Transportation security applications
Recife’s urban trains system carries around 400 thousand passengers a day – it is the third largest railway operator in number of users in Brazil. To ensure a safe journey for passengers, it is imperative to increase the subway security with modern technologies and monitoring equipment. The main challenge was to adapt the technology to the specific conditions such as lighting, people flow and speed of a subway station while not interrupting the transportation service. Therefore, eas...
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
From humble beginnings providing bus services along the New South Wales and Queensland coasts in Australia, Transit Systems has not only gone on to become one of Australia’s biggest public transport providers, but has also made significant inroads overseas, having purchased several bus routes from the First Group London, United Kingdom, in 2013. Employing over 2500 staff Australia-wide, Transit Systems operates from 26 depots and terminals, with a fleet of 500 buses and 40 ferries. When Q...
Mirasys Video Management Solutions are being utilised in a number of transport projects which include ports, motorways, airports, trains and logistic centres. Each project needs a highly adaptive solution which adapts to changing requirements, technologies and regulations, and provides unlimited scalability and high reliability. Mirasys VMS Increases Efficiency The transportation sector provides a great example of how an intelligent video management system can increase the efficiency of activi...
German supermarket REWE Group's new full-range national warehouse covers 53,000 square meters and is situated in the north of Berlin. About 350 employees ensure that more than 355 REWE, nahkauf, Karstadt and Coop supermarkets — along with Hit self-service stores — are supplied with around 10,000 different items. The building is protected by a CLIQ® locking system which was planned and installed by the specialist security company Guett-Dern GmbH, based in Cologne. The Flexible Lo...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air Established in 2011 in Kyiv, Ukraine, Ajax Systems produces wireless security equipment for end users and small-medium-sized businesses. Ajax is a complete eco-system. The devices are ready to work out of the box. There are 24 devices for protecting residential and commercial properties from intrusion, fire, and floods as well as a set of automation modules. Users treat them as gadgets that make their homes smarter. Ajax wireless systems are easier to maintain, configure, and monitor for installers as well as for security companies, according to Ajax. The systems are resistant to false alarms, regularly update over the air, and can be easily expanded to cover premises of any size. IoT-based security systems “Our IoT-product approach to security systems, gadget-like industrial design, and user-friendly interfaces disrupted the market in 2016,” says Valentine Hrytsenko, Chief Marketing Officer at Ajax Systems. “After receiving global recognition in the security market, the company grew 80-fold.” Today, Ajax IoT-based security systems protect more than 200,000 people in 80 countries around the world from break-ins, fires, leaks and other threats. “Our mission is to reshape security and make it a common attribute of every household,” says Hrytsenko. Ajax wireless systems are easier to maintain, configure, and monitor for installers Ajax smart technology Ajax smart technology features a combination of reliable hardware and intelligent software. A proprietary Jeweler two-way radio protocol allows placing devices at a distance of up to 2000 meters from the hub in an open space. The system is encrypted, resistant to jamming and code grabbing. Ajax detectors feature false alarm-preventing algorithms: Haze Flow, ZOE, LISA, SmartDetect. The hubs run on a real-time operating system, Malevich OS that processes the commands and sends the alarms. Ajax Cloud service helps to control the system from anywhere in the world using native apps. Easy and seamless installation Ajax features system scalability, flexible management of administrative rights" Easy installation facilitates Ajax on-boarding. The company says 67% of Ajax users purchase additional security devices within the first six months. And an average system configuration consists of nine items. “We focus primarily on the residential, small and medium-sized businesses,” says Hrytsenko. “In the residential segment, Ajax covers the needs to detect break-ins, prevent fires and floods. Ajax devices are visually appealing to fit any home and business interior seamlessly. For the small and medium-sized business, Ajax features system scalability, flexible management of administrative rights, informative notifications, professional maintenance software, as well as integration of the security camera streams for centralized monitoring.” Route-to-market approach Ajax Systems’ route-to-market approach is two-fold. First, they develop strategic partnerships with the local professional security equipment distributors in each country. From the distributors, Ajax equipment goes to the installers, system integrators, security companies, etc. In addition, Ajax seeks to build brand recognition and actualize the concept of security by weaving it into the daily routine of a general audience. “We form a good understanding of their security needs,” says Hrytsenko. As with any new technology, there is an adoption curve for both B2B and B2C clients. Thus, the educational challenge is persistent for Ajax from country to country. Ajax Systems’ route-to-market approach is two-fold Wireless security systems “On a professional market, new products are often met with understandable suspicion,” says Hrytsenko. However, a huge misconception is that user-friendly equipment is either hard to customize or unreliable. Not true, he says. After testing in five accredited laboratories, Ajax devices successfully earned Grade 2 certification for compliance with the requirements of the international standard EN50131-1:2006. Grade 2 is the highest reliability grade a wireless security system can get.
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyze real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and parking security. Vehicle recognition systems Rekor Systems is a provider of vehicle recognition systems in more than 60 countries Using AI to enable video cameras, Rekor Systems is a provider of vehicle recognition systems in more than 60 countries. Applications include security and surveillance, public safety, electronic toll collection, brand loyalty, parking operations, banking and insurance, logistics, and traffic management. AI allows Rekor’s products to recognize and read license plates, while also providing information about each vehicle, including color, make, year, and model. Rekor’s products are powered by OpenALPR software, an AI-based solution that enables any IP (internet protocol) surveillance camera to scan license plates and provide vehicle data including tag number, make, model, and color in real time with 99% accuracy, according to the company. Rekor’s products are powered by OpenALPR software Integrated solutions “Rekor's software started as an open source project, and we have done our best to keep the commercial software as open as possible,” says Rod Hillman, Chief Operating Officer, Rekor Systems. “One of the challenges we see with others in our space is a tendency to ‘close off’ and ‘silo’ their solutions. Our goal is to make it as simple as possible to deploy, integrate, and ultimately use.” Rekor has numerous application programming interfaces (APIs) and ways the solution can be integrated into partners' solutions with a software development kit (SDK). Rekor solutions can be purchased directly or through a worldwide partner network of integrators, wholesalers, and within integrated solutions such as Nokia's smart city platform. Electronic toll collection Rekor’s solutions have viable applications within multiple markets While many systems are hardware-based, Rekor’s software-as-a-solution offering can turn an IP camera into an automatic license plate reader. Rekor’s solutions have viable applications within multiple markets, including law enforcement, security and surveillance, electronic toll collection, parking operations, banking and insurance, logistics, traffic management, and customer experience. “Rekor offers a cost-effective alternative to traditional LPR systems with a much higher accuracy rate at 99% allowing more cameras to be present and active at any given time,” says Hillman. “Traditional LPRs need someone to go through hours of footage to find what they are looking for while Rekor’s technology will send alerts in real time, resulting in much quicker response times.” Move Over Camera mounts onto roadside worker’s vehicles to capture ‘Move Over’ violations Two-Part authentication Rekor’s products include: NUMERUS, a cloud-based solution for high-volume vehicle recognition, designed to reduce costs and increase efficiencies for the electronic toll collecting industry. Two-part authentication instantly identifies the vehicle’s make, model, color and body type along with the license plate read. Machine-learning-enabled software recognizes license plates from all 50 U.S. states, in addition to plates from more than 70 countries on six continents. Edge, an all-in-one camera and vehicle recognition system that instantly reads vehicle license plates, along with the vehicle’s make, model, color and body type. Move Over Camera, which mounts onto roadside worker’s vehicles (police, tow truck, etc.) to capture ‘Move Over’ violations. ‘Move Over’ laws state that vehicles must move over one lane and/or slow down if they cannot move over to avoid incident while roadside workers are in the shoulder lane. The camera can detect what lane vehicles are in and how fast they are moving. Violators are flagged in the system for law enforcement’s review.
A high majority of Americans (83%) are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals. More than one in five (22% of) Americans say they have canceled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data. Across the pond, three in 10 Britons think twice about attending large-scale events due to data or physical security issues. Although less than half of U.K. survey respondents have changed their plans to attend large events, some 45% are taking extra security precautions. Brits are as afraid of using public Wi-Fi at an event as of a physical criminal attack. These are some of the insights from the 2019 Unisys Security Index survey of more than 13,000 consumers in 13 countries, including 1,000 in the U.S. and another 1,000 in the United Kingdom. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed Security index scores of countries Unisys gauged attitudes on a range of security-related issues and created an index based on survey results. The index is a calculated score from zero to 300 based on concern about eight specific issues within the categories of national, financial, Internet and personal security. Currently, the U.K. index is at 147 (down from 149 in 2018), which is one of the lowest of the countries surveyed. In contrast, the U.S. index is now at 165, considered a serious level of concern and the highest among developed countries surveyed. Globally, the index average stands at 175, with the Philippines scoring highest with an index score of 234 and the Netherlands registering the lowest concern ratings with a score of 115. Concerns about misuse of information Privacy is an area where concern is growing. “This year more than half of U.K. citizens expressed concerns about the misuse of their personal information,” says Unisys’ Global Chief Security Architect, Salvatore Sinno. Another 49% expressed serious concerns that intelligence services listen in on them through electronic devices such as mobile phones or smart speakers. The summer calendar of major sporting events, concerts and festivals raises the levels of security concern The summer calendar of major sporting events, concerts and festivals raises the levels of security concern. Nick Aldworth, former National Counter Terrorism Co-Ordinator, tells the BBC that the government is not doing enough to ensure venues are secure. He supports a campaign for more rigorous checks at venues in the U.K., named Martyn’s Law, after Martyn Hett, a victim of the Manchester Arena attack in 2017. safety Pointers while attending event Salvatore Sinno of Unisys provides the following pointers on keeping safe this summer: If planning to attend a crowded event alone, let someone know. Make sure friends or family know where you are going, when you plan to arrive and when you are expected to return. Plan ahead and check local authorities’ alerts; sign up for any travel or news alerts to receive updates on traffic or news of any disturbances. As soon as you get to an event, survey your surroundings. Make sure you know where the exits are and agree on a meeting place with friends in case you should get separated from the group. Know where stewards and information points are so you can speak to someone if you need to. Be vigilant for suspicious activity at an event. Don’t be afraid to report something you think is unusual, such as unattended baggage or people behaving in a suspicious or threatening way. In an emergency, stay calm and move to the edges of crowds. Try to leave the area quickly and calmly. If you need to, follow the standard police advice of ‘Run, Hide and Tell’. Only buy event tickets from official channels or trusted websites. Update your mobile device with the latest, most secure software and avoid unsecured Wi-Fi networks; keep your phone charged and take along a battery charger pack. Don’t make electronic transactions at unofficial event vendors; be careful with contactless cards or making mobile transactions. “Whether it’s your physical security or the security of your data, you can take precautions around major events so you do not make it easy for criminals to take advantage,” says Sinno.
Every day, 150,000 parcels are transported by the French DPD group, which makes nearly 55 million parcels per year. E-commerce is growing the parcel business and, consequently, the transportation volume of parcel service and logistics companies. Online shopping would be unthinkable for the consumers without the speedy delivery of the ordered goods - therefore it is self-evident to keep track of shipments on their way to the consignee, in order to guarantee a correct delivery. DPD France Video Systems DPD France is part of La Poste Groupe, the largest parcel service provider in the country. The company operates numerous logistics depots, in which the consignments are collected, sorted and reloaded according to their destination. The timely transport of the parcel volumes, which are handled in the depots day by day, requires a high level of organization and a precise monitoring of all processes in order to be able to ascertain where a shipment is currently located. In order to cope with the high volume of shipments, the depots are equipped with state-of-the-art technology such as conveyor belt systems and scanner terminals, which allow the tracking of the route any shipment takes within the facility. On-schedule operations and reliable delivery are important quality criteria in the parcel logistics industry.DPD France has been using video systems for some time, which monitor the processes inside the depots For this reason, DPD France has been using video systems for some time, which monitor the processes inside the depots. However, these were mostly analog systems, which should now be replaced by modern IP-based video solutions in order to document the sorting and transfer processes of the packages, too. Search For A More Flexible System As part of the modernization, DPD intended to replace the old technology with more open and flexible systems providing extended search options in order to be able to track parcels as quickly as possible. The solution should be very reliable and, for the future, be simply expandable by additional camera channels to keep up with the growing volume of shipments. Furthermore, the software should be easy to use for employees, in order to avoid complex trainings and long learning times. The detailed and reliable dispatch tracking, as well as the surveillance of the depots to resolve cases of loss and to optimize the processes, were therefore set as project targets. The challenge of the project was also to secure the depots in compliance with TAPA - which mainly means monitoring all entrance and exit gates for at least 17 hours a day as well as motion-based image recording outside this period. The Qognify Cayuga software should be easy to use for employees, in order to avoid complex trainings and long learning times The Solution: Qognify Cayuga With the Cayuga product line, Qognify offers a powerful and flexibly extendable video management software that has been supplemented by the Qognify BVI Logistics module with scanner interface for the DPD depots in France. In addition, I/O modules are used in both depots to enable the transmission and reception of control signals. Among other things, doors and gates can be opened directly by pushing a button in the Qognify user interface. The expandability of the Multi Solution Platform allows new components to be added at any time - for example, to automatically capture and analyze the number plates of incoming vehicles. The video management software Qognify Cayuga sets itself apart from competitors by the openness and flexibility of the system as well as by the support of a large number of different camera manufacturers and models.Qognify Cayuga sets itself apart from competitors by the openness and flexibility of the system as well as by the support of a large number of different camera manufactures and models Successful Result In Warehouse Management System Based on Qognify Cayuga and Qognify BVI Logistics, all conveyor belts, entrance and exit doors as well as the entire interior zone are now being monitored with 280 HD cameras in Tours and 380 in Beaune. This means that the complete process of shipment processing from incoming parcels via sorting by destination through to handover to the delivery agent is seamlessly documented. The data from the video system is combined with the data from the various barcode scanners along the conveyor belts for detailed evaluation. It is therefore possible to determine at what time each individual parcel was located at which point in the distribution center. The installation of a total of 61 scanners from the manufacturer Sick ensures the monitoring of the conveyor belts, and these scanners export the barcodes from five viewing angles. On this basis, each parcel is tracked in the warehouse management system, assigned to the correct destination and, via a selector switch, forwarded to the right conveyor belt, which transports it to the appropriate loading bay. In the Qognify user interface, a special research view can be used to search for parcels using different parameters such as barcode or tracking number. The software visualizes the route of the shipment through the distribution center on the basis of video recordings, so that the user can compare all available data and can localize error sources quickly. Thanks to these options the clarification of damage or loss can be significantly accelerated. Patrick Cavoue from DPD France is satisfied with the result: “With the logistics solution from Qognify, we are able to track the route each parcel is taking in our depots without any gaps – right up to the handover to the delivery agent. The Qognify BVI client allows a targeted search without hours of searching through video footage and is therefore perfectly suited to quickly and efficiently identify loss or damage. This lowers our costs and ultimately leads to significantly increased customer satisfaction.”
Bialystok, a beautiful historic city of 300,000 in the northeast of Poland, is one of the nation’s major population centers. Devastated in World War II and languishing for a long period afterward, the city has seen a renaissance in recent years, with restoration of its beautiful architecture and modernization of infrastructure as the Polish economy has boomed. One particular change that has come upon this serene city with unexpected rapidity is the increase in car ownership, which has more than tripled in Poland since 2005. Over the last decade, the growing need for an up-to-date, comprehensive traffic monitoring system has become increasingly apparent. Surveillance Enhancement For Traffic Surges The growing need for an up-to-date, comprehensive traffic monitoring system has become increasingly apparentCameras were the most costly item within the traditional traffic surveillance system originally deployed in Bialystok. To capture as many angles as possible, large numbers of cameras were required, often several at each intersection. As well as being an eyesore, this also meant that the cost of linking and synchronizing the array of cameras to the central surveillance system was exorbitant. To avoid impacting traffic, which is heavy during the daylight hours, installation and construction work was usually carried out at night. The restricted hours for installation caused long delays in camera setups. Worse, the system itself no longer met the needs of the rapidly developing city. Despite the large numbers of cameras, the field of view of individual cameras was too narrow and when accidents happened it was difficult to try to piece together footage from several cameras in an attempt to reconstruct the incident. Often, there was no way to determine from the footage just who was at fault. A better solution was needed. Seamless Collaboration To Seamless Implementation Zarzad Dróg Miejskich (ZDM), the municipal unit responsible for the road system in Bialystok needed to revamp, simplify, and upgrade their inefficient traffic camera system, so they worked with systems software manager Siemens and engaged VIVOTEK’s local distributor Suma Solutions to come up with an answer that would meet their needs. Siemens developed the system software around technology provided by VIVOTEK, a provider of IP surveillance solutions, offers dedicated traffic surveillance and management solutions, and has recently released its remarkable FE8174V H.264 5-megapixel fisheye network camera. The hemispherical images captured on camera can be automatically retooled to conventional projection specifications for easy viewing The FE8174V is VIVOTEK’s fisheye network camera. This vandal-proof, WDR-enhanced, day/night camera features a detailed 5-megapixel resolution sensor with superior image quality. Its fisheye lens captures a 180° panoramic view when wall-mounted, and a stunning 360° surround view with no blind spots when mounted overhead. With its choice of display layouts—surround view, panoramic view, and regional view—it is the perfect solution for those who need coverage of wide, open areas as well as a high degree of flexibility. With the advanced image processing capabilities, the hemispherical images captured on camera can be automatically retooled to conventional projection specifications for easy viewing. As the camera’s primary application is outdoors and demands reliability in all conditions, a weather-proof IP66-rated and vandal-proof IK10-rated housing keeps the camera body clear of rain and dust and maintains functionality in all types of weather. The VIVOTEK FE8174V features a removable IR-cut filter, which is unquestionably the best choice for those who need a hardy, all-weather, 24/7 system with a full range of coverage. Enhanced Resolution Means Better Traffic Safety ZDM installed 130 VIVOTEK FE8174V cameras at intersections throughout Bialystok. Now, with far fewer cameras, traffic controllers can get a clear, sharp overview of the whole field without any blind spots.VIVOTEK’s fisheye camera dewarping capabilities allow monitors to adopt different presentation modes A single VIVOTEK FE8174V provides the coverage of four outdoor bullet cameras in one image, and has resulted in cost savings at the same time as providing more complete coverage. Fewer cameras has also meant a decrease in costs associated with the backend management platform, network communications equipment, and storage equipment; it has also protected the aesthetic properties of the city by decluttering the skyline. Further, VIVOTEK’s fisheye camera dewarping capabilities allow monitors to adopt different presentation modes. Now, Management Center operators can easily monitor and verify traffic incidents and use the image recognition software to increase traffic control efficiency. The city of Bialystok has finally achieved a traffic management and surveillance system that can keep pace with its rapid growth while remaining in harmony with the local culture and architecture.
Levels of security inside the Aviation industry have never been higher; mainly due to increased terrorism threat levels across the globe, combined with a worldwide rise in smuggling activity. No airport is immune from these pressures and Ghana’s ‘Kotoka International’ can now claim to meet ACC3, the highest accreditation in the aviation industry, thanks to their recent investment in the latest generation of IP CCTV systems from Hikvision. Ghana’s Kotoka International Airport Established in 1994, Aviance Ghana Ltd provides a range of ground handling services at Ghana’s Kotoka International Airport, situated just outside the capital, Accra. The airport itself is Ghana’s premier international flight center and is capable of accepting large aircrafts, such as the latest generation of Boeing 747.Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents It occupies more than 650 hectares, with two large terminals for domestic/regional and international/long-haul operations that are connected by an internal walkway. Terminal 2 is the principal international departure terminal and includes restaurants, duty-free shops and two Executive lounges for First and Business Class travellers. There are also two smaller terminals dedicated solely to diplomatic flights and military operations. Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents. At Kotoka, the ground services include managing all the passenger concourse facilities in Terminal 2, plus passenger check-in and baggage handling, the loading and unloading of cargo from freight flights and a cargo warehouse operation for all import and export needs. Overriding Security Objectives Given that today’s security concerns require the aviation industry to maintain very high levels of protection measures, close scrutiny of the 650 hectare site that the airport occupies and protecting passengers, aircraft and cargo were the twin key objectives for Aviance when deciding to upgrade the Airport’s CCTV system. The company also recognized that intelligently deploying the camera infrastructure would be necessary to maximize cost-effectiveness and efficiency.The new Skylink CCTV system design uses four different types of Hikvision IP camera Aviance Ghana turned to Skylinks Technical Services Ltd and tasked them with designing a solution that would enable it to meet the EU’s ACC3 accreditation, the highest accreditation in the aviation industry. In turn, Skylinks turned to Hikvision for the design of an all-IP CCTV system capable of not only meeting the current challenges facing Aviance in its operation at Kotoka International Airport, but also providing an expandable base that could rise to meet future developments. The new Skylink CCTV system design uses four different types of Hikvision IP cameras connected to a 32-channel, RAID 5 NVR over an entirely new Gigabit network infrastructure. According to Haim Atanelov, Skylinks General Manager, “The final brief for the CCTV upgrade included installation of new cameras in Aviance’s import and export cargo warehouses, both entry and exit vehicle gates, within the terminal public areas, at the biometric log-in area and associated turnstiles, and within the VIP lounge areas. “In all of these disparate areas, we were challenged by Aviance to deliver high resolution images at all times and in all lighting conditions. It is these pressures that helped us in choosing Hikvision components, with their robust build quality, excellent video quality, and quick and simple installation and operation due to the user-friendly software. It also helped that the products offer very competitive prices and are accompanied by after-sales service and technical support from a first-class team.” Clear Images In Poor Lighting Conditions Aviance is committed to phasing out the old system in favour of a totally Hikvision IP system as soon as possible" The CCTV system uses a combination of IP66-rated dome and bullet cameras with either 1.3 or 3MP resolution. A total of four DS-2CD2312-I 1.3MP Outdoor Network Mini Dome cameras were installed, two in the public areas of the terminal and two at the main gates where passengers complete the biometric log-in process and enter through the turnstiles. To complement the dome cameras, nine EXIR bullet cameras were used: five DS-2CD2212-I5 1.3 MP units for general surveillance in the warehouses together with a pair of DS-2CD2232-I5 3MP units where greater resolution was required, and two DS-2CD2632F-I 3MP Vari-focal EXIR cameras for the main vehicle entry and exit gates. “All of the cameras offer great resolution, with 3D DNR and Digital WDR as standard, together with a full complement of alarm triggers, including line crossing and motion and intrusion detection” says Haim Atanelov. “But, the true day/night capability of the EXIR infrared technology meant that they always delivered clear images, even in the warehouses where lighting conditions are not good. Both the 1.3MP and 3MP bullet cameras employed in the warehouses live up to the 50-meter IR range quoted. What’s more, the 30-meter EXIR range of the mini dome cameras deployed in the terminal building is also very useful during night time hours when the building lighting is partially shut down.The new system has already proved its worth, helping to completely seal the export warehouse in particular “We also paid particular attention to the vehicle entry and exit points, in each case choosing the 3MP Vari-focal bullet cameras for their IP66 environmental protection, high resolution, advanced night viewing capabilities and zoom.” Into The Future The new system has already proved its worth, helping to completely seal the export warehouse in particular and enabling Kotoka to meet ACC3 accreditation. Together with securing the import warehouse, which serves global airline and cargo brands such as British Airways, South African Airways, Alitalia, KLM, Virgin, DHL, Cargolux, etc., it means that the airport is well-placed to continue to attract business. “Aviance is especially pleased with the smooth integration of the Hikvision IP system with the access control system at the 4 turnstiles,” says Haim Atanelov, “something which was also carefully noted by the EU ACC3 validators. Aviance was also pleased with the integration of the new system with the existing analog CCTV system, although it did show up the difference in video quality immediately. "We have already agreed to add further IP cameras to the site and Aviance is committed to phasing out the old system in favor of a totally Hikvision IP system as soon as possible.”
