Transportation security applications
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
Bialystok, a beautiful historic city of 300,000 in the northeast of Poland, is one of the nation’s major population centers. Devastated in World War II and languishing for a long period afterward, the city has seen a renaissance in recent years, with restoration of its beautiful architecture and modernization of infrastructure as the Polish economy has boomed. One particular change that has come upon this serene city with unexpected rapidity is the increase in car ownership, which has mor...
Airports, harbors, ports, railways, pipelines, highways, and bridges make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the infrastructure for the transshipment of people, freight, and cargo. Overall And Targeted Situational Awareness These facilities require increasing levels of security and leverage Arecont Vision megapixel camera technology to deliver both overa...
Customer The newly constructed highway from Lebuhraya Kemuning to Shah Alam (LKSA) in Malaysia simplifies access to the Southeast Asia country’s Federal Highway System for residents of Kota Kemuning, a self-contained township centered on a resort and golf course. The new four-lane, 14.7 kilometer (9-mile) expressway provides a smooth ride and enables commuters to avoid traffic bottlenecks. The toll collection system provides Touch ‘n Golanes in which drivers pay using pre-paid smart...
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibilit...
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing Humans From Animals And Statues The AI system continuously analyzes video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting People’s Privacy With AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search Versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages Of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common Use Cases Of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video Compression Technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF Physical Security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardization organizations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 Compression Formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognizes the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing A Lightweight Alternative “When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern Network Infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters. The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs. A New Focus Away From AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Critical Infrastructure In Transportation Transportation is a complex world. City streets, bridges, highways, tunnels, seaports, airports, and rail systems all offer different challenges to the security professional seeking to protect people, cargo, commodities, and critical infrastructure. Customers around the world rely on Arecont Vision as a key part of that protection. Arecont Vision Megapixel Camera Benefits Made in USA quality, advanced technology, and field upgradable features/capabilities Deter and detect threats and document activities Maintain situational awareness and security with fewer cameras Improve staff productivity Low profile/discreet surveillance or high visibility camera choices Resolve security/staff and customer disputes Protect staff, travelers, customers, equipment, and goods Increased detail equals better forensics and reduced time from police, 1st responders and security professionals in immediate response and for post-event investigations Monitor daily business and document activities and patterns Forensic documentation Provide enhanced security, situational awareness, life safety Prevent or disprove fraudulent claims Tight integration beyond ONVIF certification with hundreds of security vendor applications jointly tested via the Arecont Vision MegaLab™ Arecont Vision's megapixel cameras have been deployed at highways and cruise ship terminals Transportation Applications Remote surveillance Live monitoring and forensic viewing Monitoring of airports, ports and harbors, railway stations, roads and railways, bridges and tunnels, vehicles Passenger, luggage, freight, storage, and cargo areas Open spaces, indoors and out Parking lots/structures/rail yards/runways Concourses and corridors People/vehicle counting/monitoring License plate/facial recognition What Arecont Vision’s Customers Say “We selected Arecont Vision cameras because of their proven performance for the last year and a half on another Malaysian highway application,” comments Norisham Abdul Majid, CQR Digital Solutions, integrator for the Malaysian Highway Tollgate System. “Arecont Vision’s megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta,” adds Karim Cassar, Alberta Group, Malta. “Ease of installation, compatibility with our current VMS, and the new features [including] Wide Dynamic Range. Our experience has been great," states Safraz Samad, TPA Operations – Security Administration, Tampa International Airport. "Our organization requires high levels of security and with Arecont Vision’s updates to firmware we can maintain our internal network security policies.” Save Save Save Save
Customer Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hemisphere. It is a technologically advanced facility, employing state-of-the-art equipment and is a model for the industry and the region in everything from size to efficiency and security. Challenge The DP World marine control tower at Jebel Ali is an important facility for monitoring and controlling the movement of vessels in and out of the port. Physical security at the control tower was in need of upgrading and, in keeping with requirements mandated by Jebel Ali Port Security, DP World conducted a security risk assessment to determine how best to improve security at the site. Based on the assessment, DP World recommended an external video surveillance system. A basic design was developed that included 13 analog day/night box cameras and two outdoor pan-tilt-zoom (PTZ) cameras. Upon review, DP World concluded that the installation of this analog video surveillance system would also require the services of civil and electrical personnel for cabling and power needs. These additional services would add to the overall system costs as well as potentially increase the time frame for completion. DP World shelved the analog proposal and initiated a search for a more technically advanced video surveillance solution. They needed a camera system that would thoroughly cover the designated areas; require little or no external services or personnel for installation/maintenance; offer features and functionality that would enhance monitoring and operational control; be reasonably priced and ultimately provide greater detail and picture quality than would a typical analog system. Megapixel Solution DP World moved forward on the project with a new solution featuring megapixel cameras from Arecont Vision. When comparing the Arecont Vision megapixel system to the original analog system, it was evident that while the analog cameras were priced less than megapixel cameras on a per camera basis, they deliver less value when a total system cost was evaluated. The new design included two AV8185DN 180° day/night panoramic 8-megapixel dome cameras, two AV10005DN day/night 10-megapixel MegaVideo® Compact box cameras and four AV2105DN day/night 2- megapixel MegaVideo® Compact box cameras. Compared to the original design that included 13 analog cameras, the six-camera Arecont Vision megapixel system provided greater coverage with fewer cameras and significantly higher resolution images. The ability to digitally zoom into live scenes and recorded video while maintaining high resolution and wide area coverage also eliminated the need for PTZ cameras. And with Moonlight™ mode, the cameras automatically shift from color to black and white as ambient light diminishes. Megapixel Benefits Because the megapixel network cameras are PoE (Power over Ethernet) capable, the need for separate electrical cables to provide power was eliminated. Power and data is conveyed over a single network cable per camera. Using fewer cameras to effectively cover the same area also translated into infrastructure cost savings in containment works, cables and installations, which actually brought down the original cost of the system by nearly 20%, easily reflecting an improved return on investment (ROI). In addition to these advantages, the megapixel solution also contributed towards a greener environment because of fewer cables and less hardware that was needed. The Arecont Vision megapixel camera system provides superior performance and imaging capabilities than the analog system and most importantly, proved to deliver the most cost-effective video surveillance solution with tangible benefits and ROI.
"It is important that our security system fulfills our customers' extremely high safety requirements." - Jens C. Andersen, IT Manager, DAN'X DAN'X (Day And Night eXpress distribution) is a private transport and logistics company that specializes in night distribution of reserve parts for the IT industry. DAN'X provides 24-hour express delivery of components and accessories for a wide variety of businesses within the IT sector. With three large locations in Denmark, they can ensure that their customers get fast and professional service. The Challenge At DAN'X the customer is the central focus, and no two customers are alike. This presents tough demands for DAN'X on all fronts – also pertaining to security. The customers have strict security requirements to be fulfilled, and with the three widespread locations, DAN'X has more complex security issues to resolve. The Solution AC Sikring A/S has put together a solution that is totally network based, which provides DAN'X central management and coordination along with the option for eventual integration with other security devices and systems. For the solution, they chose the newest Milestone XProtect® Enterprise software, which is based on an open platform. The camera choices are a mix of different models relevant for where and what each individual camera has to monitor. The Advantages DAN'X has chosen a security solution that is future-safe and very flexible. The system has many development options, which make it possible to add new cameras anytime – quickly and easily. At the same time, the solution allows users to find evidence of any incidents through searching the images by date and time. The DAN'X customers themselves check that their high security demands are being upheld by regularly visiting the company locations. This naturally makes security a success criterion at DAN'X that has the highest priority. It is also the reason that DAN'X has chosen to build up their existing security system with a thorough upgrading to the newest technology and equipment. This dedication also shines through in the DAN'X choice of an IP video surveillance system for their security monitoring, designed to work now and in the future – only the best is good enough. The Partner Of Choice When it was decided at DAN'X to upgrade the old security system, there was no doubt for them that AC Sikring A/S would be their trusted supplier. They gathered offers from other installers, and received many good suggestions, but AC Sikring was chosen for the great flexibility and future-safe technology of their solution. "We were allowed to choose our own server, and this was one of the determining factors that settled our decision to use AC Sikring" says Jens C. Andersen, IT Manager at DAN'X. "AC Sikring uses solutions that are user friendly, which is a big plus for me, and they gave me the ability to put together the elements and take part in the installation and setup itself. I also knew AC Sikring well, as they were our previous security installer!" The New Solution "I knew about Milestone already, and was well aware that the software provides great flexibility, which means that we get things exactly as we want them." explains Jens C. Andersen, IT Manager, DAN'X The very high security requirements from the customer side made it especially important to choose the right solution from the start. "There has been no compromise – we have chosen the best of the best," states Jens C. Andersen. Every location had to be secured individually with an eye to building the system for a centralized management approach. An important feature for all the locations was that there should be the ability to monitor specific areas depending on each situation. In general, DAN'X demanded that the system perform with more images – in color – and more options for setting up the system. Flexibility was a critical parameter, which is exactly why Milestone XProtect Enterprise software was chosen. "I knew about Milestone already, and was well aware that the software provides great flexibility, which means that we get things exactly as we want them." explains Jens C. Andersen. "Furthermore, the system has many expansion possibilities that allow us to add new cameras whenever we want. It can also handle more than 1,000 images per second – fast and easy." Many Benefits The new software has given DAN'X the ability to work faster, more precisely and more effectively. They can find specific incidences by searching the archived image database by time and date. "This makes the daily work so much easier for me: I just search for a particular time or location, and can find the particular event quickly. With the help of megapixel cameras, I can now also see the smallest details, if necessary," adds Jens C. Andersen. "We had a really good dialog with AC Sikring, and they have been very flexible regarding all of our changes and customizations," reports Jens C. Andersen, who is looking forward to using the new security system as part of the company's daily procedures. Future Developments Since DAN'X is a company in constant growth, they already have plans for continual expansion of their surveillance system, including integration with their alarm system. In addition, there are plans in the near future to move the monitoring to a central video and guard service called Security Point from AC Sikring, in order to achieve an even higher level of security round the clock, 365 days a year, with visual verification. The result of their customers' high demands for security and their regular security checks at the locations is that DAN'X has put their security in the driver's seat, and established the best possible security system that can be found, installing a top professional surveillance system for today – and tomorrow!
Customer Malta's Grand Harbor into Valletta provides access to cruise ships. Passengers are greeted in this group of islands in the central Mediterranean with a view of ancient cream-colored buildings along twisting streets and hillsides, with limestone battlements, crenellated castles and ancient forts still guarding the harbor entrance, all reflecting 7,000 years of the islands' sometimes turbulent history. Today, the Valletta waterfront combines state-of-the-art sea passenger terminal facilities with shopping, dining and entertainment venues. It's a 24-hour destination that is consistently teeming with activity, and hundreds of thousands of cruise passengers from around the world visit every year. Challenge The complexity of the existing infrastructure, weather conditions and sheer scale of the overall installation were a significant challenge for securing the port and its surrounding areas. A facility big enough to accommodate large ocean liners obviously needs expansive video coverage, but the superior resolution provided by Arecont Vision cameras enables fewer cameras to cover very large areas. Surveillance operators at the cruise terminal can zoom in – live or even on archived video – and see the details of various areas in an image while still preserving the full image. Megapixel Solution A recent upgrade to the terminal's surveillance system included installation of 50 megapixel cameras from Arecont Vision, the first and largest installation of 5 Megapixel cameras in the Maltese Islands. The 3.0 megapixel cameras utilized in this installation send video along an information network providing greater resolution than images from conventional network cameras. In fact, the 3.0 megapixel cameras provide images with 10 times the resolution of standard VGA network cameras. Full-motion high-definition digital video combines superior image quality with manageable bandwidth and storage requirements. The system was installed by Alberta Group, Malta's leading provider of fire, safety and security systems. Alberta specializes in custom solutions to resolve their customers' specific problems and to decrease customers' exposure to risk. The Arecont Vision AV3100 provides image processing at billions of operations per second and can output multiple image formats to allow simultaneous viewing of the full resolution field of view and regions of interest Arecont Vision's MegaVideo technology enables coverage of large areas with extreme detail. The Arecont Vision AV3100 provides image processing at billions of operations per second and can output multiple image formats to allow simultaneous viewing of the full resolution field of view and regions of interest. The cameras provide four times the resolution of standard IP cameras with the ability to output full real-time frame rates. The 3 megapixel Arecont Vision AV3100 cameras used at the cruise ship terminal in Malta provide 2048x1536-pixel progressive scan images at 15 frames per second. "Alberta invests a great deal of money and resources into developing and evaluating the best technological advances to provide superior performance to our customers," said Karim Cassar, Alberta's Technical Research Executive. "Arecont Vision's megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta." Megapixel Benefits: The cruise ship at Valletta deployed the latest megapixel camera technology from Arecont Vision to secure its port and surrounding tourist areas. The system deployed delivers wide area video coverage with superior resolution and cost-efficiency. With the new system, surveillance operators can zoom in on live or recorded video to see detailed images of any scene."Arecont Vision cameras provide unparalleled image quality and resolution for applications world-wide, and their ability to boost image resolution without taxing bandwidth or storage resources is documented at the cruise terminal in Malta," said Steven Sarfati, Senior Vice President of International Sales at Arecont Vision. "As throngs of passengers travel through the terminal on their way to an historic experience in Malta, Arecont Vision cameras will be keeping a watchful eye with HD resolution."
With successful installations already in full operation on Shanghai Metro's Line 6 and Line 9, access control specialist TDSi, in partnership with its distribution partner in China, ZDX, has now begun work on the system installation for Line 7. Shanghai Metro is one of the newest and fastest growing rapid transit systems in the world, with 162 stations and over 225km of track running both above and underground. On average, well over two million passengers use the system everyday - with future expansion set to see that number increase to over three million. The latest addition to the network, Line 7 is scheduled to be commissioned into service at the end of 2008, and will connect the Baoshan District with the city center and Pudong District. Significantly, it will also provide a vital link to the site of the World Expo, which is being hosted by Shanghai in 2010. Over the last three years, TDSi and ZDX have developed and supplied fully integrated access control solutions for Lines 6 and 9. Each Line is served by over 40 stations as well as its own Operational Control Centre (OCC), with around 2,000 doors secured and controlled by TDSi's systems on each line. Commenting on the programme, TDSi's Managing Director, John Davies, said: "The Shanghai Metro is a very significant and high profile infrastructure programme, representing one of the largest access control projects across the whole of China. With two lines having been in operation for over a year, we were delighted to be awarded the contract for Line 7 - a real demonstration of the performance and quality of our systems, in very demanding conditions." The access control solution for the project features TDSi's EXpert controllers, EXgarde Enterprise software platform and MIFARE® smart card readers. Specified for their proven performance in high capacity applications, EXpert delivers a fully featured and networkable system. Each controller has a capacity of up to 48,000 cards and provides fast and effective access control to projects such as the Shanghai Metro, which has consistently high volumes of users passing through multiple access points. The OCC and each station's controllers are programmed via EXgarde Enterprise, TDSi's latest advanced access management software application. Each station is capable of operating independently of the server in cases where communications are lost - a key requirement in the specification for this particular project. Featuring database replication for powerful disaster recovery capabilities and total peace of mind, EXgarde Enterprise allows all real-time events and system parameters to be stored both at the main server in the local OCC and at each individual station. However should communications be lost between the center and any of the individual stations, changes and events are stored at the local stations until communications to the main server are re-established, at which point, the databases are re-synchronised. EXgarde Enterprise allows the system to be managed centrally, even where the Wide Area Network (WAN) may be of variable quality, effectively removing the risk of single point failure. TDSi MIFARE®smart card readers are employed throughout each Line. Providing true contactless technology, the readers provide an extremely cost efficient, highly reliable solution that also allows for straightforward expansion in the future - for example, allowing the same access control card to be used for cashless vending and car park management, offering users a true, one-card solution. Finally, the system provides both security and facilities managers with complete control and reporting capability for each line - both centrally and locally.
Metro São Paulo, consisting of five different lines, 55 stations and extending to over 60 kilometers of rail networks, was looking for a sophisticated electronic monitoring solution to increase the security of its passengers -in a city where violence rates are very high. In order to assure higher security levels, Metro SP decided to increase the number of cameras installed in a widely spread network of locations.In addition the customer wanted to introduce digital video recording technology which they had not been using before. In locations were human security is critical, Bosch solutions are the first choice for customers. Bosch monitoring solutions set new standards in performance, quality and state-of-the-art technology. Metro São Paulo’s new monitoring system is equipped with a Bosch CCTV system including 138 cameras, whereof 121 are fixed and 17 are dome cameras. The solution provides high levels of technology and system integration, offering an excellent monitoring solution for Metro São Paulo. They are managed by ten DiBOS Digital Video Recorders and a BIS Video Engine. Built-in scripting and application programmer's interface (APIs) allow easy enhancement with the existing monitoring system. The highly efficient video management system is monitored via the Security Control Center of the subway, which now serves as a model for transport monitoring in the region. The Control Center monitors almost 200 cameras, using a ring gigabyte network. Two control posts are constantly monitoring the five metro lines via six monitors and two plasma screens. Using state of the art digital recording and communication technology, Metro staff can now retrieve vital images and share information faster than ever before! They can better access critical situations and take appropriate actions immediately. The solution provides high levels of technology and system integration, offering an excellent monitoring solution for Metro São Paulo. The principal customer need - to increase the security of its passengers - has been fully met. The Metro Security Control Center now serves as a model for state-of-the-art transport monitoring solutions in Brazil.