Transportation security applications
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
Bialystok, a beautiful historic city of 300,000 in the northeast of Poland, is one of the nation’s major population centers. Devastated in World War II and languishing for a long period afterward, the city has seen a renaissance in recent years, with restoration of its beautiful architecture and modernization of infrastructure as the Polish economy has boomed. One particular change that has come upon this serene city with unexpected rapidity is the increase in car ownership, which has mor...
Airports, harbors, ports, railways, pipelines, highways, and bridges make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the infrastructure for the transshipment of people, freight, and cargo. Overall And Targeted Situational Awareness These facilities require increasing levels of security and leverage Arecont Vision megapixel camera technology to deliver both overa...
Customer The newly constructed highway from Lebuhraya Kemuning to Shah Alam (LKSA) in Malaysia simplifies access to the Southeast Asia country’s Federal Highway System for residents of Kota Kemuning, a self-contained township centered on a resort and golf course. The new four-lane, 14.7 kilometer (9-mile) expressway provides a smooth ride and enables commuters to avoid traffic bottlenecks. The toll collection system provides Touch ‘n Golanes in which drivers pay using pre-paid smart...
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibilit...
Security trade fairs can be daunting for attendees. At big shows like ISC West and Global Security Exchange (GSX), there can be hundreds of physical security manufacturers and dealers vying for your attention. Booths are sometimes spread out across multiple halls, often accompanied by a confusing floor plan. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cyber security and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. Here, SecurityInformed.com presents eight hints and tips for visitors to make the most out of trade shows: 1. Outline your objectives. As the famous saying goes, “Failing to plan is planning to fail!” Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organization is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. Most trade fair websites provide the option to filter exhibitors by their product category 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade fair websites provide the option to filter exhibitors by their product category. Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. With your most important conversations planned carefully, there should be time left to explore the show more freely 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Security Trade Fair Checklist: Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule & floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs And Trade Concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalized concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement Of Surveillance In Chinese Human Rights Violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased Global Media Attention The ban has not been widely publicized in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader Interpretation Of The Bill Beyond The Federal Government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, VA., has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Critical Infrastructure In Transportation Transportation is a complex world. City streets, bridges, highways, tunnels, seaports, airports, and rail systems all offer different challenges to the security professional seeking to protect people, cargo, commodities, and critical infrastructure. Customers around the world rely on Arecont Vision as a key part of that protection. Arecont Vision Megapixel Camera Benefits Made in USA quality, advanced technology, and field upgradable features/capabilities Deter and detect threats and document activities Maintain situational awareness and security with fewer cameras Improve staff productivity Low profile/discreet surveillance or high visibility camera choices Resolve security/staff and customer disputes Protect staff, travelers, customers, equipment, and goods Increased detail equals better forensics and reduced time from police, 1st responders and security professionals in immediate response and for post-event investigations Monitor daily business and document activities and patterns Forensic documentation Provide enhanced security, situational awareness, life safety Prevent or disprove fraudulent claims Tight integration beyond ONVIF certification with hundreds of security vendor applications jointly tested via the Arecont Vision MegaLab™ Arecont Vision's megapixel cameras have been deployed at highways and cruise ship terminals Transportation Applications Remote surveillance Live monitoring and forensic viewing Monitoring of airports, ports and harbors, railway stations, roads and railways, bridges and tunnels, vehicles Passenger, luggage, freight, storage, and cargo areas Open spaces, indoors and out Parking lots/structures/rail yards/runways Concourses and corridors People/vehicle counting/monitoring License plate/facial recognition What Arecont Vision’s Customers Say “We selected Arecont Vision cameras because of their proven performance for the last year and a half on another Malaysian highway application,” comments Norisham Abdul Majid, CQR Digital Solutions, integrator for the Malaysian Highway Tollgate System. “Arecont Vision’s megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta,” adds Karim Cassar, Alberta Group, Malta. “Ease of installation, compatibility with our current VMS, and the new features [including] Wide Dynamic Range. Our experience has been great," states Safraz Samad, TPA Operations – Security Administration, Tampa International Airport. "Our organization requires high levels of security and with Arecont Vision’s updates to firmware we can maintain our internal network security policies.” Save Save Save Save
Customer Jebel Ali Port is the flagship port of DP World, a leader in international marine terminal operations and development, logistics and related services. The port is the world's largest man-made harbor and the largest container port between Rotterdam and Singapore. Located 35 kilometers to the southwest of Dubai on the United Arab Emirates Arabian Gulf coast, the port’s strategic geographic location has enabled it to act as a maritime link between the Middle East and the western hemisphere. It is a technologically advanced facility, employing state-of-the-art equipment and is a model for the industry and the region in everything from size to efficiency and security. Challenge The DP World marine control tower at Jebel Ali is an important facility for monitoring and controlling the movement of vessels in and out of the port. Physical security at the control tower was in need of upgrading and, in keeping with requirements mandated by Jebel Ali Port Security, DP World conducted a security risk assessment to determine how best to improve security at the site. Based on the assessment, DP World recommended an external video surveillance system. A basic design was developed that included 13 analog day/night box cameras and two outdoor pan-tilt-zoom (PTZ) cameras. Upon review, DP World concluded that the installation of this analog video surveillance system would also require the services of civil and electrical personnel for cabling and power needs. These additional services would add to the overall system costs as well as potentially increase the time frame for completion. DP World shelved the analog proposal and initiated a search for a more technically advanced video surveillance solution. They needed a camera system that would thoroughly cover the designated areas; require little or no external services or personnel for installation/maintenance; offer features and functionality that would enhance monitoring and operational control; be reasonably priced and ultimately provide greater detail and picture quality than would a typical analog system. Megapixel Solution DP World moved forward on the project with a new solution featuring megapixel cameras from Arecont Vision. When comparing the Arecont Vision megapixel system to the original analog system, it was evident that while the analog cameras were priced less than megapixel cameras on a per camera basis, they deliver less value when a total system cost was evaluated. The new design included two AV8185DN 180° day/night panoramic 8-megapixel dome cameras, two AV10005DN day/night 10-megapixel MegaVideo® Compact box cameras and four AV2105DN day/night 2- megapixel MegaVideo® Compact box cameras. Compared to the original design that included 13 analog cameras, the six-camera Arecont Vision megapixel system provided greater coverage with fewer cameras and significantly higher resolution images. The ability to digitally zoom into live scenes and recorded video while maintaining high resolution and wide area coverage also eliminated the need for PTZ cameras. And with Moonlight™ mode, the cameras automatically shift from color to black and white as ambient light diminishes. Megapixel Benefits Because the megapixel network cameras are PoE (Power over Ethernet) capable, the need for separate electrical cables to provide power was eliminated. Power and data is conveyed over a single network cable per camera. Using fewer cameras to effectively cover the same area also translated into infrastructure cost savings in containment works, cables and installations, which actually brought down the original cost of the system by nearly 20%, easily reflecting an improved return on investment (ROI). In addition to these advantages, the megapixel solution also contributed towards a greener environment because of fewer cables and less hardware that was needed. The Arecont Vision megapixel camera system provides superior performance and imaging capabilities than the analog system and most importantly, proved to deliver the most cost-effective video surveillance solution with tangible benefits and ROI.
"It is important that our security system fulfills our customers' extremely high safety requirements." - Jens C. Andersen, IT Manager, DAN'X DAN'X (Day And Night eXpress distribution) is a private transport and logistics company that specializes in night distribution of reserve parts for the IT industry. DAN'X provides 24-hour express delivery of components and accessories for a wide variety of businesses within the IT sector. With three large locations in Denmark, they can ensure that their customers get fast and professional service. The Challenge At DAN'X the customer is the central focus, and no two customers are alike. This presents tough demands for DAN'X on all fronts – also pertaining to security. The customers have strict security requirements to be fulfilled, and with the three widespread locations, DAN'X has more complex security issues to resolve. The Solution AC Sikring A/S has put together a solution that is totally network based, which provides DAN'X central management and coordination along with the option for eventual integration with other security devices and systems. For the solution, they chose the newest Milestone XProtect® Enterprise software, which is based on an open platform. The camera choices are a mix of different models relevant for where and what each individual camera has to monitor. The Advantages DAN'X has chosen a security solution that is future-safe and very flexible. The system has many development options, which make it possible to add new cameras anytime – quickly and easily. At the same time, the solution allows users to find evidence of any incidents through searching the images by date and time. The DAN'X customers themselves check that their high security demands are being upheld by regularly visiting the company locations. This naturally makes security a success criterion at DAN'X that has the highest priority. It is also the reason that DAN'X has chosen to build up their existing security system with a thorough upgrading to the newest technology and equipment. This dedication also shines through in the DAN'X choice of an IP video surveillance system for their security monitoring, designed to work now and in the future – only the best is good enough. The Partner Of Choice When it was decided at DAN'X to upgrade the old security system, there was no doubt for them that AC Sikring A/S would be their trusted supplier. They gathered offers from other installers, and received many good suggestions, but AC Sikring was chosen for the great flexibility and future-safe technology of their solution. "We were allowed to choose our own server, and this was one of the determining factors that settled our decision to use AC Sikring" says Jens C. Andersen, IT Manager at DAN'X. "AC Sikring uses solutions that are user friendly, which is a big plus for me, and they gave me the ability to put together the elements and take part in the installation and setup itself. I also knew AC Sikring well, as they were our previous security installer!" The New Solution "I knew about Milestone already, and was well aware that the software provides great flexibility, which means that we get things exactly as we want them." explains Jens C. Andersen, IT Manager, DAN'X The very high security requirements from the customer side made it especially important to choose the right solution from the start. "There has been no compromise – we have chosen the best of the best," states Jens C. Andersen. Every location had to be secured individually with an eye to building the system for a centralized management approach. An important feature for all the locations was that there should be the ability to monitor specific areas depending on each situation. In general, DAN'X demanded that the system perform with more images – in color – and more options for setting up the system. Flexibility was a critical parameter, which is exactly why Milestone XProtect Enterprise software was chosen. "I knew about Milestone already, and was well aware that the software provides great flexibility, which means that we get things exactly as we want them." explains Jens C. Andersen. "Furthermore, the system has many expansion possibilities that allow us to add new cameras whenever we want. It can also handle more than 1,000 images per second – fast and easy." Many Benefits The new software has given DAN'X the ability to work faster, more precisely and more effectively. They can find specific incidences by searching the archived image database by time and date. "This makes the daily work so much easier for me: I just search for a particular time or location, and can find the particular event quickly. With the help of megapixel cameras, I can now also see the smallest details, if necessary," adds Jens C. Andersen. "We had a really good dialog with AC Sikring, and they have been very flexible regarding all of our changes and customizations," reports Jens C. Andersen, who is looking forward to using the new security system as part of the company's daily procedures. Future Developments Since DAN'X is a company in constant growth, they already have plans for continual expansion of their surveillance system, including integration with their alarm system. In addition, there are plans in the near future to move the monitoring to a central video and guard service called Security Point from AC Sikring, in order to achieve an even higher level of security round the clock, 365 days a year, with visual verification. The result of their customers' high demands for security and their regular security checks at the locations is that DAN'X has put their security in the driver's seat, and established the best possible security system that can be found, installing a top professional surveillance system for today – and tomorrow!
Customer Malta's Grand Harbor into Valletta provides access to cruise ships. Passengers are greeted in this group of islands in the central Mediterranean with a view of ancient cream-colored buildings along twisting streets and hillsides, with limestone battlements, crenellated castles and ancient forts still guarding the harbor entrance, all reflecting 7,000 years of the islands' sometimes turbulent history. Today, the Valletta waterfront combines state-of-the-art sea passenger terminal facilities with shopping, dining and entertainment venues. It's a 24-hour destination that is consistently teeming with activity, and hundreds of thousands of cruise passengers from around the world visit every year. Challenge The complexity of the existing infrastructure, weather conditions and sheer scale of the overall installation were a significant challenge for securing the port and its surrounding areas. A facility big enough to accommodate large ocean liners obviously needs expansive video coverage, but the superior resolution provided by Arecont Vision cameras enables fewer cameras to cover very large areas. Surveillance operators at the cruise terminal can zoom in – live or even on archived video – and see the details of various areas in an image while still preserving the full image. Megapixel Solution A recent upgrade to the terminal's surveillance system included installation of 50 megapixel cameras from Arecont Vision, the first and largest installation of 5 Megapixel cameras in the Maltese Islands. The 3.0 megapixel cameras utilized in this installation send video along an information network providing greater resolution than images from conventional network cameras. In fact, the 3.0 megapixel cameras provide images with 10 times the resolution of standard VGA network cameras. Full-motion high-definition digital video combines superior image quality with manageable bandwidth and storage requirements. The system was installed by Alberta Group, Malta's leading provider of fire, safety and security systems. Alberta specializes in custom solutions to resolve their customers' specific problems and to decrease customers' exposure to risk. The Arecont Vision AV3100 provides image processing at billions of operations per second and can output multiple image formats to allow simultaneous viewing of the full resolution field of view and regions of interest Arecont Vision's MegaVideo technology enables coverage of large areas with extreme detail. The Arecont Vision AV3100 provides image processing at billions of operations per second and can output multiple image formats to allow simultaneous viewing of the full resolution field of view and regions of interest. The cameras provide four times the resolution of standard IP cameras with the ability to output full real-time frame rates. The 3 megapixel Arecont Vision AV3100 cameras used at the cruise ship terminal in Malta provide 2048x1536-pixel progressive scan images at 15 frames per second. "Alberta invests a great deal of money and resources into developing and evaluating the best technological advances to provide superior performance to our customers," said Karim Cassar, Alberta's Technical Research Executive. "Arecont Vision's megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta." Megapixel Benefits: The cruise ship at Valletta deployed the latest megapixel camera technology from Arecont Vision to secure its port and surrounding tourist areas. The system deployed delivers wide area video coverage with superior resolution and cost-efficiency. With the new system, surveillance operators can zoom in on live or recorded video to see detailed images of any scene."Arecont Vision cameras provide unparalleled image quality and resolution for applications world-wide, and their ability to boost image resolution without taxing bandwidth or storage resources is documented at the cruise terminal in Malta," said Steven Sarfati, Senior Vice President of International Sales at Arecont Vision. "As throngs of passengers travel through the terminal on their way to an historic experience in Malta, Arecont Vision cameras will be keeping a watchful eye with HD resolution."
With successful installations already in full operation on Shanghai Metro's Line 6 and Line 9, access control specialist TDSi, in partnership with its distribution partner in China, ZDX, has now begun work on the system installation for Line 7. Shanghai Metro is one of the newest and fastest growing rapid transit systems in the world, with 162 stations and over 225km of track running both above and underground. On average, well over two million passengers use the system everyday - with future expansion set to see that number increase to over three million. The latest addition to the network, Line 7 is scheduled to be commissioned into service at the end of 2008, and will connect the Baoshan District with the city center and Pudong District. Significantly, it will also provide a vital link to the site of the World Expo, which is being hosted by Shanghai in 2010. Over the last three years, TDSi and ZDX have developed and supplied fully integrated access control solutions for Lines 6 and 9. Each Line is served by over 40 stations as well as its own Operational Control Centre (OCC), with around 2,000 doors secured and controlled by TDSi's systems on each line. Commenting on the programme, TDSi's Managing Director, John Davies, said: "The Shanghai Metro is a very significant and high profile infrastructure programme, representing one of the largest access control projects across the whole of China. With two lines having been in operation for over a year, we were delighted to be awarded the contract for Line 7 - a real demonstration of the performance and quality of our systems, in very demanding conditions." The access control solution for the project features TDSi's EXpert controllers, EXgarde Enterprise software platform and MIFARE® smart card readers. Specified for their proven performance in high capacity applications, EXpert delivers a fully featured and networkable system. Each controller has a capacity of up to 48,000 cards and provides fast and effective access control to projects such as the Shanghai Metro, which has consistently high volumes of users passing through multiple access points. The OCC and each station's controllers are programmed via EXgarde Enterprise, TDSi's latest advanced access management software application. Each station is capable of operating independently of the server in cases where communications are lost - a key requirement in the specification for this particular project. Featuring database replication for powerful disaster recovery capabilities and total peace of mind, EXgarde Enterprise allows all real-time events and system parameters to be stored both at the main server in the local OCC and at each individual station. However should communications be lost between the center and any of the individual stations, changes and events are stored at the local stations until communications to the main server are re-established, at which point, the databases are re-synchronised. EXgarde Enterprise allows the system to be managed centrally, even where the Wide Area Network (WAN) may be of variable quality, effectively removing the risk of single point failure. TDSi MIFARE®smart card readers are employed throughout each Line. Providing true contactless technology, the readers provide an extremely cost efficient, highly reliable solution that also allows for straightforward expansion in the future - for example, allowing the same access control card to be used for cashless vending and car park management, offering users a true, one-card solution. Finally, the system provides both security and facilities managers with complete control and reporting capability for each line - both centrally and locally.
Metro São Paulo, consisting of five different lines, 55 stations and extending to over 60 kilometers of rail networks, was looking for a sophisticated electronic monitoring solution to increase the security of its passengers -in a city where violence rates are very high. In order to assure higher security levels, Metro SP decided to increase the number of cameras installed in a widely spread network of locations.In addition the customer wanted to introduce digital video recording technology which they had not been using before. In locations were human security is critical, Bosch solutions are the first choice for customers. Bosch monitoring solutions set new standards in performance, quality and state-of-the-art technology. Metro São Paulo’s new monitoring system is equipped with a Bosch CCTV system including 138 cameras, whereof 121 are fixed and 17 are dome cameras. The solution provides high levels of technology and system integration, offering an excellent monitoring solution for Metro São Paulo. They are managed by ten DiBOS Digital Video Recorders and a BIS Video Engine. Built-in scripting and application programmer's interface (APIs) allow easy enhancement with the existing monitoring system. The highly efficient video management system is monitored via the Security Control Center of the subway, which now serves as a model for transport monitoring in the region. The Control Center monitors almost 200 cameras, using a ring gigabyte network. Two control posts are constantly monitoring the five metro lines via six monitors and two plasma screens. Using state of the art digital recording and communication technology, Metro staff can now retrieve vital images and share information faster than ever before! They can better access critical situations and take appropriate actions immediately. The solution provides high levels of technology and system integration, offering an excellent monitoring solution for Metro São Paulo. The principal customer need - to increase the security of its passengers - has been fully met. The Metro Security Control Center now serves as a model for state-of-the-art transport monitoring solutions in Brazil.