Airports, harbors, ports, railways, pipelines, highways, and bridges make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the infrastructure for the transshipment of people, freight, and cargo. Overall And Targeted Situational Awareness These facilities require increasing levels of security and leverage Arecont Vision megapixel camera technology to deliver both overall and targeted situational awareness. Arecont video coverage is deployed for: Criminal activity and terrorist deterrence Roadways, parking lots/structures License plate recognition Crowd monitoring and facial recognition Facility and terminal entrances/exits Control towers, tarmacs, runways, fueling stations, harbors, greenspaces, perimeters, fencing, and piers Terminal gates, security checkpoints, retail areas, restaurants, ticket counters, luggage areas Arecont Vision SurroundVideo® Superior Coverage For example, in the check-in area for an airline, train station, or cruise ship terminal, three Arecont Vision SurroundVideo® IP megapixel panoramic cameras provide superior coverage and higher quality images than 11 analog cameras. In passenger terminals, a single Arecont Vision SurroundVideo® IP megapixel panoramic camera provides outstanding situational awareness and 180 to 360 degrees of non-stop coverage. Any part of the scene can be digitally zoomed in as needed, without disrupting active recording of the entire scene. Arecont SurroundVideo panoramic cameras provide superior outdoor coverage and can even provide coverage of an airport runway at night. Arecont Vision megapixel cameras are part of the surveillance solutions customer use around the world, including: Hollywood Burbank Airport, Burbank, California Sky Harbor, Phoenix, Arizona Vancouver International Airport, Canada John Wayne Airport, Santa Ana, California Long Beach Airport, California Dallas-Fort Worth International Airport, Texas Dulles International Airport, Washington DC Ronald Reagan National Airport, Washington DC Tampa International Airport, Florida Orlando International Airport, Florida Pearson International Airport, Toronto, Canada Edmonton International Airport, Canada Port of Victoria, British Columbia, Canada Abu Dhabi Customs, UAE Big 4 Bridge, Indiana Port of Malta Saudi Consulate, Yemen Port of Haifa Jebel Ali Port, UAE South African Airways Cargo Legardeere Airport, Australia Dubai Immigration, UAE Brisbane Airport, Australia Saudi Border Guard, Kingdom of Saudi Arabia Maribor Airport, Slovenia Taipei Taiyuan International Airport, Taiwan Palembang Airport, Indonesia Beijing Airport, China Shanghai Pudong Airport, China Kunming International Airport, China Wuhan Tianhe International Airport
Customer The newly constructed highway from Lebuhraya Kemuning to Shah Alam (LKSA) in Malaysia simplifies access to the Southeast Asia country’s Federal Highway System for residents of Kota Kemuning, a self-contained township centered on a resort and golf course. The new four-lane, 14.7 kilometer (9-mile) expressway provides a smooth ride and enables commuters to avoid traffic bottlenecks. The toll collection system provides Touch ‘n Golanes in which drivers pay using pre-paid smart cards and Smart-TAG lanes where infrared transceivers mounted on the ceiling of the toll plaza enable collection of tolls as the vehicle passes through. Challenge Eight hundred vehicles per hour can pass through the Touch ‘n Go lanes, and 1,200 vehicles per hour can pass through Smart-TAG lanes. If a driver doesn’t pay or doesn’t have an active account, enforcement procedures depend on the capture of a clear and legible video image of the vehicle’s license plate. Mohd Azhar Ariffin, engineering manager for Projek Lintasan Shah Alam Sendirian Berhad, broadly oversaw the LKSA highway project, which began in 2007. Toll collection is a dependable technology used throughout Malaysia, but standard resolution cameras can be a weak link if they fail to provide readable numbers as license plates pass by. Megapixel Solution Arecont Vision megapixel cameras with outdoor housings are used in conjunction with a vehicle monitoring system to clearly view each license plate. The LKSA highway project installation in Malaysia includes Arecont Vision AV3100M cameras at each toll lane. The Arecont Vision 3 megapixel cameras capture video and snapshots of vehicles passing through the Vehicle Monitoring and Capturing System (VMCS) that also incorporates network video recorders (NVRs) integrated with the toll collection system. Each toll plaza is monitored locally in a plaza control center and centrally by an administration office that oversees both plazas. The Arecont Vision AV3100M cameras are JPEG color cameras that provide 2048x1536-pixel images using 1/2-in. CMOS sensor and image processing that incorporates Arecont Vision's massively-parallel MegaVideo® architecture, which is capable of sustaining billions of operations per second. Camera features include superior picture quality, low light sensitivity and fast frame rates. Each camera provides many custom-programmable features such as resolution, compression quality, brightness, saturation, gamma, sharpness and tint. The network video recorders installed in the Malaysia highway project include two GVD M630 NVRs and two GVD M320 NVRs from Genius Vision Digital, Inc., which are fully interoperable with Arecont Vision megapixel cameras. TERAS Teknologi, provider of the toll collection system and creator, developer, and leading system integrator of Touch 'n Go and SmartTAG, worked with GVD and CQR to integrate the Vehicle Monitoring and Capturing