Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduc...
3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European mar...
Echodyne, the manufacturer of innovative, high-performance, small electronically scanned array (ESA) radars for government and commercial markets, has announced that it will demonstrate enhanced airspace situational awareness by visualizing EchoGuard sensor data through augmented reality at AUVSI XPONENTIAL 2019 in Chicago, IL. The UAV systems company will showcase the technology at Booth #2805 from April 30th to May 2nd, 2019. AUVSI XPONENTIAL 2019 At AUVSI XPONENTIAL 2019, Echodyne will disp...
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security ag...
Dahua Technology, a video-centric smart IoT solution provider, has announced the addition of targeted vertical market solutions in the North American market. Vehicle inspection is one area where contemporary technology is rising to address a critical need. Preventing restricted items from entering high-security environments has traditionally been limited to the use of mirrors and police dogs, where blind spots and human error put detection at risk. In order to combat this problem, Dahua Technol...
The 3rd edition of Intersec Saudi Arabia got underway with 111 exhibitors from 20 countries zooming in on the Middle East’s largest commercial security and fire safety market. Running for three days at the Jeddah Centre for Forum and Events, Saudi’s foremost security, safety, and fire protection trade show targets the Kingdom’s vast market which is estimated to grow at an annual compound growth rate of 7.7 percent over the next seven years. It was opened yesterday in a pre-sho...
Dahua Technology, a video-centric smart IoT solution and service provider, showcases a wide range of competitive product portfolios and smart solutions to top security professionals during the International Security Conference and Expo (ISC West) at booth #14039 from April 10th to 12th. Dahua will also celebrate the fifth anniversary of its USA subsidiary on Wednesday evening, showing strong commitment to the local markets. Running with the theme ‘Empowering through Technology’, the Dahua products and technologies exhibited during ISC West are comprehensive from every aspect covering major surveillance market demands with the most advanced technologies. Competitive Product Portfolios Facial Recognition - Dahua Facial Recognition technology integrates face recognition, blacklist alarm, stranger alarm, VIP recognition, face tracking, face search, metadata search and other functions to offer a series of smart products including the exhibited AI Smart Capture Camera, 4MP Starlight Face Recognition IR Dome AI Network Camera and IVSS series for various scenarios and customer demands. Low - light Technology - Featuring advanced Starlight technology, Dahua starlight+ products are able to provide excellent colorful image and rich details even at night, solving the problem of poor color reproduction of images under low illumination environment with image color reproduction, large aperture, ultra-high sensor, white light and other technologies. Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurementThermal Technology - Through a new integration of visible-light and thermal-light and a variety of AI-enabled intelligent functions, Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurement. Combined with the back-end storage NVR and DSS PRO, Dahua Technology can provide an all-in-one system with front-ends, storages, and intelligent analytics to meet the requirements of customers. Smart Tracking - Dahua radar system consists of radar and speed dome camera (PTZ). On the basis of traditional CCTV security system, it combines the accurate target tracking performance of the radar products to provide a complete solution with front-end data acquisition, edge computing and back-end storage for a wide range of applications such as prison perimeter, airport runway, industrial park, energy pipeline and other important protection areas. Wide Area Security - The Dahua Multi-sensor Series Cameras can be used for large scene monitoring, target tracking, simple management and multi-service convergence. The Dahua 4x2MP Multi-sensor Cameras possess ground-breaking flexibility that can simultaneously move each sensor module around the internal track for a 180-, 270-, or 360-degree panorama, minimizing blind spots for an improved situational awareness, which is ideal for parking lots, supermarkets and intersections, etc. HDCVI 5.0 - The recently launched Dahua HDCVI 5.0 brings five core values: Perimeter Protection, Face Recognition, Metadata Search, Active Deterrence and Starlight & Full Color. Perimeter protection can identify humans and vehicles while filtering less important objects, face recognition let authorized persons to pass freely and can do immediate action to strangers, with the latest AI technology we make video surveillance more efficient and easy to use. AI-enabled Intelligent Solutions Featuring the above technologies, Dahua Technology also presented integrated solutions for a variety of vertical markets at the Expo. Intelligent Retail Solution - Dahua Smart Retail Solution applies video intelligence technology to specific retail business scenarios. According to the scenarios of large chain supermarkets, we have developed five smart application scenarios including smart entrance and exit, shelf advertising, cashier loss prevention, operation analysis and remote shop patrol to help retailers optimize store layout and product display, improve storage efficiency as well as attract traffic flow. Intelligent Logistics Solution - Dahua Intelligent Logistics Solution takes Dahua video technology as the cornerstone, combine intelligent analysis technology, machine vision technology, big data technology, etc. to further divide into five sub-solutions including machine vision DWS solution, video tracking solution, vehicle entrance solution, park surveillance solution and logistics vehicle solution for different application scenarios. Intelligent Residential Solution - Dahua Intelligent Residential Solution provides an integrated and economic solution with multi-level protection including personal entrance, vehicle entrance, public area, unit security, home protection and control center to make people’s life more convenient, safer and smarter while improving operation efficient and saving energy for property owners. Intelligent Critical Infrastructure Solution - Dahua Intelligent Critical Infrastructure Solution offers an end-to-end solution featuring perimeter protection, thermal measurement, access control, video surveillance and auto-tracking system for electric power stations, oil and gas industries to ensure the safety of their daily operations, timely detection of terrorist threats and fire, quickly and easily viewing station status. Intelligent Education Solution - Dahua Intelligent Education Solution brings a new concept of pre-warning for campus administrators. The solution incorporates important scenario applications empowered by AI technology such as perimeter, entrance, public area, building and classroom to realize threat prediction, effective management of people and vehicles, establishing a secured and smart system for students and teachers while improving operation efficiency. Reliable security solutions Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users" Empowering signifies Dahua Technology’s dedication to promoting customer satisfaction and partner development. While market demands are constantly evolving, Dahua Technology’s offering is also evolving to meet current and future needs, giving partners and end-users the assurance that they’ve selected competitive and reliable security solutions on the market. “Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users,” Tim Shen, Director of Marketing at Dahua Technology USA, explained. “In addition, the resources we make available to our dealers ensure that they are up-to-speed on their knowledge of our technology and fully trained on the products.” To further address Dahua Technology’s social commitment locally, a group of the staff from Dahua Technology USA will participate in The Security 5KRun / 2K Walk organized by charity group Mission 500 on the morning of April 11th. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua Technology will continue to focus on ‘Innovation, Quality, and Service’, to serve partners and customers around the world.
As the industry looks for effective, integrated solutions that improve security and enhance business, Axis Communications, a provider in network video, plans to announce the debut of new products and solutions at ISC West 2019. These products include new developments in network audio, multidirectional and infrared (IR) camera capabilities, and access control technology, highlighting Axis’ commitment to taking a leading role in the security industry. “It is always a privilege to attend ISC West, and this year we look forward to showcasing a number of exciting new products and solutions,” said Fredrik Nilsson, VP, Americas, Axis Communications, Inc. “Building a smarter, more secure world--by providing all of our stakeholders with the solutions that they need to succeed--is our primary goal. We are eager for another opportunity to reach more people face-to-face while demonstrating some of the new security innovations that we’ll be releasing soon.” AXIS P3719-PLE is able to capture images with exceptional sharpness and clarity regardless of lighting conditions Multidirectional Camera Coverage The multidirectional, four-channel AXIS P3719-PLE Network Camera features Quad HD resolution and a 30 FPS framerate and is capable of providing 24/7, 360-degree coverage. This easy-to-install outdoor camera can be either recessed or corner mounted and comes with an integrated IP66/IP67-rated weather shield. Axis Lightfinder technology, WDR, and 360-degree IR illumination ensure that AXIS P3719-PLE is able to capture images with exceptional sharpness and clarity regardless of lighting conditions. AXIS P3719-PLE incorporates four varifocal camera heads, allowing the camera to easily monitor four different directions, and is able to provide high-quality 360-degree overviews or a combination of overviews and detailed close-ups. The AXIS P3719-PLE is highly cost effective, essentially providing the benefits of four cameras in one. Advancements In Network Audio Network audio is widely used for functions including security, announcements, and background music AXIS C8210 Network Audio Amplifier makes migration from traditional to network audio systems smart and easy by enabling any passive speaker to benefit from the same feature set as Axis network speakers. By pairing the AXIS C8210 with AXIS Audio Management Software, users can enjoy benefits that include flexible zoning, managing and monitoring all audio devices from a single interface and easy integration to systems like SIP, VoIP, and camera systems. Additional product benefits include an amplifier with built-in equalizer, 15W power output for up to eight speakers, support for health monitoring, and an I/O and SD-card slot. Network audio has extensive applications, and is widely used for functions including security, announcements, and background music. Heavy-Duty IR Capabilities In response to demand for more heavy-duty PTZ cameras with built-in IR illumination, Axis is launching the new AXIS Q6215-LE PTZ Network Camera. The camera comes with a half-inch sensor and combines high-quality imaging with fast pan, tilt, and zoom functionalities. AXIS Q6215-LE features long-range OptimizedIR technology alongside IR LEDs capable of adjusting to the camera’s zoom, enabling superior video quality at up to 1,300 ft., even in low light or complete darkness. AXIS Q6215-LE features a robust design capable of withstanding difficult weather conditions, including wind speeds of up to 150 MPH, making it ideal for open-area surveillance such as airports, harbors, and highways. AXIS A8207-VE integrates with other systems and solutions, including video management and access control Multifunction Door Security AXIS A8207-VE Network Video Door Station represents the evolution of the traditional door station, combining access control, two-way audio capabilities, and a 6 MP security camera in a single device. The station also includes an integrated RFID reader for easy employee access and enables remote entrance control using a computer, phone or mobile device. AXIS A8207-VE reduces the number of devices needed at the door while supporting analytics including motion and sound-based detection, which can be used to trigger events including verbal greetings or recordings. Additional benefits include a built-in keypad for dialling and PIN verification, acoustic echo cancellation and noise reduction, and SIP, VAPIX, and ONVIF compatibility. AXIS A8207-VE easily integrates with other systems and solutions, including video management, access control, and VoIP communications. These and other products and solutions will be showcased at ISC West 2019 in Axis’ booth #14051.
The Security Industry Association (SIA) has selected the SIA Women in Security Forum as the recipient of the 2018 Chairman’s Award, which recognises SIA members’ diligent efforts in furthering the SIA mission and overall commitment to the association’s future. SIA will present the award at The Advance, SIA’s annual membership meeting, during ISC West. Supporting Professional Development The leaders of the forum have demonstrated outstanding engagement of SIA membership" The SIA Women in Security Forum supports the advancement of women in the security industry through programs and opportunities for professional development, networking and thought leadership. The group – led by a dedicated committee of volunteers – was established on International Women’s Day in 2018. “The Women in Security Forum got off to a remarkable start in its first year by quickly and effectively building the program, forming a charter and developing a strong committee,” said Scott Schafer, chairman of the SIA Board of Directors. “The leaders of the forum have demonstrated outstanding engagement of SIA membership and the security industry, planned and executed top-quality, well-attended events and advanced the mission of promoting professional development, mentorship and a path to success for women in the security industry.” Security Forum Offerings Key Women in Security Forum offerings include the SIA Progress Award, which celebrates individuals who advance opportunities and pave the way to success for women in the security industry; networking and professional growth events for women in the security industry; SECURE Perspectives, a monthly column that supports the participation of women in the security profession by highlighting successful women in the industry; and an all women-authored issue of the SIA Technology Insights journal. Talented Industry It is exciting to see our efforts come to fruition during the most important security event of the year" “The Women in Security Forum is thrilled to be recognised with the 2018 Chairman’s Award as we celebrate our first anniversary. We are working diligently to create a movement by collaborating with industry leaders – men and women – to develop programs and initiatives that empower women and influence change,” said Maureen Carlo, co-chair of the Women in Security Forum Steering Committee. “Thank you to SIA for allowing us to embrace this opportunity; it is exciting to see our efforts come to fruition during the most important security event of the year. A talented and diverse industry will grow when we support each other – the best is yet to come!” Networking And Insights At ISC West, members of the Women in Security Forum will participate in two panel sessions on women in security on Tuesday, April 9 – ‘being a woman business owner in the security industry is an advantage, not a disadvantage’ and ‘bridging the gender gap in the security industry’. The Women in Security Forum will also host its annual meeting and a complimentary breakfast event on Friday, April 12, featuring networking and insights from special guest Juliette Kayyem, a national leader in America’s homeland security efforts. Kayyem previously served as President Obama’s assistant secretary for intergovernmental affairs at the U.S. Department of Homeland Security and Massachusetts Governor Deval Patrick’s homeland security advisor. Diversifying Leadership In Security “Over the last year, the core leadership group that makes up the Women in Security Forum has come together to create a unique opportunity to diversify the leadership voices in security as we move toward the next iteration of innovation for our industry and beyond,” said Dawne Hanks, co-chair of the Women in Security Forum Steering Committee. Providing opportunities for fresh voices to take the lead in driving where we go" “Providing opportunities for fresh voices to take the lead in driving where we go and how we change the world is at the heart of what we are trying to do and will drive growth for the future. I am honored that SIA has seen fit to present the Chairman’s Award to this esteemed group of women that, together with SIA, are looking to drive actionable change to diversify and grow our industry.” SIA’s Women in Security Forum offers programs, professional opportunities and networking and professional growth events to celebrate and advance the involvement of women in the security industry. Any employee of a SIA member company – regardless of gender – is eligible to join the forum. ISC West The Advance 2019 will take place during ISC West on Tuesday, April 9, from 10:30 to 11:30 a.m. in the Sands Expo Center in Las Vegas, Nevada. All SIA members are invited to attend. In addition to the presentation of the Sandy Jones Volunteer of the Year Award, attendees will enjoy a high-impact presentation from Sal Mani, security systems manager for Google, on the workforce imperative of developing cross-functional skill sets to stay competitive in the security industry. SIA will also submit five nominations to the SIA Board of Directors for ratification and present the SIA Milestone Awards, Sandy Jones Volunteer of the Year Award, Member of the Year Award and Committee Chair of the Year Award. Attendees of The Advance will also receive complimentary lunch and have the opportunity to network with industry colleagues.
Code Blue Corporation’s No. 1 goal in the future remains the same as it was on our first day: Your safety. Founded in 1989, Code Blue is pleased to be celebrating its 30th anniversary as the manufacturer of emergency communication solutions. Code Blue was founded when the University of Illinois at Chicago selected our new signature design from several candidates for a project that involved the installation of security standards on campus. From there, the trademarked cylindrical pedestal that is now commonly known as the ‘Blue Light Emergency Phone’ was born, and it remains a security standard at thousands of education, corporate, hospital, airport and municipal locations around the world. Shifting Technological Landscape “Our goal remains the same for the future: provide increased levels of flexibility, scalability and interoperability without sacrificing the reliability and durability that is synonymous with the Code Blue brand,” CEO David Cook said. “We want to use our 30 years of experience to help locations continue to enjoy the value of safety and security.” Over the years, Code Blue has greatly expanded its product line to adapt to the shifting technological landscape. That includes embracing the popularity of IP technology, which can be seen in Centry, our newest Help Point that integrates an IP colour camera into the faceplate. It’s the latest in a long line of moves designed to strengthen Code Blue’s position in the security industry and advance with the ever-changing needs of its customers. In 1997, for example, Code Blue developed its first hands-free analog emergency speakerphone, and in 2010 launched its IP speakerphone line. The ToolVox Media Gateway made its debut in 2009, while Blue Alert MNS (Mass Notification System) was released in 2013.
Raytheon Company (RTN) and German sensor specialist HENSOLDT, both globally renowned air traffic radar providers, are on path to provide two European customers integrated air surveillance radars that combine HENSOLDT’s next-generation primary airport surveillance radar (ASR-NG) and Raytheon’s Mode S monopulse secondary surveillance radar (Condor Mk 3). World Air Traffic Management Congress 2019 As reported by both companies at World Air Traffic Management (ATM) Congress 2019 in Madrid, the Royal Netherlands Air Force will receive one system that will provide both advanced air traffic control and wind-farm interference mitigation at De Kooy airfield. Deutsche Flugsicherung (DFS), the German air navigation service provider, will receive three systems to replace aging radars as part of the country’s air traffic control modernization efforts. Jointly, both companies intend to offer high-performance ATC solutions to customers worldwide The contracts demonstrate the success of a cooperation agreement Raytheon and HENSOLDT signed only one year ago. Jointly, both companies intend to offer high-performance ATC solutions to customers worldwide as well as services and enhancements to the installed base of the ASR-11 digital air surveillance radar in the US. Advanced Air Traffic Control System “Our goal is to make the global airspace safer by creating the world’s most advanced air traffic control system,” said Matt Gilligan, vice president of Navigation, Weather and Services. “HENSOLDT’s primary radar provides almost four times the volume coverage when compared to others, and that’s something our customers want.” Together, HENSOLDT and Raytheon bring to market over a century of combined experience in global air traffic control solutions. As a radar specialist we have a track record of numerous successful ATC programmes" “As a radar specialist we have a track record of numerous successful ATC programs”, states Erwin Paulus, head of Radar/IFF at HENSOLDT. “Together with Raytheon we are able to offer customers very attractive systems solutions”. Air Traffic Control And Identification Solutions HENSOLDT supplies customers all over the world with air traffic control and identification solutions for military and civilian applications. Amongst others, the company has equipped the German Armed Forces’ airfields with the ASR-S (Airport Surveillance Radar, S-Band) airport surveillance radar and is delivering a complete approach control system for the military airfields in Switzerland. HENSOLDT’s ATC radars are under contract by Australia, Canada, the UK Austria and Portugal.
Princeton Identity Inc., the identity management company, announces the new IOM Access200w iris recognition reader, an environmentally sealed and impact resistant model designed for use outdoors as part of the company’s IOM Access200 biometric identity product family. The IOM Access200w is the first outdoor solution of its kind, which when integrated with access control platforms, allows customers to unlock exterior building doors without removing gloves or reaching in pockets to find access cards while delivering the superior security of iris recognition authentication. External Card Readers The IOM Access200w features an easily configurable PIN pad, integrates with external card readers, and provides immediate feedback to users with face capture. The reader is suitable for use in heat, cold, humidity, direct sunlight and low light conditions. The IOM Access200w processes subjects almost as quickly as the blink of an eye With its patented technology, the IOM Access200w processes subjects almost as quickly as the blink of an eye. Ideal for a wide range of applications, including college and corporate campuses, critical infrastructures, correctional facilities, airports, data centers and more, the IOM Access200 system’s distributed architecture allows users to network any number and combination of indoor and outdoor readers throughout a facility or multi-site environments. Securing Internal Spaces “Princeton Identity is pleased to be first to market with a biometric identity solution that offers the convenience, speed and security of iris recognition for use on building exteriors. Outdoor entryways are often the first areas of concern when designing a security program, and now our customers can leverage the use of this golden biometric on these exterior locations as well as for securing internal spaces,” said Bob McKee, Princeton Identity’s VP of Sales and Marketing. “With the addition of our new IOM Access200w reader, Princeton Identity offers a true end-to-end identity management system that’s unparalleled in its accuracy, security, convenience and flexibility, and an ideal enhancement to any facility’s access control and physical security solutions.” The IOM Access200w will be introduced at ISC West in Las Vegas, April 10-12. See it at the Princeton Identity booth 7079.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticized by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The Rise In Knife Crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, while the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police Systems Benefiting Crime Investigations This is where facial recognition can offer up additional intelligence. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognize an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognize and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling Addiction And How Facial Recognition Can Help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilizing Facial Recognition At Airport Security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhile some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. While the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – while ignoring everyone else.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualization Within Hyperconverged Systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualization software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why A Virtual Machine Can Aid Your Server Solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualized Server Stacks From BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimized hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualization in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualization process, the virtual machine and the underlying physical hardware must be optimized to account for the virtualization process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission Critical Video Surveillance Solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralized storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralized data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate Access To Video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance Of Video In Risk Mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying The Right Video Server Equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyze the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportationTests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
Ports of Jersey operate the island’s busy harbors and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harboring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totaling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doorsTo drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
With roots dating back to the year 1948, Italian pharmaceutical company Alfasigma is dedicated to advancing the state of healthcare under the company motto, ‘Pharmaceuticals with Passion’. Headquartered in Bologna, the multinational corporation was created in 2017 by the merger between Alfa Wassermann and Sigma-Tau. As a result, Alfasigma now employs about 3,000 people and markets a wide range of therapeutic drugs in 18 countries including the US, China, Russia and several European countries with annual revenues of EUR 1.06 billion. In order to keep up with the company’s ongoing evolution while emphasizing building protection, Alfasigma decided to update the infrastructure of its corporate offices in Milan and Bologna. This large-scale remodeling project also required updating the fire alarm, intrusion detection and video security systems at both facilities to the highest standards. Security Cameras For Outdoor Surveillance On the exterior of the buildings, FLEXIDOME IP starlight 7000 VR cameras were installed to provide 24/7 securityAssuming a long-term perspective, Alfasigma management headed into the project with three key requirements: First, saving cost by refurbishing already installed system components such as intrusion and fire alarm detectors. Second, accommodating for future building expansions and saving additional costs by installing a future-proof and scalable system. And third, adding around-the-clock security to the building’s exterior through modern security cameras built for outdoor use. For this reason, Alfasigma commissioned Bosch as the one-stop provider to equip the Milan office – home to the International Division – as well as corporate headquarters in Bologna with an IP-based solution. The video security set-up includes high-definition DINION IP 5000 HD cameras connected to recording stations and offering 1080p resolution images at 30 fps. On the exterior of the buildings, FLEXIDOME IP starlight 7000 VR cameras were installed to provide 24/7 security. Recording at 1080p and 60fps, the cameras incorporate starlight technology to deliver relevant images even in challenging light conditions. Extremely weather-resistant, water-tight and able to withstand high impacts, the cameras are highly suited for outdoor use, confirmed by IP66, NEMA type 4X and IK10 rating and installation in mission-critical environments such as airports and government buildings worldwide. MAP 5000 Installed With LSN Detectors The new fire alarm system is interfaced with the voice alarm system Plena via Smart Safety Link“The video surveillance products are excellent and have impressed me the most. We are very satisfied, above all, with the high quality of the products,” said Stefano Borsarini, Facility, Maintenance and EHS Manager at Alfasigma facilities in Bologna and Milan. The cameras are supplemented by the intrusion panel Modular Alarm Platform MAP 5000 installed with LSN detectors – a large portion refurbished from the legacy system – to safeguard Alfasigma’s offices at night. Fire alarm is provided by the Modular Fire Panel 5000 Series with four loops, processing signals from 190 fire alarm detectors and 28 manual call points. The new fire alarm system is interfaced with the voice alarm system Plena via Smart Safety Link thus optimizing the operational security via a monitored connection. Successfully installed and customized according to client specifications, the Bosch fire alarm, intrusion detection and video security solution maintains the safety of Alfasigma’s employees and property at both sites. It also fulfills the key customer requirement of accommodating for future expansions in a modular, IP-based system that is able to keep pace with Alfasigma’s rapid evolution as an innovative multinational company.
HID Global®, a worldwide provider in trusted identity solutions, announced that the government of Tanzania has selected HID’s citizen ID solutions to add e-Visa and e-Permit capabilities to its e-Passport, which HID helped deploy last year as part of the Tanzania e-Immigration program. The new web-based visa and residence permit services allow visitors and residents to apply for and receive validated credentials for traveling or living in the country. Integrated e-Immigration Solution “This is an important milestone as we continue to work with HID Global to enhance and broaden the capabilities of our e-Immigration ecosystem,” said Dr Anna Peter Makakala, Tanzania’s Commissioner General of Immigration. “We plan to continue expanding this solution to our country’s border crossings and across the broader global community as we become a showcase for efficient, comprehensive and integrated e-Immigration solutions.” Convenient And Efficient Toolset We are pleased to be entering this second deployment phase with the government of Tanzania" “We are pleased to be entering this second deployment phase with the government of Tanzania, building on the success of the country’s e-Passport roll-out last year,” said Rob Haslam, Vice President of Sales, Citizen ID business with HID Global. “Immigration officers in Tanzania now have a convenient and efficient toolset for completing their vital mission of vetting and granting electronic visa and residence permit credentials to applicants.” Since early 2018, HID Global has been Tanzania’s primary supplier of an end-to-end solution for issuing e-Passports with advanced physical and electronic security features, automated verification capabilities and a tamper-proof contactless chip embedded in a polycarbonate datapage. The country now has a single citizen identification system that spans the entire identity journey from data capture to issuance and can be used to support e-Passports, e-Visas, e-Permits and other physical electronic documents. HID A Solutions Provider HID’s solutions can be found in sixty percent of all government-issued electronic identity projects around the world. As a solutions provider, HID is delivering complete, end-to-end system solutions that meet governmental requirements for national ID, e-Passport, foreign resident ID, driver license, vehicle registration and other programs.
OpenView Security Solutions, the UK’S largest privately-owned independent security company and a national supplier of electrical and mechanical services, has completed a major upgrade to the CCTV security systems used at Cardiff Airport, the national airport for Wales and a key gateway to the UK. Upgrading Airport Security The project included a software upgrade for 40 cameras and replacement of a further 110 cameras with the latest high definition devices. The security network was expanded with an additional 80 cameras to meet the requirements of Cardiff Airport which is one of the UK’s key strategic assets that welcomes over 1.58 million passengers annually. Ian Godsell, IT Technician and GDPR Data Protection Officer at Cardiff Airport, said: “We have been impressed by the professional approach and expert advice provided by OpenView throughout the successful completion of this significant upgrade to our CCTV security systems. The safety and security of our staff and customers is our number one priority and the advanced technology in place supports our efforts to constantly monitor activity across the airport. This in turn supports our commitment to minimize risk and remain compliant in terms of regulatory standards.” IP Cameras And VMS The first phase saw OpenView upgrading the CCTV control room with Indigo Vision’s Control Center OpenView Security Solutions was invited to propose a solution for the staged upgrade of the security network as it was the airport’s incumbent CCTV systems maintainer and had received recommendations from Indigo Vision, which supplied the cameras, Video Management System (VMS) and Network Video Recorders (NVRs). The first phase of the upgrade project saw OpenView upgrading the CCTV control room with Indigo Vision’s Control Center, the company’s latest VMS platform and a new video wall to give operators the clearest view of the expanded camera network. It also provides department heads with browser-based access to video footage to quickly review events and enhance decision-making. Indigo Vision NVRs Additional Indigo Vision NVRs were installed to capture and store images from all cameras for a 31-day period with an additional unit for failover applications. The upgrade was planned and completed to minimize disruption to the airport operation and ensure continued security vigilance throughout the process. OpenView then replaced existing cameras which were obsolete and, as soon as new cat 5 cabling had been installed by the airport’s third-party contractor, was able to complete the new installation locations across the Airport including fire stations, management suite and hangars. HD CCTV Surveillance System This upgrade confirms OpenView’s ability to handle major infrastructure projects for safety critical organizations throughout the UK" “With extensive experience of working with airports and a nationwide network of strategically located offices, this upgrade confirms OpenView’s ability to handle major infrastructure projects for safety critical organizations throughout the UK,” added Andy Ward, Sales Director at OpenView Security Solutions. Several challenges had to be overcome while completing this upgrade, including having to unexpectedly replace collapsed ducting in some of the car parks and the handling of all intricacies involved in risk assessments relating to working at height throughout the airport. OpenView continues to provide a high-quality maintenance support service to ensure the system consistently operates at peak efficiency and is working closely with the IT team to further enhance the CCTV network as the airport continues to expand.
Johnson Controls announce that the aviation specific CEM Systems AC2000 Airport access control solution has been selected to secure the new Bahrain International Airport. The powerful CEM Systems AC2000 Airport software and industry leading CEM Systems hardware is being installed at Bahrain International Airport to ensure the highest level of integrated security and assist in controlling passenger flow across the airport. The contract was awarded by Thales and will be delivered by regional partner Tyco Fire and Security Middle East. Bahrain International Airport is the international airport of Bahrain, located in Muharraq, an island about 7 km northeast of the capital Manama. The airport is currently undergoing a $1.1 billion expansion that will boost the airport's capacity to fourteen million passengers per year. Resilient Solution For Aviation Security “This contract to secure Bahrain International Airport represents another significant win for CEM Systems AC2000 Airport solution in the growing aviation sector in the Middle East region,” said Philip Verner, regional sales director, Building Technologies & Solutions, Johnson Controls. “The powerful CEM Systems AC2000 Airport has a proven record as one of the most reliable and resilient access control and security management solutions available for aviation security. It not only provides Bahrain International Airport with advanced access control throughout terminal buildings and airside/landside boundaries, but it also provides a range of software applications to enhance the airport’s onsite operations and increase business efficiency.”
Round table discussion
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)