Transportation security applications
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container s...
Leon Medical Centers is a privately-owned healthcare organization with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighboring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organizations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’...
A video surveillance system with around 40 IP and thermal cameras from Dahua Technology has been installed at Yarmouth Harbor on the Isle of Wight. The harbor consists of a large marina, docks for the Wightlink Ferry terminal, and pontoons and boat moorings upstream. The previous system was becoming outdated, with poor picture quality and cabling issues. Following a number of thefts from boats and boat fires in neighboring harbors, a new solution – including a thermal imaging capability &...
Recife’s urban trains system carries around 400 thousand passengers a day – it is the third largest railway operator in number of users in Brazil. To ensure a safe journey for passengers, it is imperative to increase the subway security with modern technologies and monitoring equipment. The main challenge was to adapt the technology to the specific conditions such as lighting, people flow and speed of a subway station while not interrupting the transportation service. Therefore, eas...
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It,” will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing." Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams,” competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun.” The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modeling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
From humble beginnings providing bus services along the New South Wales and Queensland coasts in Australia, Transit Systems has not only gone on to become one of Australia’s biggest public transport providers, but has also made significant inroads overseas, having purchased several bus routes from the First Group London, United Kingdom, in 2013. Employing over 2500 staff Australia-wide, Transit Systems operates from 26 depots and terminals, with a fleet of 500 buses and 40 ferries. When Quorum Security Systems were approached by the company to install an access control and surveillance system at their newest Sydney depot, they were able to develop a multi-faceted solution providing far more than just security. More Than Just Security The Sydney-based security integrator Quorum Security Systems, twice named MOBOTIX dealer of the year in 2014 and 2015, are strong proponents of a consulting-based approach to design. "After a series of meetings and site visits, we created an extensive business case with the client, along with detailed ROIs. This was then developed into a totally bespoke system, which went far beyond security," explains Chris Pearson, Managing Director at Quorum Security Systems.It became clear that an integrated approach using IP surveillance cameras would best serve to improve services and cut costs "Surveillance is fast leaving behind its traditional role of securing premises against unlawful entry,” he adds, “moving increasingly into the spheres of risk mitigation, compliance monitoring and process management." Working to identify the core needs of Transit Systems, it became clear that an integrated approach using IP surveillance cameras, along with access control and fleet tracking technology, would best serve to improve services and cut costs, while offering a clear audit trail along the way. An Integrated System MOBOTIX IP cameras were integrated with a sophisticated access control system incorporated with long-range RFID readers with prox-boosters to allow dual custody-tagging of either buses and drivers, or buses and routes. Armed with a wealth of fully traceable real-time information, Transit Systems were now able to streamline and enhance their business and operational processes, saving both time and money. Surveillance monitoring is ensuring that buses are refueled before leaving the depot and that any vehicle damage is always reported, a comprehensive record of driver and vehicle movements is used for dispatching and scheduling purposes, and OH&S compliance is enforced, with the footage also serving as proof that due diligence has been carried out. In addition to this, payroll time and attendance has also been automated. Surveillance monitoring is ensuring that buses are refueled before leaving the depot and that any vehicle damage is always reported The installation also doubles up as a PA system, which is essential for mustering on a dangerous goods site and also extremely useful communicating with staff over such a large area. Simple Installation Easy to install and configure, with low power and network bandwidth consumption, the MOBOTIX cameras offered just the flexibility, functionality, and high image quality required to achieve effective coverage throughout the depot. The versatile mounting of the S15 camera, with its dual lenses each connected to a cable of up to 2 meters, means vehicles sitting in the fueling bays or repair docks can be monitored from all sides. An M15 camera with a long-pass filter and ANPR (Automatic Number Plate Recognition) technology, records the license plate of every vehicle that leaves and enters the depot, and hands-free entry and exit both increases site security, safety of drivers and reduces manpower requirements. Furthermore, the cameras provide a fool proof real-time backup of all movements recorded by the access control system for auditing and compliance purposes.The cameras provide a fool proof real-time backup of all movements recorded by the access control system for auditing and compliance purposes A Wireless Solution The MOBOTIX decentralized concept makes this easy because the recordings are compressed and stored on the SD card inside the camera, so the bandwidth required to transfer the images to the NAS is very low. Indeed a MOBOTIX system can support up to 10 times more cameras per server compared with a centralized VMS-based recording system, requiring no additional computers. Retro-fitting such a large installation into the purpose-built depot was not without its challenges: "You’re talking about 2 foot thick concrete slabs in the bus bays throughout the whole depot. Cabling through the concrete was unfeasible from a financial and time point of view," Chris explains. "The MOBOTIX cameras were powered from existing poles inside the depot and we used a ubiquity Wi-Fi to transmit the footage back to the NAS." This innovative surveillance and access control system has enabled Transit Systems to monitor the behavior of vehicles and people throughout the depot, bringing a significant increase in effectiveness, efficiency and safety. With Government funded bus routes incurring penalties for failing to meet on-time targets by at least 9%, this achievement promises further financial savings. Equally, because the video surveillance system footage provides protection against negligence claims by proving due diligence, expensive litigation proceedings can be avoided. The role of security is evolving and this example shows one of the many diverse ways in which security can be applied to modern business practices to make operations more efficient and economical.
Mirasys Video Management Solutions are being utilised in a number of transport projects which include ports, motorways, airports, trains and logistic centres. Each project needs a highly adaptive solution which adapts to changing requirements, technologies and regulations, and provides unlimited scalability and high reliability. Mirasys VMS Increases Efficiency The transportation sector provides a great example of how an intelligent video management system can increase the efficiency of activities, safety, and ensure smooth-running operations. Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems. Mirasys VMS includes a number of intelligent features. Playback and powerful search tools identify incidents quickly and efficiently. The intuitive storyboard function helps in reporting events and incidents and high quality images can be used for evidence. Advanced motion detection and alarm event settings let you decide what you want to track; reducing operational costs and the number of false alarms. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic Mirasys Video Content Analytics Mirasys VCA (Video Content Analytics) provides full VCA functionality with object classification and enter / exit, direction, vehicle speed, stopping, dwell time, etc. filtering. The setup is versatile and supports, for example, different type of vehicle classification, zone definitions, entering directions and vehicle speed. You have plenty of different analytic alternatives available per camera. The object that is being analysed can have several different analysis rules active simultaneously. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic. You can, for example: Tighten platform security Improve crowd management Identify people and any unusual behaviour such as running Identify abandoned objects Manage queues and staffing level Control the number of vehicles in the area Vast Integration Possibilities With Mirasys and its endless integration possibilities, you can speed up the logistic centre’s functions, transport management efficiency, and ensure the undisturbed flow of cargo operations. The use of Mirasys integrations will increase the value of visual information captured by the system, and bring significant cost savings. The information from video images can be linked to the information received from other sensors, also enabling the utilization of IoT (Internet of Things). Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights With Mirasys and its endless integration possibilities, you can speed up the logistic centre’s functionsWhen integrating a bar code reader with the video management system in a warehouse, the movements of each package can be searched and visualised. The images from cameras can be found immediately, which helps to determine the condition of the package at the time of entering and leaving the warehouse, and on which vehicle it is located. For each and every event, the system provides the exact time, visual information from a number of different cameras, and delivers event reports to specified recipients. This results in a clear decrease in the time spent in resolving customer complaints. Automatic Number Plate Recognition With the Mirasys ANPR+ (Automatic Number Plate Recognition) application you can automate the management and guidance of the vehicles in a certain area. For example, based on the number plate information the system can advise: Which loading bridge the vehicle is assigned to, Which driving lane the vehicle is assigned to, Driving through automatic weight-in-motion (WIM) is needed, etc. The system can monitor the vehicle on its way in and out, film it from the side, top, front and back and is therefore a great solution for vehicle damage control. Using integration to the automatic weight-in-motion (WIM) function you can also ensure automatically that the amount and type of product loaded on the vehicle is correct. Automate Operations With The ANPR+ Different organisations can use the same Mirasys system to manage their part of the surveillance and securityA forwarding company can book a space for its truck from a shipping company’s ticket selling system. When the truck arrives at the shipping company’s area, for example in a harbour, it is automatically measured, and if the measurements match the ticket, the truck is guided to the green lane. If the measurements deviate from the ticket data then the truck is guided to the ticket window lane. The measurement information will be sent automatically to the system optimising the ship loading. If a vehicle exceeds its allowed time to stay in one place, or deviation from the planned route of the vehicle is detected, the system will report an event. In harbours and airports different entities, such as Security, Police and Customs, need different information from the same system. Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights; simultaneous users are no problem. Information from different sources flows automatically between organisations, resulting in faster response times on investigations, and increasing the performance level considerably in handling the joint security issues. Decreased Total Cost Of Ownership Mirasys is an industry-recognised Video Management System provider. Limitless integration possibilities of the Mirasys VMS offer the freedom to build the system that serves your needs. Mirasys also gives you the freedom and possibility to connect several sites into one logical entity. The centrally managed Mirasys system allows you to add or remove cameras and servers, set users’ rights, manage live and recorded video and export evidence with a few simple clicks. The system can have centralised, de-centralised or mixed topology configurations.
German supermarket REWE Group's new full-range national warehouse covers 53,000 square meters and is situated in the north of Berlin. About 350 employees ensure that more than 355 REWE, nahkauf, Karstadt and Coop supermarkets — along with Hit self-service stores — are supplied with around 10,000 different items. The building is protected by a CLIQ® locking system which was planned and installed by the specialist security company Guett-Dern GmbH, based in Cologne. The Flexible Locking System Challenge Supermarkets between Sassnitz and Jüterborg will be supplied optimally with goods by the new logistics center, in which REWE invested around €60 million. Six days a week approximately 100 trucks transport fruit and vegetables, frozen foods and fresh foods such as milk, as well as the entire range of dry goods. More than €600 million invested in optimizing logistics, as part of a logistics offensive for the whole of Germany, made this expansion necessary.The goal is to make processes faster, more effective and more efficient and ecologically sustainable The goal is to make processes faster, more effective and more efficient and ecologically sustainable. The REWE Group was founded in 1927 and has built eleven new warehouses as part of this project, and has modernized three more. The Oranienburg location is viewed as the pilot project for all of REWE Group's logistics centers. REWE Group’s specifications in terms of security were defined accordingly: Entrances to the logistics center's buildings were to be equipped with electronic locks to enable them to be managed centrally and to integrate internal doors according to their requirements. A flexible locking system was to be incorporated to manage all access entitlements and locking hierarchies reliably according to individual responsibilities — meaning it must be tailored precisely to each individual. The CLIQ® Solution The choice was made in favor of the mechatronic locking system CLIQ®, which was installed by security specialists and ASSA ABLOY partner Guett-Dern. The CLIQ® system integrates advanced microelectronics into mechanical locking cylinders and their corresponding keys. Locking cylinders and keys can thus communicate with one another without the need for wiring or a network. This means that access and locking are doubly secured: via mechanical locking and electronic identity. The installation of the intelligent mechatronic CLIQ® locking system thus provides the building with an optimal level of protection.The programmable keys and cylinders of the CLIQ® locking system from ASSA ABLOY fulfill REWE's requirements “CLIQ® is easy to use and program,” says Dirk Müller-Steinhausen, Head of Technology and Sales at Guett-Dern GmbH. “For instance, because system administrators do not have to visit each locking cylinder separately in order to change the batteries.” Power is supplied exclusively via a standard battery in the keys and programming keys. Encrypted communication with the cylinder also takes place in this way. The programmable keys and cylinders of the CLIQ® locking system from ASSA ABLOY not only fulfill REWE's requirements, but also win thanks to their price–performance ratio. Each CLIQ® key has an integrated chip inside, making it unique. Keys can be programmed individually for each user. “This means that we have control of our keys. With CLIQ®, we have great flexibility in the event that a key is lost or if we want to make any changes. "We can revoke the key's access entitlements by reprogramming individually the approximately 400 locking cylinders in use,” explains Marc Haverkamp, Project Manager for the REWE Logistics Center in Oranienburg. At the same time, access authorizations can be enabled temporarily, including for workmen, cleaners and external service providers. Save Save Save Save
Every day, 150,000 parcels are transported by the French DPD group, which makes nearly 55 million parcels per year. E-commerce is growing the parcel business and, consequently, the transportation volume of parcel service and logistics companies. Online shopping would be unthinkable for the consumers without the speedy delivery of the ordered goods - therefore it is self-evident to keep track of shipments on their way to the consignee, in order to guarantee a correct delivery. DPD France Video Systems DPD France is part of La Poste Groupe, the largest parcel service provider in the country. The company operates numerous logistics depots, in which the consignments are collected, sorted and reloaded according to their destination. The timely transport of the parcel volumes, which are handled in the depots day by day, requires a high level of organization and a precise monitoring of all processes in order to be able to ascertain where a shipment is currently located. In order to cope with the high volume of shipments, the depots are equipped with state-of-the-art technology such as conveyor belt systems and scanner terminals, which allow the tracking of the route any shipment takes within the facility. On-schedule operations and reliable delivery are important quality criteria in the parcel logistics industry.DPD France has been using video systems for some time, which monitor the processes inside the depots For this reason, DPD France has been using video systems for some time, which monitor the processes inside the depots. However, these were mostly analog systems, which should now be replaced by modern IP-based video solutions in order to document the sorting and transfer processes of the packages, too. Search For A More Flexible System As part of the modernization, DPD intended to replace the old technology with more open and flexible systems providing extended search options in order to be able to track parcels as quickly as possible. The solution should be very reliable and, for the future, be simply expandable by additional camera channels to keep up with the growing volume of shipments. Furthermore, the software should be easy to use for employees, in order to avoid complex trainings and long learning times. The detailed and reliable dispatch tracking, as well as the surveillance of the depots to resolve cases of loss and to optimize the processes, were therefore set as project targets. The challenge of the project was also to secure the depots in compliance with TAPA - which mainly means monitoring all entrance and exit gates for at least 17 hours a day as well as motion-based image recording outside this period. The Qognify Cayuga software should be easy to use for employees, in order to avoid complex trainings and long learning times The Solution: Qognify Cayuga With the Cayuga product line, Qognify offers a powerful and flexibly extendable video management software that has been supplemented by the Qognify BVI Logistics module with scanner interface for the DPD depots in France. In addition, I/O modules are used in both depots to enable the transmission and reception of control signals. Among other things, doors and gates can be opened directly by pushing a button in the Qognify user interface. The expandability of the Multi Solution Platform allows new components to be added at any time - for example, to automatically capture and analyze the number plates of incoming vehicles. The video management software Qognify Cayuga sets itself apart from competitors by the openness and flexibility of the system as well as by the support of a large number of different camera manufacturers and models.Qognify Cayuga sets itself apart from competitors by the openness and flexibility of the system as well as by the support of a large number of different camera manufactures and models Successful Result In Warehouse Management System Based on Qognify Cayuga and Qognify BVI Logistics, all conveyor belts, entrance and exit doors as well as the entire interior zone are now being monitored with 280 HD cameras in Tours and 380 in Beaune. This means that the complete process of shipment processing from incoming parcels via sorting by destination through to handover to the delivery agent is seamlessly documented. The data from the video system is combined with the data from the various barcode scanners along the conveyor belts for detailed evaluation. It is therefore possible to determine at what time each individual parcel was located at which point in the distribution center. The installation of a total of 61 scanners from the manufacturer Sick ensures the monitoring of the conveyor belts, and these scanners export the barcodes from five viewing angles. On this basis, each parcel is tracked in the warehouse management system, assigned to the correct destination and, via a selector switch, forwarded to the right conveyor belt, which transports it to the appropriate loading bay. In the Qognify user interface, a special research view can be used to search for parcels using different parameters such as barcode or tracking number. The software visualizes the route of the shipment through the distribution center on the basis of video recordings, so that the user can compare all available data and can localize error sources quickly. Thanks to these options the clarification of damage or loss can be significantly accelerated. Patrick Cavoue from DPD France is satisfied with the result: “With the logistics solution from Qognify, we are able to track the route each parcel is taking in our depots without any gaps – right up to the handover to the delivery agent. The Qognify BVI client allows a targeted search without hours of searching through video footage and is therefore perfectly suited to quickly and efficiently identify loss or damage. This lowers our costs and ultimately leads to significantly increased customer satisfaction.”
Bialystok, a beautiful historic city of 300,000 in the northeast of Poland, is one of the nation’s major population centers. Devastated in World War II and languishing for a long period afterward, the city has seen a renaissance in recent years, with restoration of its beautiful architecture and modernization of infrastructure as the Polish economy has boomed. One particular change that has come upon this serene city with unexpected rapidity is the increase in car ownership, which has more than tripled in Poland since 2005. Over the last decade, the growing need for an up-to-date, comprehensive traffic monitoring system has become increasingly apparent. Surveillance Enhancement For Traffic Surges The growing need for an up-to-date, comprehensive traffic monitoring system has become increasingly apparentCameras were the most costly item within the traditional traffic surveillance system originally deployed in Bialystok. To capture as many angles as possible, large numbers of cameras were required, often several at each intersection. As well as being an eyesore, this also meant that the cost of linking and synchronizing the array of cameras to the central surveillance system was exorbitant. To avoid impacting traffic, which is heavy during the daylight hours, installation and construction work was usually carried out at night. The restricted hours for installation caused long delays in camera setups. Worse, the system itself no longer met the needs of the rapidly developing city. Despite the large numbers of cameras, the field of view of individual cameras was too narrow and when accidents happened it was difficult to try to piece together footage from several cameras in an attempt to reconstruct the incident. Often, there was no way to determine from the footage just who was at fault. A better solution was needed. Seamless Collaboration To Seamless Implementation Zarzad Dróg Miejskich (ZDM), the municipal unit responsible for the road system in Bialystok needed to revamp, simplify, and upgrade their inefficient traffic camera system, so they worked with systems software manager Siemens and engaged VIVOTEK’s local distributor Suma Solutions to come up with an answer that would meet their needs. Siemens developed the system software around technology provided by VIVOTEK, a provider of IP surveillance solutions, offers dedicated traffic surveillance and management solutions, and has recently released its remarkable FE8174V H.264 5-megapixel fisheye network camera. The hemispherical images captured on camera can be automatically retooled to conventional projection specifications for easy viewing The FE8174V is VIVOTEK’s fisheye network camera. This vandal-proof, WDR-enhanced, day/night camera features a detailed 5-megapixel resolution sensor with superior image quality. Its fisheye lens captures a 180° panoramic view when wall-mounted, and a stunning 360° surround view with no blind spots when mounted overhead. With its choice of display layouts—surround view, panoramic view, and regional view—it is the perfect solution for those who need coverage of wide, open areas as well as a high degree of flexibility. With the advanced image processing capabilities, the hemispherical images captured on camera can be automatically retooled to conventional projection specifications for easy viewing. As the camera’s primary application is outdoors and demands reliability in all conditions, a weather-proof IP66-rated and vandal-proof IK10-rated housing keeps the camera body clear of rain and dust and maintains functionality in all types of weather. The VIVOTEK FE8174V features a removable IR-cut filter, which is unquestionably the best choice for those who need a hardy, all-weather, 24/7 system with a full range of coverage. Enhanced Resolution Means Better Traffic Safety ZDM installed 130 VIVOTEK FE8174V cameras at intersections throughout Bialystok. Now, with far fewer cameras, traffic controllers can get a clear, sharp overview of the whole field without any blind spots.VIVOTEK’s fisheye camera dewarping capabilities allow monitors to adopt different presentation modes A single VIVOTEK FE8174V provides the coverage of four outdoor bullet cameras in one image, and has resulted in cost savings at the same time as providing more complete coverage. Fewer cameras has also meant a decrease in costs associated with the backend management platform, network communications equipment, and storage equipment; it has also protected the aesthetic properties of the city by decluttering the skyline. Further, VIVOTEK’s fisheye camera dewarping capabilities allow monitors to adopt different presentation modes. Now, Management Center operators can easily monitor and verify traffic incidents and use the image recognition software to increase traffic control efficiency. The city of Bialystok has finally achieved a traffic management and surveillance system that can keep pace with its rapid growth while remaining in harmony with the local culture and architecture.
Levels of security inside the Aviation industry have never been higher; mainly due to increased terrorism threat levels across the globe, combined with a worldwide rise in smuggling activity. No airport is immune from these pressures and Ghana’s ‘Kotoka International’ can now claim to meet ACC3, the highest accreditation in the aviation industry, thanks to their recent investment in the latest generation of IP CCTV systems from Hikvision. Ghana’s Kotoka International Airport Established in 1994, Aviance Ghana Ltd provides a range of ground handling services at Ghana’s Kotoka International Airport, situated just outside the capital, Accra. The airport itself is Ghana’s premier international flight center and is capable of accepting large aircrafts, such as the latest generation of Boeing 747.Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents It occupies more than 650 hectares, with two large terminals for domestic/regional and international/long-haul operations that are connected by an internal walkway. Terminal 2 is the principal international departure terminal and includes restaurants, duty-free shops and two Executive lounges for First and Business Class travellers. There are also two smaller terminals dedicated solely to diplomatic flights and military operations. Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents. At Kotoka, the ground services include managing all the passenger concourse facilities in Terminal 2, plus passenger check-in and baggage handling, the loading and unloading of cargo from freight flights and a cargo warehouse operation for all import and export needs. Overriding Security Objectives Given that today’s security concerns require the aviation industry to maintain very high levels of protection measures, close scrutiny of the 650 hectare site that the airport occupies and protecting passengers, aircraft and cargo were the twin key objectives for Aviance when deciding to upgrade the Airport’s CCTV system. The company also recognized that intelligently deploying the camera infrastructure would be necessary to maximize cost-effectiveness and efficiency.The new Skylink CCTV system design uses four different types of Hikvision IP camera Aviance Ghana turned to Skylinks Technical Services Ltd and tasked them with designing a solution that would enable it to meet the EU’s ACC3 accreditation, the highest accreditation in the aviation industry. In turn, Skylinks turned to Hikvision for the design of an all-IP CCTV system capable of not only meeting the current challenges facing Aviance in its operation at Kotoka International Airport, but also providing an expandable base that could rise to meet future developments. The new Skylink CCTV system design uses four different types of Hikvision IP cameras connected to a 32-channel, RAID 5 NVR over an entirely new Gigabit network infrastructure. According to Haim Atanelov, Skylinks General Manager, “The final brief for the CCTV upgrade included installation of new cameras in Aviance’s import and export cargo warehouses, both entry and exit vehicle gates, within the terminal public areas, at the biometric log-in area and associated turnstiles, and within the VIP lounge areas. “In all of these disparate areas, we were challenged by Aviance to deliver high resolution images at all times and in all lighting conditions. It is these pressures that helped us in choosing Hikvision components, with their robust build quality, excellent video quality, and quick and simple installation and operation due to the user-friendly software. It also helped that the products offer very competitive prices and are accompanied by after-sales service and technical support from a first-class team.” Clear Images In Poor Lighting Conditions Aviance is committed to phasing out the old system in favour of a totally Hikvision IP system as soon as possible" The CCTV system uses a combination of IP66-rated dome and bullet cameras with either 1.3 or 3MP resolution. A total of four DS-2CD2312-I 1.3MP Outdoor Network Mini Dome cameras were installed, two in the public areas of the terminal and two at the main gates where passengers complete the biometric log-in process and enter through the turnstiles. To complement the dome cameras, nine EXIR bullet cameras were used: five DS-2CD2212-I5 1.3 MP units for general surveillance in the warehouses together with a pair of DS-2CD2232-I5 3MP units where greater resolution was required, and two DS-2CD2632F-I 3MP Vari-focal EXIR cameras for the main vehicle entry and exit gates. “All of the cameras offer great resolution, with 3D DNR and Digital WDR as standard, together with a full complement of alarm triggers, including line crossing and motion and intrusion detection” says Haim Atanelov. “But, the true day/night capability of the EXIR infrared technology meant that they always delivered clear images, even in the warehouses where lighting conditions are not good. Both the 1.3MP and 3MP bullet cameras employed in the warehouses live up to the 50-meter IR range quoted. What’s more, the 30-meter EXIR range of the mini dome cameras deployed in the terminal building is also very useful during night time hours when the building lighting is partially shut down.The new system has already proved its worth, helping to completely seal the export warehouse in particular “We also paid particular attention to the vehicle entry and exit points, in each case choosing the 3MP Vari-focal bullet cameras for their IP66 environmental protection, high resolution, advanced night viewing capabilities and zoom.” Into The Future The new system has already proved its worth, helping to completely seal the export warehouse in particular and enabling Kotoka to meet ACC3 accreditation. Together with securing the import warehouse, which serves global airline and cargo brands such as British Airways, South African Airways, Alitalia, KLM, Virgin, DHL, Cargolux, etc., it means that the airport is well-placed to continue to attract business. “Aviance is especially pleased with the smooth integration of the Hikvision IP system with the access control system at the 4 turnstiles,” says Haim Atanelov, “something which was also carefully noted by the EU ACC3 validators. Aviance was also pleased with the integration of the new system with the existing analog CCTV system, although it did show up the difference in video quality immediately. "We have already agreed to add further IP cameras to the site and Aviance is committed to phasing out the old system in favor of a totally Hikvision IP system as soon as possible.”
Round table discussion
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasizing systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?