System. “GVD offers its unique integration platform to complete IP surveillance solutions with Malaysia Highway Tollgate systems, through the seamless integration with Arecont Vision megapixel cameras, GVD can provide the most scalable and flexible system for any mission critical projects in IP surveillance markets.” said Steve Chu, CEO, Genius Vision Digital, Inc. Arecont Vision 3 megapixel cameras capture video and snapshots of vehicles passing through the VMCS Additional Arecont Vision megapixel cameras in dome housings are installed in an administration building as part of a networked video system watching over the entire operation. CQR Digital Solutions designed the video system for the administration building using Arecont Vision AV1300M camera. Hard disk drives from Seagate provide a total of 15 Terabytes of storage, 1.5 Terabytes for each DVR used in the LKSA system. Megapixel Benefit Arecont Vision’s megapixel cameras provide the superior image quality needed to capture passing license plates. Most importantly for the price-sensitive application at the LKSA highway project, the Arecont Vision JPEG cameras offer great value for a price comparable to standard-resolution cameras. As vehicles drive through the new highway's toll plaza, the image clarity of Arecont Vision megapixel cameras dependably provides a useable image. Each clearly legible image translates into more recovered toll revenue and contributes to system Return on Investment (ROI). Arecont Vision cameras were previously used with the Ampang-Kuala Lumpur Elevated Highway (AKLEH) project, the first elevated highway in Malaysia, opened in 2001. The Arecont Vision cameras had been in place since an upgrade was completed on the AKLEH project, and the users were happy with the performance and output quality, which led to use of the cameras on the LKSA project. The Arecont Vision cameras on the AKLEH upgrade project proved their ability to produce impeccable images that boosted fare enforcement and yielded a convincing ROI. These results were confirmed when the new LKSA project made a similar investment in megapixel image capture. The Arecont Vision 1.3 megapixel cameras' ability to zoom in on a region-of-interest in a larger frame was especially helpful to the customer, and multi-streaming functionality allows efficient usage of bandwidth. Both work together to reduce overall storage needs without compromising image quality. The system in the administration building has also been successful in providing overall surveillance and additional security. The Arecont Vision AV1300M color camera provides full motion progressive scan 1280x1024 video at 32 frames per second, four times the resolution of IP VGA or analog cameras at a comparable cost. “Arecont Vision has been very responsive to our needs,” said Norisham Adbul Majid of CQR Digital Solutions, integrator of the video components of the highway project. “We selected Arecont Vision cameras because of their proven performance for the last year and a half on another Malaysian highway application.” “The superior performance of our cameras in highway applications in Malaysia are typical of the many ways that users all over the world are benefiting from Arecont Vision's unparalleled image quality and resolution,” said Becky Zhou, Director of Asia Pacific Sales, Arecont Vision. “Our cameras provide flexibility for a variety of applications, whether indoors or out, and provide interoperability with industry-leading companies to function as a critical component in a mission critical system solution.”
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibility with our current VMS, and the new features [including] Wide Dynamic Range. Our experience has been great. Our organization requires high levels of security and with Arecont Vision’s updates to firmware we can maintain our internal network security policies.” said Safraz Samad, TPA Operations – Security Administration, Tampa International Airport. “Alberta invests a great deal of money and resources into developing and evaluating the best technological advances to provide superior performance to our customers. Arecont Vision’s megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta.” commented Karim Cassar, Technical Research Executive, Alberta. Megapixel Camera Benefits Deter and detect threats and document activities Maintain situational awareness and security Improve staff productivity Resolve security/staff and customer disputes Protect staff, travellers, customers, equipment, and goods Ability to cover more with less Increased detail equals better forensics and reduced time from police and security professionals in post event investigations Monitor daily business Forensic documentation to build cases Provide security, situational awareness, life safety Prevent fraudulent claims Application Areas Remote surveillance Facility entry/exits Loading docks Luggage and freight areas Storage areas Offices and warehouses Open spaces Parking lots/structures Roads and bridges Concourses and corridors People/vehicle counting/monitoring License plate/facial recognition
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
People are an essential component of any physical security system. Automation hasn’t taken over completely yet! But how has innovation changed the skillsets security operators need to operate systems effectively? The two elements – technology and manpower – must operate seamlessly and hand-in-glove to ensure that modern systems live up to their full potential. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?