TIBCO Software Inc., a pioneer in enterprise data, empowers its customers to connect, unify, and confidently predict business outcomes, solving the world’s most complex data-driven challenges. TIBCO announces that TIBCO Spotfire and TIBCO Data Science now support Microsoft Azure Cognitive Services. TIBCO's solutions extend these services to analyze multivariate anomalies and add root cause analysis, using input from the Key Phrase Extraction cognitive skill to render decisions and automat...
The Security Industry Association (SIA) and SecureIDNews have selected five distinguished biometrics and security experts as the 2020 winners of the Women in Biometrics Awards – a globally recognized program co-founded by SIA and SecureIDNews and co-presented with sponsors IDEMIA, Biometric Update and the SIA Women in Security Forum. The honorees will be recognized during the 2020 SIA GovSummit, SIA’s annual government security conference, which will be hosted as a free virtual even...
Exabeam, the Smarter SIEM™ company, announces updates to the Exabeam Partner Program, including the rollout of a formalized practice for managed security service providers (MSSPs) and managed detection and response (MDR) providers, both key segments of its partner ecosystem. The program will provide structure and support for multiple MSSP and MDR provider business models for its managed service practice, which contributed to 12% of the company’s overall business revenue in 2019. The...
In 2020, with the continuous spread of the COVID-19 pandemic, millions of people have been infected around the globe. Touchless security devices In these uncertain times, with the ever-increasing demand for touchless security devices, Anviz, a globally renowned biometric security solutions firm, offers the latest touchless solutions - iris and face recognition access control terminals. The company’s latest iris and face recognition access control terminals help reassure business owners,...
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of...
Allied Universal®, a security and facility services company in North America, announces that their advanced artificial intelligence platform, HELIAUS®, is helping to keep facilities secure during the COVID-19 pandemic. HELIAUS® is an advanced artificial intelligence platform designed to improve safety and reduce risk by enhancing on-site guarding services. To support Allied Universal's customers' return to workplace initiatives, the company has enhanced the HELIAUS® technology p...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the IMP-C1000-SFP-bt series. Antaira Technologies’ IMP-C1000-SFP-bt series is a compact, IP30 rated, gigabit Ethernet-to-fiber media converter featuring a 10/100/1000Tx Ethernet port. It supports IEEE 802.3af/at and bt high power PoE that can supply up to 90 watts of power over Ethernet with a dual-rate 100/1000 SFP slot. Requiring distance extension This product is perfectly designed to fulfill industrial applications that require distance extension and high bandwidth capabilities. This small form factor is ideal for saving space in outdoor applications such as factory automation, security, ITS transportation, power/utility, water wastewater treatment plants, and any other extreme ambient weather environments. The IMP-C1000-SFP-bt series has a built-in ‘Link Fault Pass Through’ (LFP) and ‘Far End Fault’ (FEF) function with 48~55VDC redundant power inputs with reverse polarity and overload current protection. The IMP-C1000-SFP-bt-24 has the same feature set, but can be used in applications where a wider power voltage is required (12~55VDC). This product series supports DIN-rail as well as wall-mountable orientations. There are two operating temperature range models in STD: -10°C to 65°C and EOT: -40°C to 75°C.
The new DoorBird IP video intercom provides an option for adding access control via an ekey fingerprint scanner. The D2101FV EKEY door station is equipped with a cutout for installing the ekey home FS UP I fingerprint reader. Visitors and homeowners can use all the functions of the smart intercom immediately after installation including opening doors via app or RFID key fob. Once the ekey module has been mounted, access can also be granted by fingerprint. The DoorBird app controls, RFID reader and ekey reader can all be used simultaneously. The D2101FV EKEY door station is made of stainless steel and produced in Berlin, Germany by Bird Home Automation, a provider of smart door communication. The intercoms include high-quality components such as an IP video camera with a wide-angle lens and night vision, a speaker with echo and noise suppression, a configurable motion sensor and an RFID reader. Home and building system integration Using the open API interface, the DoorBird door station can be integrated into third-party home and building automation systems. The ekey fingerprint scanner is one of the fingerprint access solutions worldwide. With the ekey home FS UP I module, the Austrian company ekey biometric systems offers a stand-alone fingerprint reader that can be purchased separately and installed into the DoorBird D2101FV EKEY intercom at any time.
Healthcare professionals around the world are beginning to identify a range of COVID-19 related mental health issues that are certain to create new challenges for society. People are in serious distress about the pandemic itself and because of the devastating second- and third-order effects of record unemployment and the overall negative economic impact. Safety and security professionals must be prepared to meet the challenges of a ‘new normal,’ according to Safe Zone Technologies President Mike Anderson. Prolonged period of imposed self-Isolation “The new normal is not the old normal,” predicted Anderson. “Society is emerging from a prolonged period of imposed self-isolation. This has been an incredibly stressful time and the behavioral stresses created as a result remain to be seen. Security professionals everywhere need to be prepared to meet the challenges of a post-COVID shutdown world.” A variety of mental health issues relate directly to people who have been infected by the COVID-19 virus, as well as those not infected but still forced into sheltered quarantine. Recent research published in the Lancet Psychiatry Journal noted that other coronaviruses in the past have passed into the central nervous systems of patients and called for more research to better understand the impact of COVID-19 on the human brain and nervous system. Better monitoring of mental health The Journal specifically called for better monitoring of mental health as part of a coordinated response to the pandemic. As a result of the pandemic quarantine closures, estimates are that more than 40 million people have lost their jobs in this country. Unemployment leads to desperation and desperate people often make poor choices" “We don’t know when these jobs will be coming back, or if they even will. The depressed economy is taking an unprecedented toll. Unemployment leads to desperation and desperate people often make poor choices. Historically, these situations have resulted in an increase in violence, including armed robberies, suicides and active shootings,” Anderson stressed. The documented pandemic spike in firearm sales adds to the concern. NBC News recently reported that gun sales and federal background checks rose to an all-time high in March. Automated gunfire detection systems In fact, the FBI conducted 3.7 million background checks in March, the highest total since the national instant check system for buyers was launched in 1998 and 1.1 million higher than the number conducted in March 2019. “The combination of rapidly increasing gun sales and the emergence of COVID-related mental health concerns means that schools, houses of worship, malls, movie theatres and owners of every other venue where people gather must take all available steps to enhance the safety and security of their spaces – especially as these venues begin to reopen after prolonged closures.” The default for physical security has long been locking the doors and adding surveillance cameras. Unfortunately, in more than 30% of venues where active shooter events occurred, installed access control systems were ineffective or defeated. Additional statistics show that, on average, the 911 call is not made for five minutes. This is time that is critical to saving lives. Automated gunfire detection systems are an active means of alerting law enforcement and first responders in the critical first moments of a tragedy.
Altronix, the provider of power and data transmission products for the professional security industry, introduces a new brand to its portfolio of Trove™ Access and Power Integration Solutions. Altronix now seamlessly integrates it’s power and sub-assemblies with S2 Security controllers in a streamlined package for systems with up to 14-doors. Providing maximum flexibility “Altronix prides itself on designing and manufacturing solutions that solve real-world installation challenges,” said Alan Forman, President of Altronix Corporation. “We are pleased to be able support S2 dealers with a new option that streamlines their installations and increases profitability.” All Trove solutions simplify board layout and wire management, while providing maximum flexibility and scalability in the design and deployment of the brands of access control. Trove enables installers to easily configure and pretest systems prior to on-site installation, and provides a single point of service and maintenance, while reducing valuable time and labor. All Altronix products are manufactured in the U.S.A. and backed by a lifetime warranty.
Corsight AI Inc. announces the launch of global operations to provide autonomous AI software solutions for professional security and business intelligence applications. At the helm of the new venture are industry veterans Gadi Piran, Mulli Diamant and Yoav Millet, Founders and Executive Members previously from VMS provider OnSSI. Corsight offers advanced facial recognition solutions with autonomous AI technology built on neural network technology that emerged from research at the world renowned Technion – Israel Institute of Technology. Headquartered in the United States with an R&D Center in Israel, Corsight recently raised $5 million from Awz Ventures, a Canadian fund focused on intelligence and security technologies. Video surveillance camera Unlike AI solutions based on deep learning, the autonomous AI employed by Corsight delivers a higher level of intelligence that mimics the way humans interpret sensory inputs to better anticipate and predict events and understand surroundings. This allows Corsight technology to recognize different faces even at extreme angles with outstanding speed and accuracy even when presented in different perspectives under diverse lighting and environmental conditions. Corsight solutions are built on a foundation of over 250 patents registered to date. By leveraging the huge volume of data captured by today’s video surveillance cameras of all types, Corsight’s innovative autonomous AI facial recognition solution makes any video surveillance camera a portal for AI data analysis. Access control credentialing The COVID-19 pandemic has accelerated the immediate demand for innovative security technologies" Applications include real-time facial recognition analytics for identification and access control credentialing even when faces are concealed by face-masks, goggles or plastic shields, as well as people counting, anomaly detection and forensic analysis. With privacy as a primary charter, all Corsight autonomous AI solutions are developed with extensive provisions engineered to protect each individual’s privacy. “The COVID-19 pandemic has accelerated the immediate demand for innovative security technologies. Just a few months ago we all believed that the new autonomous AI facial recognition solution we were preparing to launch was far ahead of its time. As it turns out, it is just in time,” said Gadi Piran, CEO at Corsight. Facial recognition technology “Corsight facial recognition delivers the power to unlock the massive volumes of data captured by any video source, organize it into comprehensible intelligence, and deliver actionable insights while setting new standards in performance and personal privacy. After years of expectation, it was this new level of facial recognition technology that drew Mulli, Yoav and me back into the industry, and we are most excited to begin a new journey with Corsight.”
ISS – Intelligent Security Systems, a supplier of intelligent Video Management System (VMS) and analytics for myriad security and business intelligence applications, has responded to the global business community’s demand for a pragmatic and accurate solution to help get employees get back to work. The new ‘Plan for a Safe Return to Work’ solution offering from ISS integrates the company’s proven SecurOS™ solutions with new capabilities designed to provide organizations with a fully integrated software-solution to help restore business operations. Software-Driven solution “The COVID-19 pandemic has presented organizations of all types and classifications with a new set of challenges that impact the security, safety and health of all individuals who enter their premises, as well as the liability and responsibility of the host,” said Aluisio Figueiredo, CEO of Intelligent Security Systems. Our ‘Plan for a Safe Return to Work’ solution combines the best in ISS VMS and analytics technologies" “Right now, the biggest challenge is how to get people back to work, engaged in commerce, education and all of the everyday activities that drive the economy with effective safeguards in place. Our ‘Plan for a Safe Return to Work’ solution combines the best in ISS VMS and analytics technologies to provide a practical versatile and scalable way to accomplish this important goal.” The ISS Plan for a Safe Return to Work solution integrates four critical components into a comprehensive, easily deployed software-driven solution. Protective mask detection analytics Built on the SecurOS platform as its foundation, the holistic solution combines touchless elevated skin temperature detection via thermal camera integration, touchless identification and access control credentialing via FaceX facial recognition, and protective mask detection analytics to ensure individuals are wearing a protective covering over their nose and mouth. “The integration of these intelligent access control and workforce management solutions onto the ISS SecurOS platform can help organizations get back to business quickly and cost-effectively,” concluded Figueiredo.
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand for video surveillance and security products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. Video surveillance technology provides added security for you, your family and your business In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant through these odd times and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable video monitoring solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Synectics has secured a multi-site protection contract for a customer whose infrastructure assets are considered critical to national security. Responsible for maintaining an energy network that supplies over 3.9 million homes and businesses, the customer required a centralized system to guard against both physical and cyber threats at five key sites – each recognized as a national asset with corresponding levels of access clearance. The Synectics solution, driven by its Synergy 3 command and control platform, integrates third-party sensors, analytics, cameras, systems, personnel databases, and edge devices. The resulting level of situational awareness gives the team – based at the customer’s state-of-the-art Alarm Receiving Center (ARC) – complete oversight and control of security, safety, and site-management systems at each facility. Electrified perimeter-fence systems As part of the contract, Synectics will also provide a redundant ARC solution for failover scenarios. The core integrations included as part of the project ensure alerts and responses are linked to, and can implement direct control of, door-access systems, intrusion-detection systems, intercom technology, and the electrified perimeter-fence systems deployed at each location. Synectics will conduct a complete system FAT, which includes all specified third-party software and hardware, at its dedicated UK testing facilities. Given the high-risk, high-security nature of the project, the provider’s ability to system-test at such scale was a crucial factor in the contract being awarded. The five locations to be monitored from the ARC are government-authorized to trigger armed response units to deal with imminent or actual threats. Command and control system In addition to meeting technical resiliency specifications, Synectics will be providing cybersecurity consultation The solution will, therefore, employ customized workflows to support incident (alarm) validation and protocol-compliant responsive action. The solution will also see each site equipped with its localised command and control system for on-site management, with the ability to manually and automatically escalate incidents to the ARC team as required. Cybersecurity was a specific focus of the brief. In addition to meeting technical resiliency specifications with authentication and encryption solutions, Synectics will be providing ongoing cybersecurity consultation, working in partnership with in-house specialists to ensure the continuous development of protective measures. Third-Party system Martin Bonfield, UK Sales Manager at Synectics, commented: “The perfect alignment between customer requirements and Synectics’ track record in CNI meant the lead integrator came directly to us with this exciting project. Our credentials and expert team, coupled with Synergy 3’s ability to remotely integrate and interoperate with any third-party system vital to effective operations, meant we ticked multiple boxes." "We are regarded in the industry as a safe pair of hands with the relevant experience, and an innovator with the forward-focused technology required to meet all aspects of the brief.”
A landmark building located on the north side of the River Thames, has seen its security upgraded with Smart R Distribution and systems integrator, Isecurity Systems Limited, working in partnership to ensure tenants are protected by the latest advances in Access Control technology. The Northern & Shell Building at 10 Lower Thames Street, London EC3 which offers dramatic panoramic river views, has an on-site restaurant, a 10 storey glazed atrium and glass wall climber lifts. Among its tenants, Northern & Shell Group occupies approximately 110,000 sq. ft. spread over the ground, 4th, 9th and 10th floors. Single software platform As part of a phased office refurbishment program, the owners of the building reviewed the tools available to the security personnel to enable them to maintain a safe and secure environment for approximately 5,000 people who work in the building, as well as contractors and visitors. “The existing Geoffrey Access Control system had been in use for over 20 years and although it was still operating effectively, its functionality was limited compared to more modern solutions,” said Russell Morgan, Project Manager for Elsenham, Essex based Isecurity Systems, who have had a long term association with Northern & Shell Group. “A decision was made to invest in the latest generation Vanderbilt Security Management System (SMS) which enables users to efficiently manage alarms, lifts, visitors and the photo ID badging process, from a single software platform.” Magnetic stripe readers The Comelit video entry system integrates seamlessly with the SMS control system Russell and his colleagues at Isecurity Systems worked with the Smart R Distribution team to supply a Vanderbilt SMS access control system and they also in the process of replacing the 140 aging magnetic stripe readers with new CIDRON access control readers which support securely encrypted DESfire EV2 contactless Smart Cards from Cambridge UK based Authenticard. Smart R Distribution also supplied a new Comelit ViP video entry system, comprising 8 door stations and 2 control desk positions, which has been installed by Isecurity Systems to allow operators within the building’s 24/7 control room, to communicate and remotely open doors for contractors and couriers who need to gain entry via, for example, to a basement entrance. The Comelit video entry system integrates seamlessly with the SMS control system. Efficient access control solution “We now have a highly efficient Access Control solution which helps us to manage the smooth movement of large numbers of people through turnstile controlled speed lanes located in our reception area and it also enables us to control who can gain access to other restricted areas within the building,” said Dave Wratten, Facilities Manager for Northern & Shell Group. “Isecurity Systems and Smart R should be applauded for working in partnership to ensure that all the equipment was delivered to site exactly when it was needed and then installed to our complete satisfaction.”
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
Haier Group, China’s renowned home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. Intelligent system With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realize multiple tasks within the whole industrial park. Firstly, the smart system should be able to prevent theft and timely detect people climbing over the perimeter fence. Secondly, the intelligent security system should provide comprehensive monitoring in the whole industrial park and inside the factory unit, which includes, monitoring of production line and employees’ smoking behavior during working hours at office areas, efficient employee attendance management, vehicle identification at the entrance and exit areas of the park, and the overall management of all the devices, data report outputs, and other facilities at the industrial park. Total smart solution The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the intelligent system also supports further device upgrade based on customer’s future plan for the next several years. Dahua 5MP WDR IR Bullet AI Network Cameras To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. AI-powered perimeter protection The combination of advanced AI analytics and real-time alerts to desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. Intelligent Video System analytic algorithm As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Dahua face recognition barriers Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. 2 Megapixel Full HD AI Access ANPR cameras The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognize the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle color detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. Dahua DSS PRO management platform The Dahua DSS PRO management platform integrates all cameras and the stated devices At the management center, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Smart industrial park solution Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost,” said Zhao Shengbo, Regional Director of Dahua CIS. Upgrading access verification system Zhao adds, “Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation.” “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
Synectics has secured a competitive public space contract to provide integrated surveillance solutions for a number of prestigious sites across London, the UK's capital. Comprising government properties, heritage sites, and high-profile public event venues, the contract builds on Synectics' reputation as the surveillance solution of choice for London's public space protection. The successful award can also be attributed to the company's ability to deliver tailored, open-architecture solutions incorporating integration to third-party systems such as access control and intruder detection. Control software platform Synectics, which supports more than 70% of London's boroughs, as well as major retail stores and stadiums across the city, will upgrade all sites to its Synergy 3 command and control software platform. Each of these sites falls under our specialism in public space" While the specific locations cannot be named, the sites include listed buildings, high-security 'closed-to-public' assets, and venues with high levels of public footfall. Martin Bonfield, UK Sales Manager, at Synectics commented: "Each of these sites falls under our specializm in public space, but individually they each have unique requirements. That plays to our strengths in terms of the flexible technologies we offer and the broader sector experience we hold, from gaming and critical national infrastructure to city surveillance, retail, and public transport.” Superior incident management "These credentials illustrate our capability at developing and deploying surveillance solutions for projects that must balance high levels of public access with stringent security conventions and superior incident management. Our professional services team is also highly skilled at migrating systems under live operating conditions, which was a specification of the comprehensive brief." "One of the locations included in this tender process was an existing Synectics site operating a legacy Synergy product. The trust in our Synergy solution by the customer meant that satisfaction with the system reliability and user experience was high." Multi-Site monitoring The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras — totaling around 500 across the sites — alongside integrated third-party systems such as access control and intruder detection. Linking all locations for eventual multi-site monitoring was a crucial component of the project brief, ensuring the sites continue to support future needs and incorporate the latest camera technology and system features as required. Martin explained: "Synergy 3's power and scalability in terms of integrations and future system consolidation presented a powerful proposition to our customers, combined with our wider London portfolio of projects, partnerships, and supporting closer collaboration with the Metropolitan Police."
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announces that Bradley Air National Guard Base in East Granby, Connecticut., has installed a Delta Scientific HD300EM shallow mount wedge barricade system at the home of the ‘Flying Yankees,’ the 103rd Airlift Wing, the third-oldest Air National Guard unit in the country. Installed by American Barrier and Controls LLC, Foxboro, Massachusetts., the ‘Stop Control Safety’ ACP (Access Control Point) provides security at this constrained location with a relatively low traffic volume of less than 800 vehicles per hour per lane. Extensive history of electronic integration "Security forces and the engineering firm at Bradley chose the Delta Scientific HD300EM because of Delta's proven leadership and quality in the vehicle barrier industry," explains Dave Abromson, vice president of American Barrier and Controls. "They chose American Barrier and Controls LLC as the installer of the barrier and ACP system because of our 20-plus years as a Delta installer and service provider and our extensive history of electronic integration at such facilities as the US Army, US Navy, FBI field offices and multiple NASA locations." With only a 24 in (61 cm) foundation and a fully electric control unit, the HD300EM barrier stops a 15,000 lb (6800 kg) truck impacting at 50 mph (80 km/h) dead in its tracks with zero penetration. Fiber optic communication lines The HD300EM obviates the concerns of interference with buried pipes Upon impact, the barrier remains in its foundation and the opening stays blocked, providing a multiple hit capability. The barrier is independently test lab certified to 1 million cycles. In its M50 crash test, the HD300EM completely disabled the test vehicle, causing severe damage to the occupant compartment and power train. The maximum penetration recorded was an outstanding -1.8 m. A solid road plate design permits multiple hits and will handle low speed bumps and corner strikes for day to day reliability. The design is ideal for heavy vehicle traffic as it is rated at 66,000 lbs per axle load. The HD300EM obviates the concerns of interference with buried pipes, power lines and fiber optic communication lines. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. Total protection against dust The HD300 is perfect for high water table locations and areas with corrosive soils. It provides low maintenance as all components are accessible from the sides or top of the barrier. For increased security, the HD300EM leverages Delta's proprietary counter-balanced technology to provide a 1.5 second emergency fast operation (EFO), responding to attacks very quickly. The electric actuator provides IP67 protection, meaning that the unit is totally protected against dust and the effect of immersion between 15 cm and 1 m. The HD300EM barricade provides foundation space in which maintenance personnel can easily work. There is space for heaters and sump pumps. Access is available from either the top plate or front.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload