ANPR
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27”, and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points, or self-checkout pay points. With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity...
Genetec Inc. (“Genetec”), a renowned technology provider of unified security, public safety, operations, and business intelligence solutions, announced the opening of its 16th global office in Vienna, Austria. Ideally located to support the company’s expanding footprint in Central Europe and serve as a hub for the DACH region, the new headquarters in Vienna will support the company’s fast-growing R&D, regional sales and support teams. With a multilingual staff repres...
Nedap, the foremost specialist in advanced vehicle identification solutions, has upgraded its ANPR Lumo license plate reader for vehicle access control with Open Supervised Device Protocol (OSDP) ensuring greater site security. The ANPR Lumo is one of the world’s first all-in-one license plate recognition systems compatible with the OSDP protocol V.2.1.7. The OSDP upgrade within Nedap’s ANPR Lumo camera makes it possible to improve vehicle gate access in a trusted and secure manner...
Tavcom Training, one of the world’s pioneering provider of accredited security systems training courses and part of the Linx International Group, announced the addition of two one-day CCTV courses to its extensive online learning platform. The CCTV Control Room Refresher and CCTV Legislation courses are available now, with the option of accredited (BTEC) and non-accredited certificates, as well as CPD points available. The CCTV Control Room Refresher Course is essential for security pract...
Times are changing fast and so is the need for using and combining technologies in new ways. With the new edition of Milestone Marketplace, buyers will not only find the complementary hardware and software functionality, but they will also explore solution services when building best-of-breed video management solutions. COVID19 has forced businesses, cities, and entire countries to operate in new ways and increased the demand for new technologies and digital solutions. Adaptable video solution...
Interphone has published a security system and building technology whitepaper to help developers, contractors, installers, and managing agents better understand their responsibilities regarding the General Data Protection Regulation (GDPR). The in-depth report, titled A guide to GDPR compliance for the commercial residential marketplace, has been produced jointly with legal training specialist Woolven and Brown to provide an industry-specific look at the data protection and privacy law. GDPR a...
News
The greatest challenge that the energy sector faces in modern times is how to meet the continuously changing risk factors and addressing all of the necessary security aspects. Considering their unique infrastructure, expensive and sensitive materials onboard, and sometimes even classified national assets, energy facilities and critical infrastructures will always be subject to varied security threats. With hundreds of oil refineries, nuclear power plants, research reactors and fuel cycle facilities in operation worldwide, preventing certain materials from falling into the hands of adversaries or threat elements who seeks to steal or even harm the station operators is the top priority of the corporations’ security teams. Use of explosive devices in energy sector attacks The overwhelming majority of attacks (74%) on energy targets, between 2010 and 2014, were carried out by the use of explosive devices, while facility and infrastructure attacks, including arson and sabotage tactics, were the second most common (CEI Security Stakeholder Group Manifest). In April 2013, terrorists used high-powered rifles to destroy several transformers at a transmission substation in California in an incident that incurred more than US$ 15 million in damages and required nearly a month to restore. Robust layer-upon-layer security network Energy plants are among North America’s most protected private sector facilities Still, energy plants are among North America’s most protected private sector facilities. They are extremely robust structures that, by design and construction, are very challenging to penetrate. These structures, a well-trained security force and strict access controls for operators and visitors provide a robust layer-upon-layer comprehensive security network. The security level increases as one gets closer to the ‘owner-controlled area’, which is fenced and secured by advanced systems and well-armed security officers. This security ring typically shields the reactor, the control room, the used fuel pool and the central security alarm stations. The systems provide: High-quality scanned images, Smart compare capabilities for the inspection of recurring vehicles, Fraud prevention tools backed by a unique vehicle ID, Full integration to barriers, bollards and access control systems, Automatic detection of illicit materials or unauthorized access on the first pass, COVID-19 compatible: Driver and passenger fever detection capabilities. Helios UVIS by UVeye Access to the owner-controlled area should be limited and protected by an automated access control system that integrates with the alarmed security doors and response system connected to federal or local law enforcement agencies, which can assist in the event of an attack. Helios UVIS by UVeye helps ensure that all measures are taken to control vehicles’ access to sensitive energy facilities and protect them from such risks. Helios UVIS is designed to detect illicit materials being smuggled in, prevent theft, and thwart unauthorized access or other malicious acts in and around the secured facility. UV Inspect, advanced vehicle pass solution UV Inspect can be used for vehicles that have not been previously scanned by a system Offering single- or multi-lane units, as well as stationary or mobile units, UVeye’s advanced deep learning algorithms were developed through training with millions of vehicles and allow UVeye to offer its first pass solution, UV Inspect. Built on a truly intimate understanding of what a wide range of vehicles are supposed to look like in various environmental conditions, UV Inspect can be used for vehicles that have not been previously scanned by a system. UVeye is the only under-vehicle inspection system (UVIS or UVSS) vendor to offer a verified first-pass solution that significantly increases security teams’ effectiveness. UV Compare, license plate or fingerprint ID recognition Another key feature from Helios is called UV Compare, which enables it to recognize previously scanned vehicles by their license plate or unique undercarriage fingerprint ID, and compare it to previous scans. Individuals who are granted access to the facility or protected area, whether they are employees, contractors or visitors, become part of this database. This feature can also help detect tiny objects such as paper bags, phones, miniature hard disks and other contraband. Securing confidential materials Due to their complex environment and sensitive information, energy sites are a target for technology and data theft scenarios. The physical protection of energy plants and associated facilities must include vehicle access point inspection to ensure these security systems’ effectiveness against defined risk factors by UVeye’s tailored security level, answering a wide range of security requirements. Given the industry’s unique work conditions and the varied types of vehicles accessing these facilities, Helios can withstand up to 40,000 pounds (20 tons) per axle, meaning that it will survive being driven over by even massive vehicles like trucks or SUVs. Durable with built-in thermal sensor Helios is also designed to respond to weather variation, such as daily changes in temperature Helios is also designed to respond to weather variation, such as daily changes in temperature, storms and weather hazards. It is fully operational at temperatures between 68°F and 104°F (20° and 40° Celsius) and is IP 68/54 compliant, meaning it offers full protection against sand, dust and rain. UVeye’s built-in thermal sensor can detect the body temperatures of the passengers in vehicles entering the site’s access roads, assuring the safety and security of everyone in and around the facility. Multi-layer access control security UVeye fully supports third-party integration and provides multiple layers of security for any facility. Integrations available and made in the past include: ALPR System Face Detection/Recognition Arm Barriers/Bollards VMS (Video Management System) Centralized data management system Centralized management system allows the client to access multiple systems and manage historical data Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites, while also enabling central management and control via one screen. The centralized management system allows the client to access multiple systems and manage the other users and historical data. The undercarriage is one of the most critical parts of the vehicle to inspect and one of the most challenging areas to examine. Helios is the perfect solution to prevent any weapons or other illegal and dangerous items from entering energy facilities. Enhanced data security Integrating it with additional security and access control systems can provide a multi-layered approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
Leonardo and LACROIX have signed a strategic agreement that will see the partners working together to develop and integrate solutions in the naval countermeasures sector. The collaboration, which will look towards new technologies as well as new business opportunities, initially provides for the creation of the SYLENA Mk2/MJTE solution. This will see LACROIX's SYLENA MK2 DLS (Decoy Launching System) integrated with Leonardo's MJTE (Mobile Jammer Target Emulator) anti-torpedo countermeasures. Torpedo jamming solution The MJTE is Leonardo's latest-generation torpedo jamming solution. It can emulate the signature and acoustics of its host platform and emit a powerful jamming signal to create convincing false targets, allowing the targeted vessel to perform an effective evasive maneuver. Compared to other solutions on the market, the new MJTE packs a number of protective techniques into a low-cost unit and performs effectively in a short-range. The MJTE is part of Leonardo's new anti-torpedo suite, which includes the towed Black Snake sonar, the new OTO Decoy Launching System 20 (ODLS20), and the company’s software package which calculates optimum release timing for countermeasures and escape routes for the host vessel. Expanding accessible market Compact and lightweight form factor of the SYLENA MK2 makes it suitable to expand the potential user base for the MJTE The cooperation agreement between Leonardo and LACROIX will expand the accessible market for both the MJTE countermeasure and the SYLENA MK2 launch system. The compact and lightweight form factor of the SYLENA MK2 makes it suitable for small and medium-sized vessels, expanding the potential user base for the MJTE. Meanwhile, the cutting-edge new capabilities brought by the MJTE will improve the utility of the SYLENA MK2 system. Anti-submarine countermeasure solution Andrea Padella, Head of Defense Systems, Leonardo Electronics said, "This agreement reaffirms Leonardo's ability to interpret, respond to and often anticipate market needs.” “There is a clear synergy in this partnership with LACROIX as together we can offer a sophisticated anti-submarine countermeasure solution, even for platforms with limited space.” “These require compact and lightweight launch systems which can simultaneously deliver Anti-Air Warfare and Anti-Submarine capabilities." Commitment Leonardo is committed to securing and protecting people and communities around the world through its leadership in next-generation technologies. Collaboration within the industry, with government, and between individuals to offer superior security capabilities is part of its 'Be Tomorrow - Leonardo 2030' strategic plan. Development of joint solutions The partnership proves the maturity of Leonardo solutions and the modularity and versatility of the range of systems François MOULINIER, COO of LACROIX Defense said, “Following the work, we have undertaken with Leonardo to integrate SYLENA within their Athena-C combat management system as part of ongoing contracts, this collaboration is a natural next step in the development of joint solutions.” “Leonardo is a major player in the European Industrial and Technological Defense Base (BITD) and this partnership proves the maturity of our solutions and the unmatched modularity and versatility of our range of systems.” Decoy Launching Systems (DLS) Following its customers’ requests, LACROIX has developed, since 2012, a range of new generation Decoy Launching Systems (DLS) to protect and significantly increase vessel survivability ratio, from patrol boats operating the SYLENA® Lightweight to destroyers operating the SYLENA® MK1 and MK2. Launchers SYLENA® launchers are capable of employing the latest generation of SEACLAD® ammunition, corner reflectors, and IR decoys as well as ASW solutions with the SEALAT dedicated to the SYLENA® MK2. The SYLENA® MK2 DLS, which is the first in-service static anti-missile system in the world operating both corner reflectors (SEALEM) and anti-torpedo countermeasures, maximizes vessel protection with a highly reliable system at a low operating cost. Limited acquisition The fact that the SYLENA® DLS static launcher fires only mortars without any pneumatic constraints and has a low footprint on deck along with a low recoil force allows for the limited acquisition and integration costs. Therefore, the system has already convinced numerous navies to either retrofit or fit out their vessels.
Leonardo ranks first in the Dow Jones Sustainability Indices (DJSI) for the Aerospace & Defense industry, confirming the company’s leadership for the second consecutive year. This achievement confirms that sustainability is at the core and a key driver of Leonardo’s strategy, governance, and 2030 vision. Developing new business opportunities “Being recognized as an industry leader in the DJSI,” the CEO of Leonardo, Alessandro Profumo, commented, “further confirms that we are on the right path. We continue to contribute to sustainable progress for a safer world.” “This ambition is at the core of Be Tomorrow-Leonardo 2030, our long-term plan aimed at developing new business opportunities and working towards the Sustainable Development Goals (SDGs) of the United Nations (UN) by leveraging on technological innovation and core competencies.” “Economic, social, and environmental sustainability is now at the center of the international debate. The belief that sustainability creates value and mobilize resources is becoming increasingly shared.” Long-term value creation “We are proud of this recognition,” the Chairman of Leonardo, Luciano Carta, underlined, “in addition to the recent appointment of Leonardo to the United Nations’ Global Compact LEAD, which also confirms our leading role and commitment to sustainability at a global level.” “This is the result of a governance which is increasingly geared towards sustainable success and long-term value creation.” CFO taskforce Leonardo to contribute to the creation of a sustainable financial model for the prosperity of companies and communitiesLeonardo reinforces its commitment through the CFO Taskforce, part of the UN Global Compact, for sustainable finance, established at the end of 2019. Thanks to the commitment of the Taskforce and the signing of the Principles for Integrated SDG Investments and Finance, Leonardo will contribute to the creation of a sustainable financial model for the prosperity of companies and communities. Sustainability commitments Below are some key figures, referred to in 2019 reporting, as an example of Leonardo’s sustainability commitments: For Prosperity and Innovation: 5 billion euro spent towards Research and Development 9,000 employees operate in R&D activities Over 8,000 suppliers, mainly small and medium enterprises highly specialized, and 81% of purchases from four domestic markets 90 universities and research centers with ongoing collaborations and partnerships For Security: 75 sites in 29 countries have been protected from cyber-attacks Around 300 airports use Leonardo systems for air traffic control Over 1,100 helicopters are used for search and rescue, fire-fighting and civil missions Around 70,000 users protected with cyber security services For People and Skills: Around 2,500 internships, apprenticeships, and training initiatives have been activated since 2017 Over 5,000 people under 30 new hires in the 2017-2019 period 20 average hours of training per employee per year in the period 2018-2019 For Planet: Over 1 million images captured by the COSMO-SkyMed constellation since 2008 for Earth observation Reduction of fuel consumption by 10-15% and emissions by 20% through the usage of carbon fiber aerostructures 47,000 tonnes of CO2 avoided in 2019 thanks to virtual systems for the training of helicopter and aircraft pilots
Leonardo welcomes the announcement made by the U.S. Department of Defense to award AgustaWestland Philadelphia Corp. a 171 million USD modification to the previously awarded firm-fixed-price contract for the US Navy’s Advanced Helicopter Training System. This modification exercises options for the production and delivery of an additional 36 TH-73A aircraft, with work expected to be completed in December 2022 in Philadelphia, PA. Firm-fixed price contract In January 2020 Leonardo, through AgustaWestland Philadelphia Corp., was awarded a firm-fixed-price contract valued at 176 million USD for the production and delivery of 32 TH-73A helicopters, initial spares, support, and dedicated equipment, and specific pilot and maintenance training services. Training students The TH-73A will be used to train the next generation of student aviators from the US Navy, Marine Corps, and Coast Guard.
Leonardo, the title-holder in the Aerospace Defense & Security (AD&S) sector, has launched a new initiative dedicated to its key suppliers. It focuses on the issue of operational excellence to support companies in their lean journey through maximizing competitiveness and customer satisfaction with a structured approach of continuous improvement, reducing excess, and improving the quality and flexibility of products and services. Program & workshop The project is part of the Leonardo Empowering Advanced Partnership 2020 (LEAP2020), the supply chain development program improved by Leonardo, and was presented at the “Lean Management & Leonardo Production System” workshop. The workshop is dedicated to the companies featured in the ELITE Leonardo Lounge - the environment developed by ELITE for high-potential companies within Leonardo’s supply chain. Supply chain to value chain “With the LEAP2020, we are strengthening and enhancing our supply chain,” explained Giacinto Carullo, Leonardo’s Chief Procurement & Supply Chain Officer, “leveraging on a transparent and sustainable partnership relationship with the excellence of the supply chain, to give life to a more competitive, integrated, innovative and resilient industrial eco-system.” Leonardo, through LEAP 2020, intends to encourage the evolution of the supply chain into a value chain. Developing people’s skills The central theme developed by the workshop, held in a virtual setting, concerned the sharing of the vision and methodology of continuous improvement adopted by Leonardo with the “Leonardo Production System,” the specific program aims to increase company competitiveness through the development of people’s skills. Goals and aggregate turnover Leonardo’s goal is to encourage the integration of supplier-customer processes with a view to continuous improvement and to create an industrial eco-system devoted to operational excellence, starting from the pillars of quality and logistics. More than forty SMEs from 12 different regions are involved in the ELITE Leonardo Lounge, with an aggregate turnover of 1 billion euros and over 5,700 employees.
Synectics Security has appointed one of the industry’s leading project management and planning specialists to join its senior team as Operations Director. With over 20 years of experience in the UK operational and security-focused project delivery, spanning both service provider and client-side roles, Colin Butlin is the first external appointment announced as part of the new-look company. He will be working closely with Synectics Security’s Managing Director, Iain Stringer, and Commercial Director Mark Pennington. The company officially launched recently, following the merger of Synectics Mobile Systems (SMS) and Quadrant Security Group. Pairing both mobile and built-environment expertise, the business works with pioneering technology providers to design and deploy integrated security solutions for customers operating in highly regulated environments across public space, heritage, high security, banking and finance, critical infrastructure, and transportation sectors. Security upgrade works Colin joins Synectics Security from civil engineering giant Kier Plc where, among other responsibilities, he led a multi-million-pound program of security upgrade works for Critical National Infrastructure sites across the UK. With experience spanning industry, utilities, defense, and commercial markets, the 46-year-old operations expert feels he has a lot to offer Synectics Security at such an exciting time for the business. Colin said “I’m privileged to have worked both sides of the fence in terms of managing major security projects. I know, first-hand, what a customer expects, but also how service delivery should be structured, monitored, and managed to ensure those expectations are met in the most efficient and effective way possible.” “At Synectics Security, I have the amazing opportunity to use this experience to ensure new levels of customer satisfaction but also to help shape and steer the business. You don’t often get the chance to join a company recognized as an industry leader – with an expansive customer base and a workforce of field-engineers and managers with almost 400 years’ combined experience – but which also has the agility and innovative spirit of a start-up. That’s a hugely exciting proposition for me.” Customer-driven developments Colin’s deep technical knowledge of security service delivery and project management will see him implement new governance structures and staff training as part of Synectics Security’s ongoing program of customer-driven developments. Managing Director, Iain Stringer, commented “For us, success isn’t just about making sure our customers get an integrated solution which matches their specific business needs. It’s about making sure we always deliver that end-result in the best way possible for all stakeholders involved. Colin’s reputation and experience in this field will prove invaluable in making sure we succeed in this mission and we are delighted to welcome him on board.”


Expert commentary
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
A deep native integration of Bosch cameras with software from ISS proactively catalyzes the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS SecurOS maximizes camera performance for license plate recognition, face recognition, and container / train carriages recognition. The cameras meet the performance needs for advanced analytics, ensuring the success of projects and saving time, resources, and cost. The partnership has delivered multi-thousand-camera safe city deployments, industrial analytics solutions, and systems for large-scale transport providers. The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each vehicle License Plate Capture The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each and every vehicle. Operations managers are accountable for efficient logistical flows and effective use of roads and parking lots. Knowing the ins and outs of the transport infrastructure and what’s going on at all times provides the knowledge required to ensure operations are running safely, efficiently and in compliance with the rules and laws. An important part of this comes from monitoring which vehicles are entering an area and ensuring they are allowed to be there. Capturing license plates of every vehicle moving in an area provides knowledge of traffic flows and usage patterns. Such a solution should also allow a customer to easily configure and manage monitoring preferences and permit easy data exchanges with other operational management systems and services to manage an infrastructure and logistics as a whole. Reliable License Plate Data Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments As transportation infrastructures are often operating around the clock, reliable vehicle identification data is required 24/7. This means that the cameras capturing this data should work in all lighting and weather conditions, for both slow- and fast-moving vehicles. Cameras must be built to produce usable images 24/7 in all weather conditions. For quality license plate recognition in both day and night, the cameras make use of supplementary infrared light. A special License Plate Recognition (LPR) mode, developed in collaboration with LPR software, delivers readable license plates even with glaring headlights and with fast moving vehicles. Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments. License Plate Capture solution The SecurOSTM AUTO system of ISS, when used with Bosch cameras, provides easy to deploy solutions for all of these requirements. It recognizes license plates from many countries, manages and matches white, hot and blacklists and notifies the operator either in the GUI or through a messaging interface to other management systems. Additionally, the system can be used and managed as a standalone or embedded in other management systems on the premises.
Security beat
The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pandemic – they suspended all non-essential travel and face-to-face meetings. At one point, NAV had a single employee in the New Jersey headquarters and another one in the Las Vegas office. The rest worked from home, with other offices opening as needed over the following weeks. Another integrator, Convergint Technologies, was able to adapt its approach to the pandemic, location by location, across the United States. The integrator benefitted from its leadership structure, with local managers in various regions who are autonomous and could react to what was happening in each region. Virtual workforce “We saw a dip in April and May, but since then, we have seen business pick back up,” said Mike Mathes, Executive Vice President, Convergint Technologies. The Business of Integration virtual conference sponsored by the Security Industry Association (SIA) “We already had tools and infrastructure deployed to support a virtual workforce. We had the software and the right equipment, and that has allowed us some flexibility to approach the repopulation of our offices in a gradual way.” The impact of COVID-19 on integrators and their customers was the main topic of discussion at a session on The Business of Integration at the Securing New Ground virtual conference sponsored by the Security Industry Association (SIA). Remote monitoring North American Video also benefitted from having technical personnel spread across the United States. By assigning work duties on the basis of geography, they could travel by car with less risk than air travel. They also increased their use of remote monitoring and support to avoid extra visits to customer sites. With 80% of the business in the gaming industry, North American Video saw a profound impact on their customers with the almost complete shutdown of casinos during the early days of the pandemic. Even though gaming was impacted particularly badly by the virus, NAV stayed engaged working on four or five large casino construction projects that continued throughout the shutdown. Revenue shortfalls State legislatures will approve more casinos to help plug the holes in their budgets Other casinos took advantage of empty facilities to make needed upgrades without worrying about disrupting casino operations. “A lot of our strong, long-term clients have sought to perform upgrades during the downtime, including needed service and maintenance,” said Jason Oakley, President and CEO, North American Video (NAV). “When gaming was closed, you were allowed in the facilities to work.” Oakley also sees long-term optimism for the casino business, which will offer a means for state and local governments to make up revenue shortfalls. “State legislatures will approve more casinos to help plug the holes in their budgets,” Oakley predicted. Demands for technology Oakley and NAV have seen an evolution in customer demands for technology in light of the pandemic. The trick is to differentiate between demand that is an immediate reaction versus technology trends that have more staying power. Although customers were keen on purchasing thermal cameras, for example, NAV did the research and recommended against the use of the technology to some of their customers. Artificial Intelligence for social distancing The use of artificial intelligence (AI) for a variety of applications seems to have more staying power. “One area of interest at a high level is modification and repurposing of AI for face mask detection, social distancing and people tracing, including integration into existing cameras,” said Oakley. “If the hospitality industry comes to terms with the new normal with smaller restaurant capacities, there may be an opportunity to use AI for social distancing.” Contact tracing and visitor management technology Mathes of Convergint sees a massive change as customers move toward managed services, accelerating the change with new use cases. We have an entire group that focuses on new solutions and what customers are looking for" As offices seek to repopulate when the pandemic subsides, customers are looking for new uses of existing technologies, added Mathes. “We have an entire group that focuses on new solutions and what customers are looking for,” he said. “They need to understand who is in the building and where they go in the building. If we know someone was only in the cafeteria from 10 to 11 a.m., we can know who was in the cafeteria at that time.” Opportunity for vertical markets to move forward He predicts technologies for contact tracing and visitor management tracking who’s in the building and where will be around for a long time to come. "Various customers and vertical markets are looking at the slowdown differently," said Mathes. "For example, while airlines have slowed down, the view from the airport market is more long-term." “They have 15-year plans, and [the slowdown] is an opportunity to move forward. In the technology space, data centers are expanding. “We try to focus our resources on areas where the money is being spent,” said Mathes. “Our K-12 group has seen an 80% growth over 2019. The money is tied to bonds, so there hasn’t been a slowdown relative to revenue.” He said Convergint is cautiously optimist about 2021.”
As police use of live facial recognition (LFR) is called into question in the United Kingdom, the concerns can overshadow another use of facial recognition by police officers. Facial recognition is incorporated into day-to-day police operations to identify an individual standing in front of them. This more common usage should not be called into question, says Simon Hall, CEO of Coeus Software, which developed PoliceBox, a software that enables police officers to complete the majority of their daily tasks from an app operating on a smart phone. Time-Consuming Process “Verifying the identity of an individual standing in front of you via facial recognition should be no more controversial than taking a fingerprint for the same purpose,” says Hall. “We are not talking about mass surveillance here, but the opportunity to use technology to make an officer’s day more efficient. Verifying a person’s ID is a time-consuming process if you have to take them to the station, so being able to do this more quickly should be welcomed as a positive step to modernize policing.” Because the use of facial recognition by police has proven to be a divisive topic, Simon is eager to highlight the distinction between the use of facial recognition for ID verification and the more controversial mass surveillance that some police forces have trialed. “There are two different use cases for facial recognition in the context of law enforcement,” says Hall. Number-Plate Recognition “Firstly, there is facial recognition to verify a person’s identity (typically done face-to-face with the individual concerned and using the Police National Computer [PNC] database). This is no more controversial than taking an individual’s fingerprint to verify their ID but can be conducted more quickly if the officer has the capability on their smart phone. The second common use of facial recognition is to identify suspects quickly via mass surveillance. This is more controversial.” The focus for PoliceBox is ID verification only, he adds. The focus of facial recognition for PoliceBox is ID verification only First, there is the matter of consent. In the context of facial recognition in public situations, it is very difficult to inform everyone that they are being observed, so they cannot give their informed consent, says Hall. Then there is the inability for people to ‘opt out’ of the process. Unlike with driving a car, where one can technically opt-out of the rules of the road (and avoid technologies like number-plate recognition) by choosing not to drive, there is no such option for facial recognition. National Surveillance System Secondly, many-to-many matching (matching lots of images to lots of database records) is more likely to produce false matches, resulting in possible perceived harassment of individuals who happen to match a person of interest, notes Hall. The government is openly exploring plans to develop a national surveillance system using facial recognition Lastly, Hall says there are legitimate concerns that the technology could be misused for discrimination or exerting control over populations. In China, for example, where facial recognition technology is already widely used in the commercial sector, the government is openly exploring plans to develop a national surveillance system using facial recognition. “Mass surveillance can be used in two ways; real-time, whereby ‘people of interest’ are flagged up as soon as a match is detected, and historical, where the movements of individuals around the time of a reported crime are established after the event,” says Hall. Repeated False Matches “These two modes probably require different types of safeguards. For example, it may be appropriate to obtain a warrant to search historical data, to prevent Cambridge-Analytica style mining of personal data. For real time data, safeguards against repeated false matches are needed to prevent harassment of falsely matched individuals.” Properly implemented, facial recognition can be consistent with the GDPR. The principles are no different from obtaining a fingerprint to confirm identity, where consent would normally be given. For PoliceBox, using fingerprint or facial identification is typically a time-saving solution, benefitting both parties, instead of going to the police station and establishing identity there. Signed consent can be obtained on the spot using a secure on-screen signature. The PoliceBox solution is based on the UK legal framework and would also be appropriate for countries whose laws are similar to the UK Facial Recognition Algorithms Fingerprints and facial images can be automatically deleted once used to establish identity. There are special provisions for the collection of personal data for law enforcement purposes without consent, and some test cases for mass surveillance could go through the Information Commissioner’s Office (ICO). This is particularly significant where private operators are concerned. The PoliceBox solution is based on the UK legal framework and would also be appropriate for countries whose laws are similar to the UK. It is also internationalized and can be used in different languages. Facial recognition algorithms and databases are typically implemented by the relevant law enforcement body (such as the Home Office) and not directly within the product, which acts as a front-end to those systems. Hall sees several remaining challenges related to police use of facial recognition: The adoption of cloud-based software-as-a-service (SaaS) solutions within the public sector. The existing infrastructure in the public sector has evolved over a number of years and there are significant legacy systems in place that need to be refreshed/replaced; Need for proven technology. Public sector organizations are risk-averse and often insist on being able to reference existing installations, which creates a Catch 22 problem when introducing new technology as someone has to be first; Interrupting business-as-usual. Most organizations already have some form of an existing solution. Even if this system provides poor ROI and is extremely dated, one must still overcome ‘the better the devil you know’ policy; A reluctance by some suppliers to share information with other solutions via APIs. This has stifled innovation for some time. Improving Officers’ Wellbeing These challenges are slowly being overcome. “I am confident we will soon see an accelerated adoption of platforms such as ours to deliver the financial and efficiency savings that are needed to bring the public sector into the 21st century,” says Hall. One of the biggest themes to come out of the recent Home Office Review into frontline policing was the need to improve officers’ wellbeing. Law enforcement has to deal with some of the most difficult and harrowing situations on an almost daily basis. The administrative burden can also be problematic, says Hall. “If we can help to reduce the administrative burden placed on officers – even by a little bit – the overall improvements in effectiveness and well-being when magnified across a whole force will be significant.”
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyze real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and parking security. Vehicle recognition systems Rekor Systems is a provider of vehicle recognition systems in more than 60 countries Using AI to enable video cameras, Rekor Systems is a provider of vehicle recognition systems in more than 60 countries. Applications include security and surveillance, public safety, electronic toll collection, brand loyalty, parking operations, banking and insurance, logistics, and traffic management. AI allows Rekor’s products to recognize and read license plates, while also providing information about each vehicle, including color, make, year, and model. Rekor’s products are powered by OpenALPR software, an AI-based solution that enables any IP (internet protocol) surveillance camera to scan license plates and provide vehicle data including tag number, make, model, and color in real time with 99% accuracy, according to the company. Rekor’s products are powered by OpenALPR software Integrated solutions “Rekor's software started as an open source project, and we have done our best to keep the commercial software as open as possible,” says Rod Hillman, Chief Operating Officer, Rekor Systems. “One of the challenges we see with others in our space is a tendency to ‘close off’ and ‘silo’ their solutions. Our goal is to make it as simple as possible to deploy, integrate, and ultimately use.” Rekor has numerous application programming interfaces (APIs) and ways the solution can be integrated into partners' solutions with a software development kit (SDK). Rekor solutions can be purchased directly or through a worldwide partner network of integrators, wholesalers, and within integrated solutions such as Nokia's smart city platform. Electronic toll collection Rekor’s solutions have viable applications within multiple markets While many systems are hardware-based, Rekor’s software-as-a-solution offering can turn an IP camera into an automatic license plate reader. Rekor’s solutions have viable applications within multiple markets, including law enforcement, security and surveillance, electronic toll collection, parking operations, banking and insurance, logistics, traffic management, and customer experience. “Rekor offers a cost-effective alternative to traditional LPR systems with a much higher accuracy rate at 99% allowing more cameras to be present and active at any given time,” says Hillman. “Traditional LPRs need someone to go through hours of footage to find what they are looking for while Rekor’s technology will send alerts in real time, resulting in much quicker response times.” Move Over Camera mounts onto roadside worker’s vehicles to capture ‘Move Over’ violations Two-Part authentication Rekor’s products include: NUMERUS, a cloud-based solution for high-volume vehicle recognition, designed to reduce costs and increase efficiencies for the electronic toll collecting industry. Two-part authentication instantly identifies the vehicle’s make, model, color and body type along with the license plate read. Machine-learning-enabled software recognizes license plates from all 50 U.S. states, in addition to plates from more than 70 countries on six continents. Edge, an all-in-one camera and vehicle recognition system that instantly reads vehicle license plates, along with the vehicle’s make, model, color and body type. Move Over Camera, which mounts onto roadside worker’s vehicles (police, tow truck, etc.) to capture ‘Move Over’ violations. ‘Move Over’ laws state that vehicles must move over one lane and/or slow down if they cannot move over to avoid incident while roadside workers are in the shoulder lane. The camera can detect what lane vehicles are in and how fast they are moving. Violators are flagged in the system for law enforcement’s review.
Case studies
With traffic levels constantly rising, cities around the world are looking for ways to manage the sheer number of traffic on their roads. The city of Chorzow in southern Poland wanted to go a step further and provide information to streamline their public transport on the roads, as well as regular vehicles. They approached Sprint, a systems integrator in Poland, who delivered an intelligent traffic management solution using Hikvision technology. City municipal Board of Streets and Bridges in Chorzów (MZUiM – Miejski Zarząd Ulic i Mostów) an organizational unit of the city is responsible for the management of public roads in Chorzów. Offering image stabilisation The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System. The department had extensive requirements for this complex system to truly meet its needs. Firstly, they needed to be able to recognize number plates efficiently, even at high speeds of up to 250 km/h. Further the system needed to be able to classify the vehicles. The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System Secondly, the cameras used needed to have a high image quality and also to have some aesthetic quality, as they would be mounted all over the city, sometimes in prominent places. The ability of the cameras to maintain a high image quality in low light conditions, and to offer image stabilisation were also important for this project. Traffic management system The system needed to effectively monitor traffic on major roads and intersections throughout the city. It would be used for a variety of activities – from verifying accidents to tracking truck routes. A high priority for the solution was to create a traffic management system in the city, taking into account relevant data submitted to the Traffic Control Centre. With this, the MZUiM could optimize signaling work and create priority for public transport vehicles. Chorzów’s Traffic Management System using Hikvision ANPR intelligent cameras other supporting CCTV was installed by Sprint in 2019. The system used the DarkFighter Network Speed Dome PTZ camera (DS-2DF6A236X-AEL) in key areas. This camera has high sensitivity in low light levels, image stabilisation and rapid focus, making it ideal for the position. Client-server system platform They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections, to capture all the access roads to the intersection. These also come with lower infrastructure costs, since they combine four cameras into one. They also look pretty good! Footage from the cameras was recorded using 5 4K NVRs (DS-9632NI-I16) and it was all brought together using the HikCentral client-server system platform. But perhaps the real hero in the system was the ANPR technology. ANPR data from the ANPR Checkpoint Capture Unit (iDS-TCV300) provided key data to meet the project’s needs. This included recognition of registration numbers up to a speed of 250 km/h, recognition of overloaded vehicles, and vehicle classification. The system was also designed to integrate the information transmitted from induction loops embedded in the roads, which register a vehicle as it drives over them. Intelligent management software Łukasz Cysewski, Project Manager at Sprint, says: “Hikvision’s solutions in the field of intelligent ANPR cameras and CCTV best corresponded to the project requirements. Specifically, we were impressed with the scope of implemented functions and effectiveness of the ANPR cameras, image quality and overall management of the CCTV system. Hikvision also offered a high level of support to integrate the smart cameras with our intelligent management software.” The system gave Chorzów the ability to monitor their traffic in one place. This brought a raft of benefits, like automatic detection of road offenses, and allowing the department to prioritise public transport for a quicker journey. It also allowed Police to track suspicious vehicles, with integration into their Smart City platform.
Security and surveillance systems have become a vital component of a casino management system enabling gaming club operators to monitor and manage security threats in real time. Apart from the original purpose of security measures, it helps raising concerns over card counting, advantage playing, and various other suspicious or prohibited activities. However, a typical casino atmosphere often involves great complexity in its environmental lighting, leading to high noise level in captured video images. Challenges: Inadequate lighting in casino making it difficult for cameras to distinguish colors and movement, resulting in blurry images. Lack of advanced video analytic functions in traditional surveillance systems presents difficulties to an effective monitoring process, with high labor cost needed for scanning live views and recorded footages manually. Access control system Different casino areas require different solutions to fulfill its demand. At gaming tables, it’s critical to capture the subtle movements of each players and dealers. Cameras with higher FPS, 3D DNR and super low lux image sensor gives a neater and brighter image under dim lighting, while 2-way audio provides additional audio information. Casino operations involve a multitude of monetary transactions in critical areas including cages, vaults and offices where cash, chips, and other valuables are circulated. An access control system integrated with facial recognition functions helps operators in strengthening the security level. Exceptional customer experience is the key to good customer loyalty. Facial recognition system Video analytics allows operators to filter videos recording smartly with object attributes With ANPR (Automated Number Plate Recognition) and facial recognition embedded into the management system of carparks and VIP lounges, customer entry and exit can be streamlined minimal interruptions. A modern video surveillance system complemented by top notch IP cameras can improve and simplify the entire operation. Modern video management software possesses features that are not offered by traditional systems. Video analytics such as human object detection allows operators to filter videos recording smartly with object attributes, e.g. colors of customer clothes. The architecture of modern video management provides scalability to accommodate the growing amount of video sources during business expansion. Standardized protocol offers higher interoperability in terms of 3rd party system integration with access control or alarm system. Cameras for centralized management Thanks to the internet, control center is now able to receive and group videos from dispersed cameras for a centralized management. The operators could access to the live views of different casino affiliates and receive real-time notification on cellphone devices when specific events are in action.
The Headquarters Business Park developed by Adeem Al-Watania is a 52 story office building located on the coast site of Jeddah, Saudi Arabia. When completed in 2012, it became the tallest building in Jeddah and is served by a large 11-story parking garage. Nedap’s Long-Range Identification solutions provide seamless vehicle access to employees and long-term tenants. The devices were successful installed and integrated with Lenel access control system OnGuard by Idex Services. The Headquarters Business Park Tower This tallest skyscraper, towering above Jeddah’s North Corniche and with a unique “Sail of a dhow” design, is an iconic structure in the commercial hub of Saudi Arabia. The iconic business park consists of offices, clinics, restaurants, entertainment facilities and a luxurious hotel. It has three main sections, the West tower housing 52 floors, East tower housing a luxurious hotel with 16 floors and a mid-section with 11 story parking facility comprising of 2.000 parking spots which connects the West and East towers. Need for hands-free vehicle access Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system With the exemplary design of the tower, there was a need for an all-in-one innovative vehicle and driver access control solution which can provide seamless integration with best performance which is in line with the state-of-art services to tenants in one of the most sophisticated buildings in Jeddah. Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system, for convenient, hands-free access to authorized vehicles of office employees and long-term tenants. An efficient solution was identified, with a combination of Automatic Number Plate Recognition and Long-Range RFID (Radiofrequency Identification for Automatic Vehicle Identification). Touchless vehicle access to employees Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags is used to provide convenient vehicle access to employees. UHF Tags, which are thin, flexible, tamper resistant and maintenance free are assigned to vehicles of employees who work in the 256 office units. When the registered vehicle with UHF tag installed approaches the long-range UHF RFID reader installed near the barrier, the vehicle is automatically identified and access is granted for authorized vehicles to the parking facility. Parking access to tenants based on LPR Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres The iconic tower with sea-view includes a luxurious hotel and it is observed that tenants stay for a longer duration or prefer coming back on regular basis. To provide a seamless experience to tenants and ensure smooth flow of vehicles and drivers into the parking facility, there was a need for a solution which could grant tenant vehicles access temporarily or incidentally. Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres – ensures tenant number plates are registered and required access rights can be easily granted in the backend application. Securing the 11 floor parking facility With the parking facility being the main entry point to both the West and East tower, it was very necessary to meet high-security standards and control the flow of vehicles. The proposed solution required to have seamless integration with the existing Lenel access control system OnGuard. The open architecture of Lenel and Nedap supporting variety of industry-standard communication interfaces, enabled seamless integration and successful implementation of the products by Idex services. Customized reports with the required log were easily accessible after the successful integration.
The sailings may take as little as 22 minutes, but carrying almost 4.5 million holidaymakers and Islanders to and from the Isle of Wight every year is a huge challenge. It is perhaps not surprising therefore to discover that Wightlink has invested in the latest video security technology to help them do so safely and efficiently. The team at award-winning ferry operator Wightlink knows more than a thing or two about giving Islanders a frequent and punctual service to mainland Hampshire, as well as offering visitors an easy way to enjoy a taste of Island life. Providing ferry services Through its forerunners, Wightlink has been providing ferry services to and from the Isle of Wight for more than 160 years. As the cross-Solent ferry operator, Wightlink in a normal year would complete approximately 45,000 sailings over three routes with the help of a fleet of ships which includes six vehicle and passenger ferries and two passenger-only FastCats. Hanwha Techwin Europe’s Managing Director Bob (H.Y.) Hwang Ph.D., recently traveled to Portsmouth to see first-hand how Wisenet cameras are being used to assist Wightlink in almost every aspect of their day-to-day operations. Bob was accompanied by Jeff (Chae Won) Lee, the company’s Sales Director and Senior Strategic Sales Manager, Jon Hill. High definition images Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras Over 260 Wisenet cameras have already been installed around Wightlink’s Portsmouth and Lymington facilities, as well as on three of the company’s ships. With safety of paramount importance, some of the cameras are being used to help verify any health & safety incidents which might occur in one of the terminals or onboard the ships. On the bridge, Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras mounted at the bow and stern of the ships, which are assisting them with great precision to dock safely and efficiently. In addition, cameras supporting ANPR have also been deployed at various locations to ensure the smooth flow, identification and tracking of vehicles through every stage of their journey. IP network video surveillance The day was organized by Jim Kernahan, Managing Director of Trellisworks, a system integrator with extensive experience of designing, installing and maintaining IP network video surveillance, wireless and mobile network solutions. “The visit provided an excellent opportunity for Bob (H.Y.) Hwang and his colleagues to see how the Wisenet cameras were being put to good use,” said Jim. “However, our prime objective was to meet with members of the Wightlink team to explore how Trellisworks and Hanwha Techwin can continue to work in partnership to assist them in capitalizing on the latest advances in technology.” Hybrid energy ferry Stuart James, Wightlink’s Marketing and Innovation Director, who has the task of devising and driving the company’s strategy of continual improvement by wisely investing in new technologies and systems, provided a guided tour of the company’s Portsmouth harbor facilities and its newest and environmentally-friendly hybrid energy ferry, Victoria of Wight. We were able to generate a number of good ideas on how we can build on the success of the existing cameras" “I was pleased to host the visit and take the opportunity to express our appreciation and satisfaction with how well Trellisworks and Hanwha Techwin have been working together for our benefit,” said Stuart. “Most importantly, we were able to generate a number of good ideas on how we can build on the success of the existing cameras.” The discussions which followed on from the tour focused on how the latest technology might assist Wightlink to further enhance safety and security by supporting on shore staff and the ships’ crews, as well as ensuring every passenger has the best possible customer experience. Video security solutions Among the options considered were specialist video applications, such as passenger counting and queue management which can be run on-board Wisenet cameras and AI Deep Learning solutions. Commenting on the visit, Bob (H.Y.) Hwang said: “We are very grateful to Stuart for providing us with a great insight into Wightlink operational requirements and also to the company’s CEO, Keith Greenfield, who kindly took the time to greet us.” “We are understandably delighted that a prestigious and superbly well-run company such as Wightlink has placed its trust in Hanwha Techwin to provide effective and future proof video security solutions. We are looking forward to working ever more closely with Trellisworks, which is a member of our STEP partnership program, to ensure together we are always able to exceed Wightlink’s expectations.”
JEWISH CARE has placed its trust in the latest access control, door entry and CCTV technology, to help create a safe and secure environment for residents living in Anita Dorfman House, a new 64-bed care home facility recently erected at its Sandringham care and community hub in Stanmore. Phase 1 of the project has seen the MEPH contractor Harvey Group, award a contract to South London system integrator WLS, to install a Paxton Net2 access control and door entry system with the objective of ensuring that JEWISH CARE has strict control as to who is able to enter the accommodation block or gain access to its sensitive areas. Home management control Paxton proximity card readers and door entry panels have been installed at the new care home’s 5 entrances which, together with 55 door entry handsets deployed throughout the building, allow JEWISH CARE reception and security personnel monitor all access control events. They are able to do so with the help of Paxton’s user-friendly Net2 software platform run on a desktop PC. WLS has also installed over 60 high definition 4-megapixel network dome cameras manufactured by Dahua at carefully chosen locations both within and around the building, to help detect intruders, as well as visually verify access control activity. In addition, automated barriers will shortly be installed at the site’s entrance. Linked to the CCTV system and triggered by Automatic Number Plate Recognition (ANPR) analytics, the barriers help care home management control vehicle access to the site. Smooth implementation of the access control JEWISH CARE is the largest health and social care organization serving the Jewish community in London With over 70 centers and services touching the lives of 10,000 people every week, JEWISH CARE is the largest health and social care organization serving the Jewish community in London and the South East. “We go to great lengths to ensure our clients feel safe and this is particularly important as many of them have disabilities, mental health needs or live with dementia,” said Lindsay Long, Facilities Manager at JEWISH CARE. “Investing in the latest generation of access control, door entry and CCTV solutions was therefore considered to be an essential requirement and we have been delighted with how Harvey Group, WLS and the various manufacturers involved in the project, have worked closely together to ensure a smooth implementation of the access control, door entry and CCTV systems.” Stopping unwanted visitors “The combined solution is enabling us to deter and stop any unwanted visitors from entering the building, as well as track and record people as they move around the building, without causing any inconvenience or disruption to colleagues, clients and genuine visitors.” A second phase of the project which is due to be completed by the end of 2020, will see WLS expand the security systems to cover the care home’s new independent living and communal facilities. As was the case during phase 1, WLS has also been tasked to install a TRIAX satellite TV system throughout new facilities, to enable to clients watch British and Israeli TV.
Commenced in 2016, the large business club was built with smart infrastructure and modern amenities, in the futuristic town of Kolkata, to provide leisure-cum-business conducive atmosphere to their members and visitors. The contemporary building of business club is spread over 10 acres area and serves as a cultural, commercial, and business hub in the region. Having a beautiful landscape, it attained tremendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business center to name a few. Missing real-time video surveillance With a consistently large volume of patrons visiting the business club for various events, security is the vital component of the successful operations at the site. The customer has been relying heavily on analog video surveillance to secure its facilities and workforce. Due to its limited scalability, there was no way to do real-time surveillance throughout the premises. Moreover, every incident recorded by the video cameras required time-consuming manual investigation, therefore, causing delay in decision-making. Aiming to advancing the surveillance solution, the customer wanted to make an investment to maintain a watchful eye, manage threats/incidents proactively along with integrate existing and new system into the unified interface. Videonetics Unified Video Computing Platform Intelligent Video Analytics (IVA) is helping operators to detect vehicles wrongly parked in ‘restricted’ or ‘no parking’ zones After a thorough evaluation of various solution offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Platform (UVCP™) that blends Intelligent Video Management Software (VMS), Intelligent Video Analytics and seamless integration of existing analog system into one user-friendly solution, able to grow effortlessly with customers’ need over time. Incident response management Videonetics Intelligent VMS is managing 100+ cameras including PTZ network camera, dome cameras, fixed cameras, and bullet cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 legacy analog cameras are also integrated into the unified solution, eventually providing centralized control of the cameras to the security operators. The in-built failover and redundancy features of Intelligent VMS ensure the operators to always have access to live and recorded video. This means if any incident occurs, they can always have evidence of it. Zero Blind Spot at Entrance The Intelligent Video Analytics (IVA) is helping operators to detect vehicles which are wrongly parked in ‘restricted’ or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ camera tracking helps in detecting unusual behavior of the person and provides alert to security operators for faster action. At the entrance, face capture has been installed to detect a person in the scene and locates his/her face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track and record license plates of vehicles along with time and date, entering the premise. Zone monitoring Operators will be notified if a person stays beyond a certain duration in a user-marked zoneThe business club needed a solution that could help it identify theft, intrusion and trespassing throughout its facilities. In the first phase of the project, Videonetics along with stakeholders of business club and system integrator identified sensitive areas, that requiring immediate security system. To monitor suspicious activities, zone monitoring has been enabled at the fence of tennis court, lawn, emergency gates and open field area. Operators will be notified if a person stays beyond a certain duration in a user-marked zone. To combat unauthorized entry in generator room, operators gets alert if any intrusion happens in a marked area. Similarly, unusual activities are also being monitored in this area through loitering detection. Trespassing detection Operators can handle alarms and manage events, reducing manual checks of cases and helping to expedite investigationsAt the peripheries of the business club, trespassing detection has been deployed to detect if any person intrudes into a premise. The system is well capable to trace trajectory of the trespasser and prevent incident before it occurs. The authorities wanted to have alert in case any mob formation happens at the field area, known as forbidden region, of the club. Crowd formation detection has been deployed that estimates density of people in a scene and generated an alert as soon as the density in any defined area crosses a certain limit. Empowering with Cellphone application The ease of use of Videonetics unified solution has been instrumental to the business club. The operators and senior authorities are efficiently accessing videos anytime and anywhere, thru an intuitive interface of IVMS web and cellphone applications. At the time of incidents, operators can handle alarms and manage events, therefore, reducing manual checks of cases and helping to expedite investigations. After various phases of implementation, installation, and testing, the Videonetics unified solution went into live operation. Since upgrading to Videonetics unified solution, the business club has been able to better handle incidents of thefts/intrusion and apprehend suspects. Therefore, the level of security has been lifted by allowing the early detection of incidents and monitoring the premises round-the-clock, even in the harsh environmental condition. Furthermore, the added layer of security has been significant in business club’s efforts to attract more members and sustain business relations with existing members. Detecting patterns Now the operators use the information being collected in the unified interface to better understand the environment. They are successfully detecting patterns on how visitors/members access and move through the club. Thus, using these insights to develop strategies that maximize the use of space and keeps everyone safe. The open architecture of Videonetics unified solution allows customer to integrate with third-party systems such as access control, emergency system and much more. “To go from conventional to a professional and scalable surveillance system was a huge improvement for our client. It has enhanced our client’s reputation for providing safe and secure environment to visitors, employees, and members. Commendation to Videonetics for providing their unified video computing platform that empowered security operators by improving their efficiency in monitoring the premise and handling threats swiftly. I deeply appreciate their dedication and untiring efforts for making it a reality”, said Gaurav Das, Director, Webdesk Technologies Private Limited.


Products


Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?
It seems there are more “bad things” happening than ever before. We hear news every day of workplace shootings and terrorist attacks, of smash-and-grab thefts and child abductions. Beyond the possible human tragedy involved, such events pose a persistent question to anyone involved in the realm of security: Could we have prevented it? The first step toward prevention is to predict or foresee an event before it happens. Too often, technology enters the picture after the fact, most commonly the use of forensic video. Isn’t there more our industry can do before such events occur? We put the question to this week’s Expert Panel Roundtable: How can security systems be used to predict bad things before they happen?