do. In fact, Hirsch products have been leap-year compatible for many years now, allowing end-users to ignore the inconvenient day altogether. What if my system doesn’t? If you know for a fact that your system is not leap year compatible, ask your provider before that date to test and ensure that your system will work properly. If you do this and encounter scheduling issues, you can opt to push off all of your scheduled events until March 1 and validate scheduled doors being opened on February 29 to plan accordingly. While leap day is inconvenient, it is addressable. It is just important to do so early to catch any issues before they arise. Failure to acknowledge the challenges associated with leap years will inevitably lead to difficulties when the day comes.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
The software-based technology running today’s access control systems is ideal for creating custom solutions for very specific end-user needs. Those needs may vary from delaying bar patrons’ access to a shooting range to reducing the risk of diamond miners pocketing precious stones. The ability to tightly integrate with and control video, intrusion, and other equipment puts access control at the heart of enterprise security. Often, off-the-shelf access systems provide most of the features an end user requires, but due to their type of business, facility or location, some organizations still have unaddressed needs. That’s where a custom solution can fulfill an essential task. Custom solutions are frequently requested by end users or the reseller to expand access control to meet those needs. Here’s a look at some custom solutions designed for end users. Area & time-based access control The owners of a popular shooting range also operate an onsite, full-service bar, and the owners wanted to delay entry to the shooting range once a customer had consumed alcoholic beverages at the bar. The custom solution works with the access cards customers use to enter the range. When a patron orders an alcoholic beverage, the bartender presents the patron’s credential to a reader at the cash register. With each drink, the access control system puts an automatic delay on the card being used to enter the shooting range. An area and time-based control solution was created An area and time-based control solution was created for a major pharmaceutical manufacturer concerned with potential contamination between laboratories testing viral material and others designing new vaccines. If an employee uses a badge to enter a room with viral material, that employee can be denied access to a different area (typically a clean room in this case), for a customized period of time. This reduces the potential of cross contamination between ‘dirty’ and ‘clean’ rooms. The software can be customized by room combinations and times. Random screening A mine operator wanted to prevent easily portable precious stones from being taken by miners. The custom solution uses the access control system integrated with time and attendance software. As the miners clock in, the system randomly and secretly flags a user-defined percentage of them to be searched as their shifts end. Security guards monitor displays and pull selected employees aside. A nice feature of this solution is that the random screening can be overridden at a moment’s notice. For example, if the process causes excessive delays, guards can override the system to enable pre-selected miners to pass until the bottleneck is relieved. The solution has also been adopted by a computer manufacturer looking to control theft by employees and vendors. Scheduler The system automatically unlocks and locks doors A custom solutions team integrated a university’s class scheduling and access control software to lock doors to classrooms that are not in use. With the custom solution in place, the system automatically unlocks and locks doors 15 minutes prior to and after a class. The doors remain unlocked if the room will be used again within the next 30 minutes. Readers mounted at each door enable faculty to enter rooms early for class setup or to work in a lab knowing students or others won’t be able to walk in. Event management This solution simplifies the visitor check-in process, especially for larger events with multiple guests. Efficiently moving people in and out of events booked at a working intelligent office building and conference center required integrating the access control system with a web-based solution storing the names, email addresses and phone numbers of invited guests. Before an event, guests receive an email invitation that includes a link to a downloadable smartphone mobile credential. Upon arrival, guests present that credential to Bluetooth readers at the building’s gated parking garage. The same credential enables smaller groups (up to 50 guests) to enter the building through turnstile-mounted readers – also used throughout the day by hundreds of building employees. To avoid long lines for larger groups of visitors, the turnstiles are kept open with security guards using handheld readers to authenticate credentials as guests enter the lobby. Additionally, a third-party emergency notification system was added to this custom solution. Guests receive instructions on their smartphones should there be a need to shelter in place or evacuate during an event. The credentials and notifications are disabled as guests leave the building through the turnstiles. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution Similar custom solutions have been deployed at hospitals searching for a way to provide secure access to patients only expected to be staying a short time for surgery. Patients are emailed a mobile credential to access both the hospital’s parking structure and surgical reception area. They can also designate family members and other visitors to receive emailed mobile credentials. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution for patients and visitors. Custom solutions are about problem solving. It’s finding answers to needs not specifically addressed by an access control system. The robust software of modern access control systems enables the design of custom solutions to efficiently enhance security, save time and reduce redundant tasks through automated processes.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organizers globally have canceled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was canceled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theater offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local /national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
J.D. Power is a well-known name when it comes to measuring customer satisfaction, and they have been measuring satisfaction in the home security industry since 2016. Changes affecting the marketplace – both in terms of disruptors and technology – make this a unique time. For example, in 2019, J.D. Power expanded the Home Security Satisfaction Study to not only measure the traditional pro-install/pro-monitor companies, but to separately evaluate self-install/pro-monitor brands. “At J.D. Power our rankings are meant to support an industry in two key ways,” says Christina Cooley, J.D. Power's Director, @Home Intelligence. “First, we provide consumers who are shopping for products and services with a ‘report card’ of who provides customers with high levels of customer satisfaction. Second, we provide companies with actionable insights to help them prioritize their initiatives to improve and maintain high levels of customers satisfaction that drive loyalty and growth.” Differentiating between companies The traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another In home security, J.D. Power is in a unique position to report on the changes taking place in the evolving industry. The 2019 rankings show that the traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another, as each have their individual strengths and opportunities, but overall the score range is relatively tight. On the do-it-yourself (DIY) side, there is more differentiation. A set of brands has been able to challenge the traditional industry by achieving extremely high customer satisfaction levels. Price is always an important factor that impacts customer satisfaction, whether for security or another market J.D. Power serves. The equation is simple, says Cooley: Does the price paid equal the value the customer feels they have received from the product or service? “For Home Security, we didn’t specifically look at price until this year,” says Cooley. “With the changes that have occurred in the market, price can be a differentiator as we’ve seen with the emergence of DIY-installed systems. However, lower pricing does not have a direct relationship to quality of service.” The price factor For example, there are some higher-priced pro-installed brands that perform lower on customer satisfaction than lower-priced competitors. And DIY-installed systems as a whole are less expensive, and price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment. Price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment The equation is: Performance minus Expectations equals Customer Satisfaction. “Obviously, price point will be a factor in the purchase decision and the expectations the customer has about the product and service,” says Cooley. “Any pro or DIY system has the opportunity to differentiate the customer experience regardless of price point.” There are clear differences in the pro vs. DIY experience, which is why J.D. Power evaluates the brands in separate rankings. However, Cooley says the drivers of satisfaction are consistent across both groups. The key to each group goes back to the equation above. Evaluating the purchase process For the both pro and DIY companies, J.D. Power evaluates the purchase process the same. Though the customer may take a different path to purchase based on the offering they seek, the drivers are still the same: Usefulness of information provided Reasonableness of contract terms Professionalism of sales representative Ease of purchasing home security system. For installation, there are clear differences. DIY systems are evaluated based on: Ease of completing installation Quality of installation instructions provided Timeliness of receiving home security system. Pro systems are evaluated based on: Professionalism of technician Timeliness of completing installation Quality of work performed. Interestingly, purchase and installation are the customer satisfaction driver where both pro and DIY providers (as a whole) are most closely aligned on performance. Customer loyalty The price a customer is paying must align with the quality of the system they receive What drives a customer to purchase a home security system initially will often be very different than what will keep them as a loyal customer, Cooley notes. The price a customer is paying must align with the quality of the system they receive, and the service provided through the professional monitoring and customer service. “With the expansion of home security offerings, it’s more important than ever for home security companies to understand the motivations, intentions, and usage patterns across different customer segments to ensure that regardless of the decision to go pro or DIY-install, they are able to meet their customers’ needs and differentiate in the very competitive market. The J.D. Power Home Security Study provides these actionable insights.” The study is focused on the companies/brands that comprise the top two-thirds of market share in each segment, pro and DIY installed. A number of the brands included may work with local dealers or retailers for sales and install, but the customer is essentially evaluating those services as part of the system purchased. It is one and the same from the customer’s perspective, and the sales/install process can either delight or frustrate a customer from the beginning, which can then set the foundation for the entire experience moving forward. Reasons for shopping for a security system tend to differ between pro and DIY shoppers: Both sets are most focused on wanting a newer, more up-to-date system Between the two, pro customers are more often moving into a new home or wanting to take advantage of a discount or bundling opportunity with other products For DIY customers, they are shopping for a system to give them more peace of mind and to protect their property. Reasons for selecting the provider also vary: A pro company is often selected based on brand reputation or a special offer/promo A DIY company is primarily chosen based on price or a positive review. In terms of brand image, we see that customers see both pro and DIY providers similarly in terms of reliability. However, when it comes to being customer-driven, DIY providers receive higher image ratings compared to pro-installed companies.
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimize the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimize the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalized structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organization can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organization sells no products or services.
A combination of SMARTair devices — wireless, battery-powered escutcheons, cylinders and wall readers ensure security at the new Almelo building, thereby also ensuring that the demands of a busy mixed-use environment are met. Authorized employees can use offices and warehouse spaces they need; shoppers only access the retail areas of this new Witzand superstore. "This building is our showroom and must come with a modern access control system: SMARTair is the right system for us,” explains Kevin Hoitink at Witzand Almelo. SMARTair Wireless Access Control With SMARTair wireless access control, Witzand facility managers tailor the precise security levels they need for different areas of the building. It’s easy to manage and amend access rights for every site user, to ensure authorized employees come and go freely, while everyone else is kept out. The Almelo installation runs via an Update on Card system, which is ideal for premises with medium to high daily user traffic. With Update on Card management, administrators can set time-limited access rights and order audit trails when needed. Strategically located wall updaters provide a link between the software and the SMARTair-protected doors. It’s easy even for non-specialists to manage a SMARTair installation with the bundled, full-featured TS1000 admin software. Witzand’s new flagship building was awarded a score of 56.6% by the Dutch BREEAM sustainability certification program. Its employees, customers and valuable stock are kept safe by SMARTair. Learn more about SMARTair wireless access control system and visit: https://campaigns.assaabloyopeningsolutions.eu/smartair
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an exceptional dining experience not only with great food, but through superior service and an attractive atmosphere, Jang Su Jang employees will always do their best to provide the highest level of Korean cuisine and customer service.The primary objectives of a security overhaul are to monitor staff and provide overall coverage of dining areas as well as entrances and exits Management acknowledges that security plays a crucial role influencing sustainability of operations. The primary objective of a security overhaul including maintenance with camera additions and upgrades will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits. Solution By VIVOTEK VIVOTEK’s camera deployment was crucial to assist management in the day-to-day operations of the restaurant. Remotely monitoring employees, customer disputes, damage to customer property and car break-ins are all concerns upper management must address. Also, being able to monitor the main dining areas, assist hosts with seating and table occupancy and camera installations always provide security during non-business hours. Since 2015, management at Jang Su Jang restaurant have always wanted, at a security level, no blind spots left uncovered in the kitchen and dining areas. At the same time, it is critical to maintain the restaurant’s upscale design, making sure cameras are discrete but fully functional. The new video surveillance system features twelve VIVOTEK Network cameras including a 16-channel network video recorder, ND8401. A security overhaul will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits Perfect Fit For Overall Coverage FD816BA-HT 2 megapixel fixed dome network camera is equipped with a Full HD sensor enabling a viewing resolution of 1920x1080 at 30 fps. Featuring WDR Pro and Supreme Night Visibility technology, this camera can capture high quality and high visibility video in high contrast or low light environments.Armed with a removable IR-cut filter, VIVOTEK's solution can maintain optimal image quality around the clock As a professional day/night camera, the FD816BA-HT features a removable IR-cut filter as well as IR illuminators effective up to 30 meters for superior image quality around the clock making this camera a perfect fit for overall coverage of the main dining area. Following with the FE9191 H.265 fisheye network camera was used to cover the large banquet area. Covering 360° surrounding view, restaurant staff has no blind spots and can easily run the floor without having to constantly walk the area. The 12 megapixel camera guarantees superb image quality utilizing the latest in panomorph lens technology for 180°panoramic view (wall mount) or 360°surround view (ceiling/wall/floor mount). Armed with a removable IR-cut filter and WDR Enhancement technology, the camera can maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. Jang Su Jang’s kitchen area was outfitted with FE8174V, VIVOTEK fisheye network camera featuring 5 megapixels.The restaurant uses VAST as the central management software designed to manage all surveillance products Finally, the FD8134 fixed dome network camera completed the deployment and was installed at various exits and entrances, hallways and the cash register area. Specifically designed for indoor applications with its compact and stylish exterior, FD8134 allows discrete surveillance by capturing high quality, high resolution video. In addition to completely outfitting the property in VIVOTEK cameras, the restaurant uses VAST as the central management software designed to manage all surveillance products. VAST allows owners to operate their business efficiently on premises or remotely. VIVOTEK's Effective Solution “When we originally started improving our security system, we chose VIVOTEK cameras and were continually impressed with the quality and reliability, we continued to do upgrades as new VIVOTEK equipment was released. Delicious, quality food is not our only priority; safety is also fundamental to our business. Our staff and customers well-being is of immense importance and helps our business operations run smoothly,” said Manager of Jang Su Jang restaurant Brian Chung.
The large crowds that regularly flock to downtown Houston, Texas, known as GreenStreet, call for heightened security measures. However, the 570,000-square-foot mixed-use center needed to balance a high level of security while maintaining an open and inviting environment that accommodates numerous businesses, delivery drivers, service providers and others who need open access to the property. With an eye towards improving both security and efficiency, the property’s owners decided it was time for a system upgrade. Choosing Hanwha Techwin Working with Houston-based Today’s Integration Inc., GreenStreet evaluated offerings from a number of vendors before selecting Hanwha Techwin as its video surveillance solutions provider. The decision was based on the quality, functionality, versatility and expandability of Hanwha Techwin’s products. Through SSM, GreenStreet’s security personnel can also enter log notes to maintain detailed activity records Today’s Integration designed an advanced video surveillance solution built on Samsung Security Manager (SSM) video management software. The system allows GreenStreet’s security staff to monitor live and recorded video, control PTZ cameras and communicate via two-way audio from a central command center. The system employs multiple Samsung 5080R IP dome cameras, SNP-5200H PTZ dome cameras and 6084R fixed cameras. The system’s NVRs are located in a server room and are connected directly to cameras for recording and to SSM for video playback. Video is transmitted across GreenStreet’s network via hybrid fiber, connecting the multi-site buildings to distribution switches, which also provide PoE to the Samsung cameras also implemented by Today’s Integration, Inc. providing a turn-key solution. Implementing New Security Measures When vendors, contractors or service providers arrive at the bay doors, they press the intercom’s call button to contact GreenStreet’s security staff at the control center. Simultaneously, a live video feed pops up on-screen in the security command center, allowing staff to see and communicate with the individual at the door. Through SSM, GreenStreet’s security personnel can also enter log notes to maintain detailed activity records. The system has also proven effective in assisting the Houston Police Department, which requests video from time. Best of all, the video surveillance solution is easily scalable, allowing more cameras and NVRs to be added as GreenStreet continues to grow and expand.
Recent times have seen Saudi Arabia experience development at a remarkable rate, but key industry sectors have not always been able to keep pace. While certain industries grew by leaps and bounds (architecture, technology), others took longer to find their stride. Take, for instance, the retail industry; up until the early 2000s, Saudi Arabia was still new to the idea of North American shopping malls—most people still preferred shopping at traditional neighborhood convenience stores. Arabian Centres: Developer And Operator One company single-handedly changed that: Arabian Centres. Founded in 2002 as a subsidiary of the Fawaz Alhokair Group, it is the developer and operator of 19 malls in highly-populated cities, with over 1 million square metres of gross leasable area (GLA) under its management. This makes Arabian Centres the largest mall operator in the Kingdom. It has been an unprecedented change in the retail landscape of Saudi Arabia, and it shows no signs of stopping, with an additional 12 malls currently in development to help Arabian Centres reach its goal of 2 million GLA in the next 3 years. But just a few years prior, Arabian Centres was facing a significant challenge to its future operations: Security compliance. Upgrading Security Systems In 2015, changes in local security laws required Arabian Centres to upgrade their security systems across all 19 malls. Local security standards for video security in retail establishments increased, requiring higher image quality and performance. Arabian Centres needed to meet those new requirements quickly to ensure their malls were up to code in order to continue operations.Local security standards for video security increased, requiring higher image quality and performance Arabian Centres needed a partner that would not only help them satisfy applicable legal requirements, but also provide them with the hardware and software to meet their own personal standards of quality as a top-ranked market entity. Moreover, with 19 malls currently operational and more coming in the future, any security solutions they adopted would have to be scalable and versatile enough to meet a wide variety of unique scenarios. Upgrading To Avigilon Beginning in 2015, and continuing to the present day, the overall video security system of Arabian Centres has been upgraded to the Avigilon security solution. In the first phase of upgrades, Avigilon security solutions were installed in 12 of the 19 malls; for phase two, the remaining seven malls will be upgraded with Avigilon solutions, with all malls expected to contain Avigilon solutions by 2018. Avigilon solutions that have been implemented: HD Dome Cameras – superior image resolution, self-learning video analytics and excellent low-light performance HD Pro Cameras – with up to 7K (30 MP) resolution, this camera line captures detailed images over vast areas and provides wide area coverage options Avigilon Control Center (ACC) Enterprise video management software – enhances the way security professionals interpret, manage and interact with high-definition security video Network Video Recorders (NVRs) – Avigilon NVRs include pre-installed ACC™ software, high-performance recording technology, and a three-year Avigilon warranty with dedicated support The Avigilon security solution provides higher image quality and performance at a lower cost of ownership As the new video security standard, each Arabian Centres mall features an average of 350 Avigilon cameras, including HD Dome and award-winning HD Pro cameras, network video recorders, and Avigilon Control Center™ video management software. The Avigilon security solution provides higher image quality and performance at a lower cost of ownership than previously installed systems. By utilizing Avigilon 5K (16 MP) HD Pro cameras in their parking areas, it allows operators to cover the same area in greater detail with fewer cameras installed. With the adoption of Avigilon security solutions, Arabian Centres met all security compliance laws across Saudi Arabia. Avigilon cameras provide the image detail and quality that police required, and Arabian Centres passed their inspections without issue.
Located in the Capitol Hill neighborhood of Seattle, the historic two-story brick and timber commercial building at 115 Belmont Street is surrounded by apartment complexes, coffee shops, and other commercial establishments. The building was renovated and upgraded in 2002 to make it more attractive to potential tenants. It is currently the home of a Seattle Goodwill® Industries store. Effect Of Graffiti On Property Value Retailers, shoppers, and residents in this area of Capitol Hill face a number of security challenges, including vandalism and theft. One of the most pressing issues is the problem of graffiti. The Belmont Street building was a prime target for graffiti vandals, known as “taggers.” The cost of graffiti cleanup is substantial and few perpetrators were being apprehended. Graffiti can also encourage a serious snowball effect as its initial appearance in a location may attract more graffiti and crime. This was the case with the Capitol Hill building. Retail sales were negatively impacted and the property’s value was jeopardized. Arecont Megapixel Solution Sequoyah Electric and Network Services provided the property owner with a solution to help resolve the recurring graffiti problem. By installing Arecont Vision® megapixel cameras, it was expected that the surveillance system would capture high resolution images of the taggers both during the day and at night, and provide the police with the evidence they needed to apprehend and prosecute the offenders. Five Arecont Vision® MegaDome® 2 vandal resistant 3 megapixel cameras were installed along with an ExacqVision video management system. Almost immediately, a tagger was caught on video defacing the building. The quality of the image allowed an identification to be made and the matter was handed over to the Seattle Police Department. After a few more taggers were caught on video, word quickly spread and the graffiti problem disappeared. Incidents of vandalism and theft were also captured by the Arecont Vision® megapixel cameras, and the detailed images provided the authorities with sufficient identification and forensic documentation for prosecution. The system was designed so that both the building owner and Sequoyah can remotely access live or recorded video with the ability to zoom in on footage for a closer look. A mobile app gives real time access as needed. The cameras are contained in environmental, vandal-proof housings and automatically switch from color to black and white recording in the evening. Assisting Authorities With Suspect Identification “The excellent resolution and frame rate of the Arecont Vision® cameras makes forensic review of the video evidence a snap. We are able to resolve facial detail and provide the authorities with quality images to assist with identification of suspects,” said Jon Tabler, Loss Prevention Systems Manager, Seattle Goodwill® Industries. Theft and vandalism may never be completely eliminated but with the Arecont Vision® megapixel cameras deployed with the exacqVision video surveillance software, the building owner and the authorities now have the tools to initiate prosecution while protecting people, property, and assets.
The Dahl Auto Plaza in Winona, Minnesota is part of an auto dynasty that first began in 1911, when Andrew H. Dahl began selling Ford Model T’s out of his general store in Westby, Wisconsin. The company is in its fifth generation of Dahl family ownership with over a century of growth behind it. Today Dahl operates three dealership campuses throughout the Midwestern United States that are home to Subaru, Hyundai, Mazda, Toyota, Chevrolet, Buick, GMC, Ford, and Lincoln automobile franchises. During construction of the Dahl Auto Plaza in Winona, the installation of a video surveillance system was a required part of the planning. Arecont Vision became the go-to manufacturer for all the dealership’s surveillance cameras. Video Surveillance System Challenge Winona’s Dahl is home to three different dealerships on a single campus — Chevy, Toyota, and the Dahl Used Car Express Service Center. The company needed a comprehensive video surveillance system to monitor its parking lots and service bays for traffic, customer flow, vehicle flow, vandalism, and theft. With a desired 15-16 camera limit to cover such a large amount of space, cameras with high image quality and flexibility were essential to the surveillance system’s success. No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series Arecont Vision Try-and-Buy Program The implementation of Arecont Vision megapixel cameras at Dahl Winona began with the use of Arecont Vision’s Try-and-Buy program at the recommendation of Russ Neitzke, President and Founder of systems integrator Digicom, Inc. Cameras selected for a Try-and-Buy trial can be returned by the systems integrator for a full refund of the purchase price if the customer is unsatisfied. The only cameras considered for the Dahl video surveillance system were Arecont Vision SurroundVideo Omni models after they were tested. “No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series,” Mr. Neitzke said. “As a result, no other surveillance camera manufacturers were recommended by Digicom, Inc. or would be able to so effectively cover the 15 acres of new and used vehicle display, public access, and vehicle service areas at the new Dahl Auto Plaza.” SurroundVideo Omni Unique Design The SurroundVideo Omni series features a unique, patented 360o track design. Each camera includes four individual megapixel (MP) sensors mounted in multi-axis gimbals that can be independently placed and aimed in nearly any configuration, allowing coverage to be highly customized to specific project requirements. With features like remote focus in the SurroundVideo Omni G2, interchangeable lenses and high-resolution capabilities (12 and 20MP) in both G1 and G2 series models, the versatility of this camera family is unmatched. For large open spaces such as those found at the Dahl campus, the SurroundVideo Omni series provides high resolution, omni-directional video in a rugged, low profile enclosure suitable for both indoor and outdoor use. The cameras are IK-10 impact resistant and IP66 environmental rated against dust and water, making them ideal for Dahl’s requirements. Reduced Need For Multiple Cameras Most critical for Dahl were the SurroundVideo Omni series benefits of low maintenance, high video resolution, and the ability to reduce the number of cameras required for full situational awareness throughout the campus. The SurroundVideo Omni 12MP models selected include Wide Dynamic Range (WDR) technology, which aids in producing high quality, clear images even in challenging light situations. The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money With Digicom Inc. designing the surveillance and installation plans, Dahl was in good hands. Dahl selected the SurroundVideo Omni series, reaping the significant benefit of reduced installation time. Each sensor gimbal in a SurroundVideo Omni is magnetically set in place around the 70+ placement-point omnidirectional track and then quickly locked down during installation. The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money on both camera cost and installation requirements. Without the need for the constantly moving parts of a legacy Pan-Tilt-Zoom (PTZ) camera, there are no parts, gears, belts, or motors to wear out and to require maintenance in the SurroundVideo Omni series. This reduces ongoing operational costs. This makes it easy for the installer to arrange an ideal coverage layout. Another significant selling point for Dahl was that each SurroundVideo Omni camera requires only a single IP category 5 PoE (Power over Ethernet) cable, which reduces both complexity and installation cost. ExacqVision VMS Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets. Arecont Vision Technology Partner Program member ExacqVision is utilised for the video management system (VMS). A single ExacqVision VMS license is required for each SurroundVideo Omni camera, while providing four high-definition video views. Arecont Vision cameras are certified with ExacqVision and the VMS is installed in the Arecont Vision MegaLab™ to enable ongoing collaboration between the two companies and to ensure the best possible integration and support for customers. Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets Arecont Success At Dahl The Arecont Vision SurroundVideo Omni cameras at Dahl have been a great success, with high customer satisfaction. “Basically,” Mr. Neitzke stated, “The coverage that you get with the SurroundVideo Omni is really like buying four cameras in one.” Being able to effectively cover Dahl’s range of campus requirements with fewer cameras and lower purchase, installation, and operational costs meant that Arecont Vision has hit all the required marks for this project, according to Mr. Neitzke. The system has performed incredibly well, with few issues from the end-user. On the rare occasion when an issue has popped up, the Arecont Vision team has been responsive to the customer’s needs, providing technical support, advanced replacements, or any other kind of assistance Dahl has needed for the surveillance system. Future Projects Arecont Vision and Dahl are now planning a second, even larger project at Dahl’s campus in downtown La Crosse, Wisconsin. Dahl plans on upgrading this campus with a new surveillance system for indoor and outdoor spaces with Arecont Vision cameras. Digicom, Inc. and the Arecont Vision Field Application Engineering groups are developing a campus-wide plan for this next project. SurroundVideo Omni will be ready to be deployed yet again whenever Dahl needs it.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload