Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions, announced the latest deep integration to result from its enduring partnership with Bosch Security Systems (“Bosch”). Users of the widely deployed Bosch MAP 5000 intrusion alarm panels can now directly connect to Genetec Security Center through the Intrusion Manager, combining intrusion, video and access control into one intuitive interface. Facility and s...
The Partnership for Priority Verified Alarm Response (PPVAR) is pleased to announce Tom Nakatani, IT VP of Customer Monitoring Technology for ADT, has been elected President. Nakatani officially began his two-year term at the June 10th PPVAR member’s meeting after serving as Vice President. He succeeds Joey Rao-Russell, President and CEO for Sonitrol-Kimberlite, who will now serve on the PPVAR Board as an immediate past President and Treasurer. “I am honored to take on the role of P...
Customers may know it as DMP’s enhanced all-in-one system — and until now, the XTLtouch has only been available to Verizon customers. DMP is pleased to announce that the XTLtouch Wireless Control Panel with AT&T LTE is here. “We’re very excited about this,” says DMP’s Vice President of Sales Mark NeSmith. “No other all-in-one offers the same powerful and flexible solution. For areas that require AT&T service, this allows our dealers to much more...
With 73% of all domestic burglaries occurring through a door, it is now more important than ever that maximum-security locks are in place to offer protection from potential break-ins. Mul-T-Lock’s coveted Break Secure 3DS anti-snap cylinder has been specially designed to help locksmiths meet consumer demand for high security locks, and now it has excelled in recent tests – surpassing the British Standard Kitemark BS EN 1303:2015 test 10 times over. To achieve the highest Grade 6 in...
Life has just become much easier for control room operators and security personnel with the launch of 5 new Wisenet P ultra-high definition 4K AI cameras. In addition to capturing superb quality images, the new feature rich cameras from the Hanwha Techwin Premium range are equipped with deep learning video analytics which offer a high level of detection accuracy, while minimizing false alarms. The license-free deep learning video analytics simultaneously detects and classifies various obje...
ADT, globally renowned security and automation provider that serves residential and business customers, has announced that it is providing US $1 million, through its ADT Always Cares program, to support over 100 non-profit organizations in 44 states and Puerto Rico affected by COVID-19. ADT Always Cares program The funds are being allocated in US $5,000 and US $10,000 increments to nonprofits in communities where ADT employees live and work. Local ADT teams are determining which charities to s...
With Hub 2, a user will no longer need to live under round-the-clock camera surveillance to know why an alarm has gone off. Like the first generation of hubs, Hub 2 protects the user’s property against burglars, fire, and flood. But unlike its predecessors, it sends not only alarm notifications but also animated series of images from MotionCam motion detectors. Thanks to the optional Wings radio protocol, a built-in battery, and two SIM card slots, Hub 2 is independent of the guarded facility infrastructure. It will continue protecting the user’s family and property, even if the building has lost power and Internet connection. Hub 2 is a control tool for safe homes, offices, shops, or even industrial facilities. The control panel can manage up to a 100 of Ajax detectors and devices on a distance of up to 2000 meters. Protection of any scale And this is not the limit - the ReX radio signal range extender boosts the hub’s coverage area to up to 16 km². The new hub has three channels to communicate with the users and security companies: Ethernet and two slots for SIM cards. The second slot allows users to improve stability by choosing two different GSM operators. And thanks to the instantaneous switching between communication channels, Hub 2 is guaranteed to transmit photos and alarms even with an unstable Internet connection. The list of features of the Ajax hubs expands every year with the regular updates of the OS Malevich operating system. To ensure the future development of the Hub 2, Ajax Systems has increased the amount of ROM and RAM and equipped it with a fast processor.
Even the most reliable security equipment is never fully protected from false alarms. Most of the time, they occur due to simple oversights, hyperactive pets, or incorrect installation. But when the security companies react to false alarms, they risk getting late in case of a real emergency. Some send security patrols to check the unverified alarms right away. The others count the detector triggerings before responding and lose precious minutes in the result. In any case, false alarms bring stress for the consumers and the risk of suffering losses. Prime security companies found the solution in photo and video alarm verification. Both options came with serious compromises. On the one hand, motion detectors equipped with cameras provided a technical possibility to see what triggered the alarm. But the systems that support such devices required frequent maintenance (due to low battery life), delivered low-quality pictures, and were significantly overpriced. Wireless security system On the other hand, video surveillance allowed for a 24/7 monitoring but came with the new difficulties: complicated installation and configuration, total dependence on the building’s infrastructure, high risks of malfunctioning and exploits, as well as the privacy issues. Both solutions didn’t have a chance to become the new security standard. The market required the new cost-efficient solution that would unite the reliability and informing efficiency of the best security systems with the visual capabilities of the cameras. Ajax Systems was one of the first ones to develop the security system with visual alarm verification. Just like they were not the ones to invent wireless security system when launching Jeweller. Parallel transmission of alarms With Wings, the user can view the first snapshot of the situation in under 9 seconds But that fact gave them company an opportunity to rethink the experience of using the equipment from the consumer’s and the service provider’s points of view. They tested and analyzed the weak spots and best practices in the industry and eventually created a breakthrough product in terms of informing speed, communication distance, and battery life. To ensure fast and reliable transmission of the photo confirmations, the company developed a new Wings radio protocol based on Jeweller. The technologies that MotionCam and Hub 2 use to communicate, nullify the interference between channels during the parallel transmission of alarms and pictures. With Wings, the user can view the first snapshot of the situation in under 9 seconds while the alarm signals sent via Jeweller are still delivered in a split second. Camera-equipped detector Photo transmission does not shorten the MotionCam communication range. Just like the rest of the Ajax detectors, the new gadget operates at a distance of 1700 meters from the hub. This number is one of the top performance results for a camera-equipped detector. The Ajax security system still covers an area of up to 12 km², which is enough to protect the multi-story buildings but now with visual alarm verification. MotionCam features an extraordinary - for a camera-equipped detector - autonomy with up to 4 years of battery life. This is not an optimistic forecast with ideal use conditions. Instead, it is an estimate for the typical operating conditions, which includes the regular activations and changes in weather conditions. And they have considered the privacy issue. The MotionCam detectors activate their cameras only if triggered by motion when the system is armed. Indoor motion detector Without a doubt, the Wings technology sets the new standards in the security industry" The users and the security company have no way to access the camera and request to take pictures. All photos are encrypted during transmission, and as they are stored at the Ajax Cloud (just like all the events in the security system’s log). No one analyses and processes the photographs from the detectors. MotionCam and Hub 2 raise the informing quality of the Ajax security system to the next level while preserving its fundamental characteristics. MotionCam can easily replace any indoor motion detector, which makes upgrading the security system as painless as possible. It will forever change the user’s attitude to alarms, yet they still won’t be bothered with the system maintenance for years to come. Phenomenal energy efficiency “I am proud that we can make such inventions. Without a doubt, the Wings technology sets the new standards in the security industry. Fast photo transmission at a distance of 1700 meters with phenomenal energy efficiency, it’s magic that was previously unavailable on the market. We’ve managed to boost the informing quality of the system to the next level and preserve the familiar user experience at the same time”, says Aleksandr Konotopskyi, CEO Ajax Systems.
BX-35ZBS bell box is a battery-operated wireless outdoor siren generating a loud 104 decibel siren sound and strobe lights during an alarm to provide visible and audible alerts. Encased in a durable, IPX5 waterproof design, easy-to-install BX-35ZBS is a premium choice for the modern smart home. The BX-35ZBS is energy saving and environmentally conscious, requiring only two Alkaline batteries, yet still has a long battery life. The BX-35ZBS generates unique alarm sounds for fire and burglary to inform users of the type of danger at hand. In addition to producing audible and visible warnings in the case of emergency, the BX-35ZBS emits beep notifications for arming and disarming of a security system, and of its low battery status. Tamper-deterrent feature Its tamper-deterrent feature protects against unauthorized removal and sabotage. The BX-35ZBS is compatible with other manufacturers’ ZigBee systems and can be integrated into new or existing ZigBee systems. Features Siren output level is 104dB at 1 meter Unique alarm sounds for fire and burglary Lightweight and flexible to install Modern and Elegant design Programmable siren duration of 3/5/10 minutes Sound notifications of arming, disarming, and low battery status Regular supervision signals to check system integrity and trouble shooting Low battery detection Tamper protection prevents unauthorized removal IPX5 waterproof and UV resistant housing Compliant with CE requirement Compatible with other’s ZigBee manufacturers’ ZigBee systems Specifications Communication Protocol - ZigBee Pro Home Automation 1.2 Frequency - 2.4GHz Power Supply - 1.5V, D Alkaline battery x 2 Battery Life - 6 years Siren Output - 104dB at 1 meter Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 223 x 223 x 68mm
SR-32 is a battery-operated wireless indoor siren, generating a loud 104-decibel siren to alert users to possible intruders, emergencies, and safety incidents. The multi-functional indoor siren can work with the control panel to emit entry and exit delay beeps. The SR-32 generates unique alarm sounds for fire and burglary to audibly inform the user of the type of danger at hand. Encased in an elegant, modish design, the SR-32 will effortlessly fit into the home decor. SR-32 is lightweight and easy to install, giving users the flexibility to install it anywhere in the house. SR-32’s tamper-deterrent feature also protects against unauthorized removal or sabotage. Features Siren output level is 104dB at 1 meter Unique alarm sounds for fire and burglary Lightweight and flexible to install Programmable siren duration of 3/5/10 minutes Sound notifications of arming, disarming, and low battery status Smaller, visually pleasing design Cover tamper protection prevents unauthorized removal and sabotage Regular supervision signals to check system integrity Low battery detection Compatible with Climax F1 Alarm Panels Compliant with CE requirement Specifications - SR-32-F1 Frequency - 433 MHz / 868 MHz Power Source - 1.5V, D Alkaline battery x 2 Battery Life - 3 years Siren Output - 104 dB at 1 meter Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 212.5 mm x 179 mm x 53 mm
Maximize the effectiveness of the installed security system by providing the family and business with an even higher level of protection. The SVGS Series is a shock, vibration and glass break sensor, designed to provide early warning of an attempted intrusion by sensing forced entry before a burglar actually enters the property. This wireless shock sensor is lightweight and easy to install on any glass window, door, roof, or safety box and capable of detecting two different types of forcible attacks, a single major shock event, or accumulated consecutive minor shock attacks. The SVGS F1 models leverage Climax’s industry renowned RF technology to accelerate the speed of signal transmission and deliver reliable, extensive communication range, allowing users to stay in touch, in control, and provide a peace of mind. Smart home system The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter When the SVGS Series are linked with security or smart home system, it can activate a siren, turn on lights, music, or start video recordings when the glass is tampered with, which is often enough to send an intruder running. The SVGS Series’ discreet design makes it unobtrusive and has three adjustable sensitivity threshold levels to choose for different situations and locations. The SVGS-5 model features two-way signal, allowing for setting configurations to be easily adjusted through the security gateway or control panel. The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter. Features Early detection of break-in attempts of glass windows, doors, roof, or safety boxes Detects major shock attack or accumulated minor shock attacks Adjustable sensitivity threshold levels: Low, Medium, High F1 technology accelerate the speed of signal transmission, reliability, and boots communication range. (F1 models only) LED indicator Setting configuration locally on device (SVGS-3 only) Setting configuration remotely on device via Control Panel (SVGS-5 only) Wireless and lightweight for easy installation Works on glass, plywood and safety box Low battery indicator Regular supervision signals to check system integrity Suitable for residential and commercial security usage Specifications SVGS-3-F1 Frequency - 868MHz / 869MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-3 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 3.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5-F1 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 2.6 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm Ordering Information SVGS-3-F1 - Shock / Vibration & Glass Break Sensor, compatible with Climax F1 Control Panels and extensive RF range SVGS-3 - Shock / Vibration & Glass Break Sensor, setting configuration on device SVGS-5-F1 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel, compatible with Climax F1 Control Panels and extensive RF range SVGS-5 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel
Videotec is proud to announce that is has released a “robust and smart” video analysis technology, integrated into ULISSE EVO cameras, that offers an end-to-end solution for preventative detection of intrusions in outdoor monitoring applications of critical infrastructures, industrial sites and perimeters. Videotec Analytics is the result of more than 10 years of research and design, carried out by a team of R&D professionals, cooperating together with prestigious international universities and research centers. This technology was designed to be extremely reliable and proactive and be simple to configure and easy to use. Videotec analysis technology The ULISSE EVO camera with Videotec Analysis technology comprises robust algorithms for accurate PTZ detection and precise and smooth auto-tracking, even in the most adverse external environmental conditions. The operator will have complete situational awareness no matter the circumstances. A simple initial configuration will allow ULISSE EVO to detect an object or person present in a sensitive area. Depending on the rules set by the user, an alarm is displayed and auto-tracking activated if an object enters, exits, or appears or stops more than allowed in an area. The detection algorithm is extremely reliable even in rain, snow, where the camera is affected by vibrations, in low contrast or sudden light changes or shadows, and where small animals or insects are present. The auto-tracking keeps the target at the center of the frame through its very smooth pan and tilt action and zoom control. Integrated professional outdoor solution The metadata sent to the VMS system can be used to frame the target with a bounding box for clear identification This happens even if the target moves and changes direction quickly or if the area being monitored is in unfavourable lighting conditions such as low contrast, obstructions or sudden light changes. The metadata sent to the VMS system can be used to frame the target with a bounding box for clear identification of the subject or it can be used to activate alarms or begin recording. Depending on the rules set by the user, an alarm is displayed and auto-tracking activated if an object enters, exits, or appears or stays longer than a defined time. Videotec’s ULISSE EVO range with Video Analytics offers an integrated professional outdoor solution that is robust and performs better. Video analysis algorithms Videotec puts its all-in-one products through hundreds of validation tests in order to guarantee optimum robustness and reliability. Mechanics, electronics, positioning, networking, software, video analysis algorithms and firmware are developed end-to-end by Videotec’s own team who therefore have the complete know-how. ULISSE EVO therefore offers Videotec’s guarantee of being a reliable, cyber-safe, future-proof platform that is easily integrable with third-party products. Videotec’s new video analysis feature, combined with ULISSE EVOs optimum technology and image quality, ensure high level of protection for people, belongings and property.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SecurityInformed.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organizations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organizations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritizes use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimize the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimize the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalized structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organization can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organization sells no products or services.
Could millions of burglar and fire alarm control units be recalled by the U.S. Consumer Product Safety Commission? That could be the upshot when the independent agency of the U.S. government rules on a 'Complaint of Non-Conforming Products' investigation requested on behalf of a consultant/forensic expert who says he has identified non-compliance dangers and vulnerabilities related to the devices. Breaching security standards Jeffrey Zwirn, an alarm and security forensic expert, says he has identified problems with the alarm devices and has posted online a series of videos confirming that they do not operate in conformance with Underwriters Laboratories (UL) 985 and 103 and NFPA 72 (National Fire Alarm and Signaling Code) Standards. Specifically, the single data-bus circuits of the hardwired devices can be short-circuited and become either fully or partially non-functional. The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products by addressing “unreasonable risks” of injury, such as risk of fire, chemical exposure, electrical malfunction or mechanical failure.The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products Typically, the CSPC evaluates such requests and determines what corrective action, if any, is appropriate, in this case possibly by the end of the year. IDS Research & Development Inc. (Zwirn’s company) and Connaughton Group LLC, a product integrity consulting firm, sent a request to the CSPC on Sept. 20 asking for an investigation of products across the North American household fire and burglar alarm control units and commercial burglar and fire alarm control panel category. Recalling alarm control units The request estimates that “hundreds of millions” of the units were sold and installed across the United States. They include products sold under brand names such as Honeywell, DSC, NAPCO, ELK Products, and Interlogix. If the recall were to happen, it would be the largest recall in the history of the alarm industry. The request states: “It is our expert opinion that these non-conforming control panels present a foreseeably dangerous and serious public safety hazard and risk to all of the unsuspecting consumers, their families and business owners who have these control panels installed in their homes and businesses.”These non-conforming control panels present a foreseeably dangerous and serious public safety hazard" Zwirn has also submitted the products for investigation by UL and Intertek Testing Services Inc., which respectively provide the UL and ETL certification marks and are Nationally Recognized Testing Laboratories (NRTL). Outcomes of those investigations are forthcoming. Jeffrey Zwirn also promotes and sells a product, The Interceptor, that would address the vulnerability. It is a microprocessor designed to protect the data-bus and auxiliary power output wiring installed throughout a protected premises.
When it comes to emergency planning and response, there is an abundance of resources to help enterprises prepare to mitigate the impact of an incident. The U.S. Federal Emergency Management Agency (FEMA) has devised the National Incident Management System (NIMS), aimed at defining and standardizing ways that resources can be used to manage and respond to an incident. An enterprise’s Emergency Operations Plan, or EOP, incorporates NIMS concepts and spells out what to do in an emergency. Security equipment purchases But how does an EOP relate to security equipment purchases? In the language of FEMA, enterprises should ask themselves: How do I currently ‘resource type’ my electronic countermeasures as part of my critical incident response plan? In FEMA parlance, ‘resource typing’ is categorizing resources according to capability using FEMA’s ‘Typing Library Tool’. The tool identifies technologies that can improve response. Technology purchases should be considered in the context of their role in the larger plan, says Jerry Wilkins, PSP, Vice President of Active Risk Survival. “Currently, that doesn’t happen, and we as an industry do not even speak in the same language as those who guide emergency responses to which security equipment can be a useful contributor,” Wilkins says. The National Incident Management System is aimed at defining and standardizing ways that resources can be used to manage and respond to an incident Wilkins speaks with authority based on a long career in the industry. Beyond his experience working in burglar alarms, home security, and as a manufacturer’s rep, Wilkins has expanded his expertise to the broader categories of incident command, emergency response and law enforcement. He has received FEMA IS-0100 (incident command training) and has sought to apply it to critical incidents, active shooters and other emergency situations. He has attended Solo Engagement Operator Training (SWAT school) and Tactical Emergency Casualty Care (TECC) military training. Responding to emergencies As a student in a broad array of disciplines, Wilkins has sought to engage the security technology industry in an important conversation: What can we do as an industry to apply technical capabilities to the question of how to respond to an emergency? Adherence to best practices can help to avoid liability – and save lives For example, CCTV is a valuable tool for situational awareness, but it wasn’t deployed in the aftermath of the Parkland, Florida, school shooting in 2018 until 24 minutes into the incident. “By the time they decided to use the video, [the shooter] was already gone. They had 15 high-definition cameras, but they did not know how to use the technology for situational awareness because it was not part of the Emergency Operations Plan. They could have known every move [the shooter] made if the technology had been part of the EOP,” says Wilkins. Here is another example from the Parkland shooting incident response. When responding to an incident, Emergency Medical Service (EMS) typically divides a site into three levels – hot zones, warm zones, and cold zones – based on danger levels. In the Parkland shooting, the 1200 building went ‘cold’ – meaning it was safe – as soon as the shooter left the building. But it was 58 minutes before they called it a ‘cold’ zone, thus delaying survivors’ access to emergency care that could have saved lives. Better situational awareness, provided by leveraging CCTV, would have made the difference. If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?" There are a number of other available standards, processes and other documents to guide emergency response. Adherence to best practices can help to avoid liability – and save lives. Ignoring known and well-documented best practices can leave an enterprise vulnerable in the aftermath of an incident. Understanding these principles and best practices can help security equipment companies understand how the benefits of their products can be maximized in this context. Here are some available resources: NFPA 3000, a 42-page provisional standard for responding to an active shooter, addresses all aspects of the process, from identifying hazards and assessing vulnerability to planning, resource management, incident management at a command level, competencies for first responders, and recovery. National Association of School Resource Officers (NASRO) has created Standards and Best Practices for School Resource Officer Programs. PASS (Partner Alliance for Safer Schools) has compiled School Safety and Security Guidelines and a School Security Checklist. Federal Bureau of Investigation (FBI) has released ‘Making Prevention a Reality: Identifying, Assessing and Managing the Threat of Targeted Attacks’. Department of Homeland Security (DHS) has released ‘Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide’. U.S. Secret Service has released ‘Enhancing School Safety Using a Threat Assessment Model: An Operational Guide for Preventing Targeted School Violence’. OSHA 3148 provides policy guidance and procedures to be followed related to occupational exposure to workplace violence. (OSHA is the Occupational Safety and Health Administration) OSHA’s ‘general duty’ clause requires that each employer furnish to each of its employees a workplace that is free from recognized hazards that are causing or likely to cause death or serious physical harm. “If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?” says Wilkins. “It’s regulatory guidance that you could have followed but didn’t.”
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalizing or burglarizing the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the existing video system, the system integrator introduced two OPTEX Visual Verification Bridges and four OPTEX Redwall SIP-3020 Outdoor PIR motion detectors. The motion detectors were installed over the two main perimeter light poles pointing into the lot with IP cameras located directly above each of the motion detectors. Access to camera visual With the two Visual Verification Bridges installed, the integrator can provide operators immediate access to eight live cameras during every alarm event. The Redwall SIP-3020 provided up to 30m of distance coverage and 20m width, complete with anti-masking and vandal tampers. With this simple but effective solution, the integrator was able to provide their customer with immediate visual verification of alarm sensors, only when the alarm panel is armed. Wireless key fobs were provided so the dealer can arm and disarm the system from outside the gate helping to eliminate false alarms during arming and disarming. Reduced false alarms Since the completion of this installation, there have been several nuisance alarms caused by cats that were immediately disregarded. Due to the visual verification solution there was no intrusion and the client has not had any vandalism or crime since. Per the customer’s request, the OPTEX Bridge has been installed on three additional car lots.
With more than 2,200 locations and 41,000 associates, Panda Express is America’s family-owned and operated Asian dining concept. Challenged with losses at the point of sale (POS) and growing false alarm penalties, the company turned to Interface Security Systems, a managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to help them dramatically decrease shrink and resolve security inadequacies. False alarms and fines Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. Interface monitoring center instantly verify any alarm from a Panda store “When an alarm went off overnight, our managers would always err on the side of caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.” Suspicious transaction notification To address the false alarm challenge, Interface installed a next-generation IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring center instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms. Forcum reports that Panda is saving over $100K per year in false alarm fees Panda had also implemented a customized, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. Identify anomalies and prevent shrink The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register. The business intelligence provided allows for focused tracking and improved store operations With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. Forcum reports that Panda is saving over $100K per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. Monitoring intrusion data The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimized store efficiencies, monitored intrusion data, and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space. “Interface is a partner that's been collaborating with us on our needs from day one,” says Forcum. “The company understands what we need, and then it develops solutions towards that end. It doesn’t just come up with an off-the-shelf product and expect us to purchase it. Interface has shown a real commitment to our business. We meet with them regularly to collaborate on new initiatives and on emerging issues that Panda faces. The company has truly become part of that solution voluntarily and eagerly. Other business partners do not do that. Interface is, in fact, a true part of the Panda team.” A more detailed case study and video testimonial on Panda Express can be found on the Interface website.
From simple thefts of copper wire from rooftop HVAC systems, to substantial damage and revenue loss at electrical substations, copper continues to be stolen from everywhere that it is readily available. Due to the high price of copper, a large electric power holding company in the Mid-West United States faced the growing issue of theft and damage at multiple sites. The few hundred dollars of copper that was being ripped out was causing hundreds of thousands of dollars in damage, repairs, and down time, while creating unsafe grounding conditions for the electrical equipment. Electrical substations Changing site conditions, large perimeters and the inability to trench, and remote locations were all challenges that needed to be addressed when deciding on a solution. An integrator was selected who then teamed up with OPTEX to create a reliable, effective security solution. The team decided on protecting the existing perimeter fence and automatic gate systems using pairs of the SL-350QFRi housed in photoelectric beam towers. This offered a battery-powered, wireless 350ft. point-to-point perimeter solution and allowed the integrator to set up the units without running power to them, eliminating the need to trench or run cables. When a site plan is provided, OPTEX offers to custom build the towers and pre-install the photoelectric beams in them based on the job site specifications, all at no charge. Also, it will be shipped directly to the job site, labeled for position and ready to be installed. Rooftop and HVAC units When a high school in DeKalb County, Georgia began feeling the effects of copper theft, The DeKalb County School District turned to OPTEX to help protect their HVAC systems, rooftops and yards. Because of labor and cost associated with wiring, along with the difficulty bringing power to the rooftops, the Regional Sales Director for OPTEX recommended the iSeries battery-powered, wireless PIRs. The iSeries detectors offered spot protection for the HVAC units while covering all access points on the rooftop. Relocation of detectors Thefts have been eliminated and the end user can respond quickly before any damage is done The wireless feature also allows the integrator to relocate and easily adjust the detectors based on future security needs. With the system in place, copper and other related thefts have been eliminated and the end user can respond quickly before any damage is done. All of the battery-powered, wireless detectors from OPTEX come with an empty backbox and work with most manufacturers wireless transmitters. When one selects the iSeries version, OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter. One less time consuming step to do for the installer! Construction sites A New Mexico based construction contractor began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts from copper pipes and wire to hand tools to heavy-duty machinery. Set-up was able to accommodate the frequently changing conditions of a construction site Sometimes workers would arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor had to cover the cost of replacing materials. An Albuquerque based integrator introduced the construction contractor to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. OPTEX iSeries photo beams and PIR detectors A combination of OPTEX iSeries photo beams and PIR detectors were attached to freestanding steel posts with base plates and deployed throughout the job sites. This set-up was able to accommodate the frequently changing conditions of a construction site. For some sites, the integrator used as few as a dozen detectors, while others required as many as 30 or more. With the PIR and Photo beam solution specific to each site, the end user has seen zero thefts since installation.
Car theft is a concern for many people, so imagine if one person was responsible for a whole load of them. Car dealer P. Christensen in Denmark knows this headache from personal experience, suffering a number of thefts from their fenced area. It was time to ramp up security, so they turned to Telesikring, the largest private-owned security company in Denmark, for a perimeter detection solution. Telesikring upgraded security with a solution using Hikvision surveillance cameras. Despite existing security measures like electric fences and burglar alarms, the car dealership was still experiencing thefts. Thieves were managing to come up with increasingly imaginative ways to beat the system – like crawling over fences and even digging underneath them. Perimeter detection solution They stole all sorts of items, including wheels and catalysts from the cars and vans exhibited at the site. These represent quite some value, and the cost of these losses was mounting up. They needed a solution which could work for them in all sorts of weather conditions and in the dead of night – the most vulnerable time. The premises have some quite remote outlying areas, which were also particularly at risk. The car dealership is now monitored using a perimeter detection solution made up of both conventional and thermal cameras. These cameras are connected to a Milestone VMS with analysis software. In turn, this has a direct connection to the Jutland Control Center, a local Alarm Receiving Center that monitors the property 24/7. Thermal Network Bullet Camera These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification Now it’s not possible to enter the property outside of opening hours - day or night, without this being registered by the control center. The information they receive from the analysis software enables them to make an informed decision on their response, for example sending a guard patrol. Thermal cameras were chosen because of the reliability in all weather conditions. This solution specifically used the Thermal Network Bullet Camera (DS-2TD2136-10). Once the thermal camera detects a break-in, it sends an alarm to the ARC and the operator there can use the low-light clarity delivered by the DarkFighter cameras (DS-2CD4B26FWD-IZS) also present to verify the alarm. These cameras provide excellent images even in the lowest of light levels, making the ideal for remote verification. Effectively prevented burglary Henrik Finn Sanderlund, Quality Manager at P. Christensen, says: “Yes, we are very satisfied! Since the deployment of the system, this has effectively prevented burglary and theft. The solution was deployed on a Thursday and on Friday the solution caught the first break in, effectively preventing it.” Managers at P. Christensen can now rest at night, safe in the knowledge that security innovation is keeping an eye on the property.
Revader Security has supplied a fleet of rapid redeployable CCTV cameras to Merthyr Valleys Homes, a housing association which owns and manages over 4,200 homes across Merthyr Tydfil, South Wales. The Transit range of mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. The CCTV team at Merthyr Valley Homes are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, antisocial behavior, burglary and vandalism. As the units can be installed in virtually any location within minutes, only minimal planning and notice is required. Tackling issues of crime and antisocial behavior Each unit delivers live and recorded footage to the Merthyr Valley Homes control center Each unit delivers live and recorded footage to the Merthyr Valley Homes control center over a combination of wired, wireless and mobile networks and are powered by a variety of sources, including mains and battery. The mobile CCTV products were provided through Caerphilly-based Seren Fire & Security Solutions, an established supplier and installer operating across the region. Merthyr Valley Homes has gradually expanded its stock of Transit redeployable cameras following consistently positive results in tackling long-running issues of crime and antisocial behavior within local neighborhoods. Great build quality and performance Huw Powell, Anti-Social Behavior Officer at Merthyr Valley Homes said: “We have been delighted by our new mobile CCTV capability. The redeployable cameras from Revader Security really are great in terms of build quality and performance – and they have proven to be an invaluable investment.” Revader Security continue to work in partnership with Seren Fire & Security Solutions to support Merthyr Valley Homes and a variety of other clients in the public and private sector.
DHL Express is the global provider of international shipping and courier delivery services, and has a major market share of express logistics in the Middle East with a strong customer base in Saudi Arabia. DHL Express has facilities at all the major airports and in most of cites in Saudi Arabia and the fastest clearance in KSA when compared to its competition. Saudi Arabia is one of DHL’s key markets and the delivery firm strives to be close to its customers here. But with facilities spread across the Kingdom, DHL faced issues in securing its critical assets. Particularly in terms of preventing unauthorized access to critical operational sites; unauthorized access for employees and contractors outside working hours; and unauthorized vehicle access to its warehouse facilities and receiving and responding to critical alarms. Intrusion detection Nedap’s AEOS access control and intrusion detection system was selected as the ideal solution One of DHL’s main aims was to switch to a new security system that would support all the latest access control and intrusion detection features, meet its business requirements and use its existing investments effectively Nedap’s AEOS access control and intrusion detection system, integrated with the Milestone VMS system, was selected as the ideal solution. AEOS is based on an open architecture, and offers flexible integration. So DHL was able to quickly implement its new access control and security system while retaining the investments it had made in existing readers and cards. RFID identifiers After using Nedap’s AEOS access control and intrusion detection system in one of the airport facilities, DHL decided to extend its use across the Kingdom. This set a roadmap for unifying all its facilities under the same access control and intrusion system. And ultimately, gave DHL the opportunity and flexibility to use the same cards across all its facilities. Nedap was able to provide secure, convenient access for DHL’s people and vehicles using RFID identifiers Through AEOS, Nedap was able to provide secure, convenient access for DHL’s people and vehicles using RFID identifiers. With the intrusion alarm system activated to restrict access during non-operational hours, unauthorized access to DHL’s operational sites has been prevented. And integrating AEOS with Milestone’s CCTV Video Management system has enabled DHL to receive graphical alarms on video walls. It’s also allowed it to view all related video footage associated with each alarm or event. SecuTronic, based in the Kingdom of Saudi Arabia, implemented the project successfully and efficiently. Flexible access control platform AEOS, secured and flexible access control platform has helped DHL Saudi Arabia to protect all its facilities, with access control and intrusion alarms, from one centralized control room. All the service points are equipped with a burglar alarm system and an enterprise-level access control platform connects all its sites across the country. AEOS has helped DHL to address all the security challenges it faced in Saudi Arabia and stay ahead of them, winning the trust of the customers by ensuring their shipments are secure. In addressing its security and operational challenges, DHL Saudi Arabia has been able to meet every TAPA (Transported Asset Protection Association) regulation. And by implementing such a secure monitoring system, it’s positioning itself as the last-mile fulfilment giant in the Middle East region.
Round table discussion
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload