Campus security systems
The implications of COVID-19 have been profound, and the road to business recovery is evolving and fluid. Facility providers around the world are shifting priorities. The focus was once creating a workplace that promotes employee productivity and company values. Now, it’s ensuring that the workplace, and everyone who enters it, remain safe and healthy. With all the coronavirus uncertainty, it might feel strange to start working on how to open offices again. But no matter whether offices a...
Safetrust, a pioneer in virtual credential solutions, and AlertEnterprise Inc., the foremost physical-logical security convergence software company, have entered into a strategic partnership to deliver next-generation digital access credentialing and controls, providing frictionless, safe, and secure workspace access experience for employees, contingent workers, and visitors. Benefits of collaboration The collaboration reinforces the new way businesses are defining smart and healthy workplaces...
Safetrust, a pioneer in virtual credential solutions, introduces the SABRE MODULE, a 30-second plug-in upgrade that adds DESFire EV3 and remote management capabilities to installed HID iCLASS readers. Supports Wi-Fi The module simplifies the transition from legacy prox, iCLASS, or SEOS credentials to DESFire EV3 and supports Wi-Fi which allows customers to remotely manage and configure their readers, eliminating the need for onsite visits. Plug and play The fast, plug-and-play solution requi...
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing reall...
Navigate360 invites everyone to welcome P3 Global Intel to the Navigate360 team. As they continue to focus on extending value to their customers, P3 brings a wealth of expertise along with state-of-the-art tip acquisition and management technology. The P3 solution is the renowned choice of Crime Stoppers Programs, Law Enforcement Agencies, Campus Safety Programs, and Federal Agency Initiatives in the US. Its proven technology is used in over 35,000 schools and districts across the country, wher...
Aiphone, the international manufacturer of intercom and security communication products, announces that 14 of its most popular IX Series IP video intercom stations and components have received certification from UL, an independent global safety science company that tests and certifies products. The IX Series IP video intercom stations and components which received UL certification were tested under UL standard, 62368-1, for audio/video, information, and communication technology equipment. A UL...
Smiths Detection announces its newest X-ray inspection system, HI-SCAN 5030C, that addresses a critical gap in commercial security screening solutions with its optimal size, durability and mobility. Combined with a HiTraX 3 electronic platform for superior image quality, the HI-SCAN 5030C is specifically designed to enhance security screening operations from courthouses to corporate campuses. Its compact size and lightweight construction enable it to fit seamlessly into checkpoints and mailrooms. Vibration absorbers make it possible to transport HI-SCAN 5030C between various locations without requiring re-calibration, providing maximum flexibility. Training and detection support The HI-SCAN 5030C is Smiths Detection’s smallest X-ray inspection system and offers a wide variety of options including stainless steel castors, storage compartment, 24” monitor, newly designed keyboard with image manipulation keys, and foldable input/output conveyors. It can be upgraded with add-on software packages for training and detection support. Matt Clark, Vice President, Technology, Smiths Detection said, “Our mission is to deliver the right solutions to help our customers achieve safety and security no matter what size or scale of their operations. The HI-SCAN 5030C fulfills an important role for a wide range of commercial applications, helping improve security with ease and efficiency. Engineering the HI-SCAN 5030C for mobility further maximizes its utility and versatility, enabling customers to share it or relocate it as required.”
Davista, a provider of artificial intelligence for physical security and law enforcement, announced the availability of its AI-powered social distancing platform. The solution is designed to help businesses, organizations, and government agencies ensure social distancing efforts to keep individuals safe while promoting a healthy return-to-work. Across the globe, governments, corporate entities, and health and law enforcement agencies are working to find solutions to COVID-19 while making strides to get their local economies back up and running. AI-driven technology Heimdall is designed to help organizations proactively identify threats, find strategies to combat them Since the virus can be transmitted through close proximity to affected individuals, public health officials have identified social distancing as a proactive approach to help contain its spread. When combined with the ability to identify individuals who may be infected with COVID-19 and who they were in direct contact with, AI-driven technology can help organizations react proactively if an outbreak occurs. Based on Davista’s flagship Heimdall platform, the social distancing platform is based on Bluetooth and GPS technologies and manages the process of identifying individuals who come in contact with individuals who may be infected. Heimdall is designed to help organizations proactively identify threats, find strategies to combat them and identify potential trends to identify based on their specific environment. Platform with predictive intelligence The customizable platform combines a multitude of data sources and uses predictive intelligence The customizable platform combines a multitude of data sources and uses predictive intelligence to best deploy physical security or law enforcement personnel, assets and technologies. It can be configured to address evolving risks and security and compliance requirements, and easily add new configurations to support applications like the social distancing platform. Employees running the Heimdall Social Distancing app on their smart devices will receive alerts when they come close to other employees. The system will also enable employers to trace, monitor, and manage their organization’s overall social distancing environment. Proactive risk mitigation strategies The AI engine can be configured to automatically record the user's location as well as the user’s “bread crumb” trail The AI engine can be configured to automatically record the user's location as well as the user’s “bread crumb” trail for proactive risk mitigation strategies. If an individual exhibits COVID-19 symptoms, organizations can quickly find and isolate the correct employee, map the user’s trail via their mobile device and identify who they came in contact with. "Davista is committed to helping organizations across the globe gain access to the technical tools required to help combat the virus and ensure streamlined health monitoring to support the re-opening process," said Scott Sieracki, Chief Sales and Marketing Officer, Davista. "Our team believes there has never been a more important moment to engineer solutions to solve this challenging process. Through close cooperation and collaboration with our customers, we look to harness technology's power to slow the spread of COVID-19 and accelerate the return to everyday life." Key features Drawing on its years of experience in the engineering of AI-enabled solutions, Davista can automate the process of social distancing and security leaders and law enforcement help identify people potentially at risk through: Geo- and Bluetooth-enabled TracingBuilt upon the latest technology protocols, Heimdall utilizes both geo-location aware and Bluetooth based technology for enhanced contact tracing and can leverage a customer’s wireless access points (WAP) and other technologies for optimal location awareness. Automated Stakeholder AlertsStakeholders receive automated alerts based upon predefined conditions informing them of what they need to know and when they need to know it. n-th Degree Contact TracingQuickly locate people who contact potential COVID-19 individuals by using advanced filtering options and contact link visualizations. Privacy-preserving Data CollectionQuickly deploy in a building, campus, or agency-wide setting and employ Heimdall's geofencing and data anonymisation techniques for privacy preservation.
Security at educational institutions is a highly sensitive issue. No matter whether it is a kindergarten, school, university or private learning institute, concentrated learning requires a harmonious environment to focus on the essentials. High-end video technology can make a decisive contribution to protecting students from any kind of disturbance or untoward incident. Safeguarding schools In the past, schools and universities have repeatedly been the target of active shooter and terrorist attacks. The primary goal of educational institutions, owing to this constant threat, is to prevent ‘unauthorized access’ to the school grounds and to allow only authorized visitors. Further potential danger exists internally, such as cases of vandalism, bullying and violence by or among students, which are issues that may arise sometimes in school life. Of course, early smoke and fire detection are also important components for a safe learning and living environment. MOBOTIX video security solutions MOBOTIX has video security solutions for the education & science sector in its portfolio" In addition, the COVID-19 pandemic has brought new health protection requirements into focus. Video technology can provide reliable support in all these scenarios. "MOBOTIX has video security solutions for the education & science sector in its portfolio that makes school, learning and studying safe. These solutions are already in use around the world and have proven themselves to be very effective," said Thomas Lausten, Chief Executive Officer (CEO) of MOBOTIX AG. With its unique product portfolio consisting of hardware, software, services and intelligent partner solutions, MOBOTIX can precisely map the requirements of various industries. The latest technologies can be used to protect people, facilities and infrastructure in schools, universities or private educational institutions. Access and entry control Video technology from MOBOTIX helps to prevent unauthorized access and regulate access to buildings, or individual areas in a targeted manner. In addition, doors can be opened totally contactlessly, for example using RFID chip cards, access codes and identification of authorized personnel, based on face recognition technology. An overview in real time is possible and also helps in emergency situations, e.g. during evacuations to find out whether and which persons are where. At entrances and parking lots, vehicles can be automatically registered via the license plate and compared with databases. The identifying video technology can thus, efficiently restrict access to authorized vehicles or persons. MOBOTIX 7 open video system platform Using the new open video system platform, MOBOTIX 7, numerous camera apps can be used for intelligent video analysis. Among other things, the applications can register, for example, ownerless luggage, stolen furnishings, can track down suspicious persons, count people, recognize overcrowding situations or alert when one or more virtual blocking lines are crossed for burglary protection. The robustness of the MOBOTIX hardware also protects the video technology of MOBOTIX itself against vandalism. The use of thermal imaging cameras is also recommended in special areas. For example, an email can be sent to the building maintenance department if the system, which reacts to invisible heat radiation, detects increasing overheating in an IT server room before a dangerous fire breaks out. Campus security and perimeter protection The MOBOTIX M16 and M73 offer several simultaneous sensors in a robust, weatherproof design For outdoor applications, the MOBOTIX M16 and M73 offer several simultaneous sensors in a robust, weatherproof design. The wide range of interchangeable sensor modules can be configured to meet the exact requirements of the educational institution in question, with the aim to detect danger or any untoward incident in time and thus, effectively thwart them. For example, a floodlight could automatically shine if an unauthorized person enters the campus outside of opening hours. If desired, this could also be combined with an acoustic warning. Cyber-secure MOBOTIX video technology While the communication infrastructure in the education sector constantly improving, there are usually few resources (personnel, know-how) available for the maintenance of the technology. For this reason, the systems used must be stable and, if possible, maintenance-free and also protected against physical and digital attacks. MOBOTIX video systems are made in Germany. With an above-average ‘Mean Time Between Failures’ (MTBF) of more than 80,000 hours, the follow-up costs of a MOBOTIX system are reduced to a minimum. Resources for technology support can be saved. Due to their durability and robustness, they are predestined for use in education and science. "Particularly in the educational sector, the security of pupils, students, teaching staff, but also of equipment and facilities is of particular importance, real and digital. MOBOTIX has optimal solutions that are robust, reliable and cyber-secure. Solutions that help to make our educational institutions more convenient and secure," concludes Thomas Lausten.
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, made new breakthroughs in the field of AI technology recently. Various indicators of its Gait Recognition Technology have once again broken the record of CASIA-B gait dataset: the average accuracy of Rank1 for NM (normal walking), BG (with a bag) and CL (in a coat) reached 97.4%, 94.0%, and 87.0% respectively, hitting another historical heights and maintaining its pioneering position. Gait recognition uses body shape and walking posture to identify a person, even if his/her face is occluded. It is one of the biometric recognition technologies with the greatest potential for long distance recognition scenarios. Gait recognition analysis Aiming to address the technical difficulties of gait recognition in clothing changing search, carrying changing search and cross-view search, Dahua Technology integrates innovation and application of multi-modal gait algorithms, local gait feature extraction, and spatio-temporal gait feature extraction technologies. Dahua Technology has been cultivating and innovating in the field of AI technology Combined with powerful model training and object recognition, it greatly improves the algorithm's robustness in special scene applications such as clothing changing, similar clothing, facial occlusion, and facial disguise, and thus making the gait recognition analysis more accurate and efficient. In recent years, Dahua Technology has been cultivating and innovating in the field of AI technology, and has continuously improved its core competencies that include algorithms and computing power. Fundamental AI capabilities So far, Dahua Technology has received numerous first-place recognitions in various global AI ranking categories including Scene Parsing, Binocular Stereo Matching, Remote Sensing Image Analysis, Person Re-identification and Visual Target Tracking Algorithms. It has accelerated the transformation of its AI technology achievements into real and actual production, maintaining its pioneering edge in the industry. Based on the construction of its fundamental AI capabilities and resources, Dahua Technology has released its new generation AI platform. It integrates computing centers, data centers and training centers in order to build its sustainable capabilities in the fully linked development of AI, including data management, algorithm training, cross-hardware platform optimization, integrated deployment, and automated testing. Intelligent business applications Dahua Technology combines industry development and diversified needs of users It provides guarantees for algorithm research and application, improves efficiency of AI research and development, and helps users build intelligent business applications and accelerate end-to-end AI industrialization. At the same time, Dahua Technology combines industry development and diversified needs of users, focusing on AI technology fields such as smart transportation, smart travel, behavior analysis, item analysis, navigation and positioning, multi-dimensional sensing, as well as smart coding and decoding. Digital and intelligent transformation It has accelerated the development and upgrade of its algorithms for application scenarios, quickly realizing the commercial coverage of smart products and solutions in the whole system, and empowering customers to innovate in a wide range of applications. These include public security, transportation, finance, communities, energy, education, manufacturing, construction sites and other industries, thus assisting users in achieving their digital and intelligent transformation. In the future, Dahua Technology will continuously adhere to the concept of "Empowering industries with AI" in promoting the in-depth integration of AI technology and various industry scenarios, fully utilizing the support and leading role of technological innovation in the sustainable development of hundreds of industries. The company will advocate popularization and application of AI and other new generation technologies in order to empower the digital transformation and upgrading of all industries.
While access control is a fundamental element of security in higher education, many aging access control systems urgently need to be upgraded. This is according to a survey of 1,800 higher education security and IT professionals conducted by Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions and HID Global, a worldwide provider in trusted identity solutions. While organizations are ready to embrace new technology, they are looking to go “beyond the door” and integrate with other security and operations systems. Older technologies The survey shows that 33.76% of readers, 30.6% of controllers, and 24% of software are more than six years old. Older technologies such as barcode, magnetic stripe (mag stripe) and 125khz low-frequency proximity (prox) continue to dominate physical access control systems in higher education. More than half of survey respondents still use mag stripe, and almost a quarter still use 125khz prox. 64% of survey respondents said their current access control system experiences malfunctions. However, more than a third of survey respondents (35%) are ready to embrace more modern technology as a way of improving the experience for students, faculty, and administrators. Access control for multiple applications Over half of respondents (54.2%) would be interested in using their access control credentials to support multiple applications beyond physical access, and 44% stated that better integration with other security systems/components is a key driver to upgrade their access control systems. Most colleges and universities want their students to use a single card or cellphone credentials for multiple types of applications from accessing dormitory rooms and checking out books from the library to locking bicycles and paying for food, parking, and more. However, 64% of survey participants said while they want to upgrade their systems, they view costs as an obstacle. This often leads institutions to ultimately migrate to systems that fulfill minimum requirements because of cost, rather than seek the features and integration capabilities they seek. Unified video and access control solution “There are new technology options that can make life easier for administrators as well as those who use the systems,” says Jason Friedberg, Commercial Head, Education at Genetec. “With ever-evolving threats, and a need for increased efficiency, accessibility and privacy, security on higher education campuses is an ever-changing environment. Institutions need to be prepared for these changes by upgrading to a unified video and access control solution that is flexible, connected, and easy to use.” “And while cost is seen as an obstacle, the true value is often not factored in. With a modern, unified system, ongoing costs often end up being lower than those of legacy systems because the additional capabilities of newer systems increase operational efficiencies across multiple departments,” concluded Friedberg.
With immediate effect, Dormakaba UK & Ireland has acquired 1st Access Group Ltd, an award-winning company specialized in premise security and redesigning shopfronts including aluminum shopfronts, windows, roller shutter, and automatic door requirements. Paul Wright, Managing Director of Dormakaba UK and Ireland Ltd, comments “We are delighted to welcome the team from 1st Access Group and through the synergies of our businesses driving further sustainable growth and service excellence to meet our customer expectations and needs.” Vikki Lindop and Jason Loydon, Director of 1st Access Group Ltd, added, “The opportunity to join the Dormakaba group provides an excellent opportunity to further enhance our offering and exceed our existing performance.”
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video Analytics Software When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. The video intelligence software processes and analyses video to detect all the people and objects that appear Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining Public Safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video Surveillance Data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing Situational Awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large Education Campuses Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless Business Operations Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire Detection And Precise Shooter Location ShotSpotter SecureCampus solution is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detection Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defense for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. Audio Solutions for Perimeter Security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognizing duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial Intelligence To Detect Weapons A gunshot detector recognizes firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritize responses from police and emergency personnel. Detecting Audio Levels And Alerting Operators The first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measures Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
ZeroEyes, the only AI-based platform focused solely on weapons detection, has been selected by the Kenosha Unified School District (KUSD) of Wisconsin to help improve security on its campuses. ZeroEyes proprietary solution ZeroEyes’ proprietary solution will identify visible guns if present and send alerts to school administrators and security personnel within three to five seconds, helping to stop violent threats before they occur. KUSD is the third-largest school district in Wisconsin, with over 21,000 students and 4,200 employees in 23 elementary schools, five middle schools, five high schools and five charter schools. Integration with IP security cameras ZeroEyes currently integrates with KUSD’s IP security cameras to help detect visible weapons and serve as a proactive measure to prevent any violent threats on campus. When ZeroEyes positively detects a weapon, the platform sends a notification to school administrators, school resource officers and local 911 dispatch, ensuring the school can enact security protocols and give first responders real-time information to help prevent active shooting tragedies and save lives. Enhancing staff and students’ security “It’s a grim reality that active shootings happen in schools across the country, and we’ve needed to understand and implement the solutions that can keep our students, staff and visitors safe,” said Kevin Christoun, Maintenance, Environmental and Safety Manager at KUSD. Kevin adds, “At KUSD, we have a multi-layered security approach that includes the most effective and innovative technologies and resources, and ZeroEyes’ platform clearly supports our strategy.” Weapons detection solution ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection Founded by a group of former Navy SEALs and military veterans, ZeroEyes proprietary and comprehensive datasets focus exclusively on weapons detection, to actively monitor and detect for visible weapons. ZeroEyes also trains and collaborates with customers and local first responders to conduct extensive pilots before its solution is fully implemented. In the future, KUSD plans to roll out additional installations to remaining schools in the district. Effectively countering active shooting incidents “ZeroEyes was founded upon the realization that a proactive solution was needed to help keep people safe, with real-time information to adequately address violent threats and prevent mass shooting tragedies,” said Dustin Brooks, Vice President of Education at ZeroEyes. Dustin adds, “KUSD focuses on providing a safe and productive learning environment to its students and faculty, and we’re honored to provide a 24/7 solution that supports their goals.”
Redlands Unified School District, located in San Bernardino Country, California, hosts more than 21,000 students across its 16 elementary schools, four middle schools and four high schools. School security is paramount for the district. It’s taken extra precautions, including a focus on lockdown procedures across its locations and the district office. K-12 school security can be challenging, especially with the uniqueness of Redlands High School. It’s an older facility that was constructed more than 100 years ago. Additionally, students must walk outside to pass from building to building, and there’s a street that cuts through campus. A crosswalk is needed to get from one end to the other. The district needed to take all of this into account when assessing their security plan. Securing every layer The district’s security team took into consideration each physical layer that needed protection The district’s security team took into consideration each physical layer that needed protection at Redlands High School, from the district level to the classroom and many openings in between. Yet, there was a common area that needed addressed. There’s a fence around the campus to protect the property perimeter. And Redlands High School is extending that fence to include the cross walk, which will help funnel guests into a single point of entry, the main office. Schlage AD Series electronic locks This opening, as well as many other perimeter openings that lead into offices, gyms, auditoriums, libraries and hallways in the school feature Schlage AD Series electronic locks that are connected to the district’s access control system. At the classroom layer, each door has mechanical hardware that can be locked from the inside. Redlands School District has started district-wide implementation of a full-feature enterprise access control system through Vanderbilt, which is capable of operating across different schools, campuses and other locations. RedRock Security and Cabling, Inc. (RedRock Technologies) had implemented and continue to support the solution. Electronic access control “When these systems are managed district-wide, schools have the ability to lock down a door at a time, a school at a time or an entire district at a time,” said Jennifer Martin, Director of System Sales at Vanderbilt, adding “It’s all about protecting the students.” With electronic access control on main points of entry and many assembly areas, plus secure mechanical locks on classroom doors, Redlands High School had most of the layers prepared in the event of a lockdown event. However, the school’s cafeteria, Terrier Hall, was a vulnerable space. “Hundreds of students use Terrier Hall,” said James Fotia, Director of Maintenance, Operations and Transportation at Redlands Unified School District, adding “In a lockdown situation, that’s a place where we would secure the kids and keep them safe by clustering them into that area and having it locked down. But it was secured by one AD-400 lock on a pair of double doors. That was incomplete.” Von Duprin RU retrofit option Allegion representatives recommended a new K-12 security solution from Von Duprin To demonstrate how the school could affordably secure big banks of doors without having a reader on each opening, Allegion representatives recommended a new K-12 security solution from Von Duprin. The Von Duprin RU retrofit option is a cost-effective solution for openings with existing exit devices that enables remote locking, or un-dogging, for centralized lock down. This enables staff to initiate an immediate campus-wide lockdown from a secured location instead of putting themselves in harm’s way to manually undog exit-device doors throughout the building. Integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signals are included to provide real-time remote monitoring and confirmation of the security status of the door. Wireless connectivity to ENGAGE Gateway There’s also a ‘dog on next exit’ feature, which is a scheduled function sent to the device to allow the door to remain unlocked the first time someone depresses the push pad of the exit device to leave that space. The door is secured in the evening, and with ‘dog on next exit’ enabled at a specific time in the morning, staff simply depresses the push pad to unlock the door. This makes unlocking the door simple for scheduled events and daily lock-up easy by reducing the need to distribute keys to staff. Additionally, the RU option connects wirelessly via Bluetooth Low Energy to Allegion’s ENGAGE Gateway which provides real-time, bi-directional communication to the access control software. RU is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A Series devices. Enhanced door security “The Von Duprin RU option fits into special applications that haven’t been addressed in the past,” said Russell Gamble, End User Consultant at Allegion, adding “There are several openings that will benefit from this secure lockdown solution.” At Redlands High School, the Von Duprin solution is installed on five doors that surround the cafeteria area. There are main entry doors where students enter, plug in their lunch numbers and go through the buffet line. From there, they enter the multi-purpose space, where there are four additional doors, which are secured with the RU options. Access control solution with lockdown capabilities There was also interest in implementing the security solution at the district office There was also interest in implementing the security solution at the district office. The school wanted to pilot the solution there to experience the product and its features, especially the lockdown capabilities. And being that the building is so unique, it has a need for enhanced security. “The district office is a converted warehouse, so it was never really meant for meetings and offices,” said Fotia, adding “Having the Von Duprin RU has been a wonderful fit in providing security in a not so ideal building.” Integration with Vanderbilt solution The main building is built U-shaped and the loading dock is in the middle. In the middle there is a courtyard area with four portable offices. The Von Duprin RU is on each portable door. At both locations, the Von Duprin RU options are integrated into the Vanderbilt solution and part of the broader lockdown solution. “The greatest thing about this solution is schools now have a way to electronically add control to doors that used to be manually monitored,” said Jennifer Martin. Remote lockdown and door access control She adds, “With the Von Duprin 99 Series, doors allow for free egress, but they aren’t usually monitored by access-controlled systems. If someone has it dogged so the doors are unlocked or propped open, someone has to manually go around and lock each door.” This solution ensures staff is alerted if a door is propped open and enables the ability to lock down the door remotely, even if it was previously mechanically unlocked. Enhanced lockdown capabilities for peace of mind Redlands Unified School District is pleased with the addition of the Von Duprin RU Redlands Unified School District is pleased with the addition of the Von Duprin RU to its school security plan. Integrating the solution with the Vanderbilt system, along with the Schlage electronic locks on campus has improved lockdown. According to the district’s Coordinator of Operations and Facility Planning, Ken Morse, it’s also improved peace of mind because there are less errors and more control over these areas. In the cafeteria, Terrier Hall, they’re able to secure doors that used to be manually controlled. This eliminates human error and the risk of manually locking doors in an emergency. Fotia said the school also likes the budget-savings aspect since it was able to simply upgrade the hardware it already had in place versus purchasing entirely new equipment. He’s excited to see other areas where the Von Duprin RU might be a fit. “The security measures and the lockdown capabilities are the main reasons we wanted the Von Duprin product,” said Morse, adding “Putting something on a schedule is also a great bonus because of how many common-use facilities we have. We’ve found that scheduling it is relatively easy. The doors are open only when they need to be. We have everything scheduled at the district office so it’s open during our hours, which has been a huge benefit.”
ZeroEyes, a renowned provider of artificial intelligence weapons detection solution, announced that it will provide its technology to the South Side Area School District in Beaver County, Pennsylvania. ZeroEyes’ platform is purpose-built to detect visible weapons in real-time, identifying guns before any violent threats can occur. ZeroEyes’ software integrates with an organization’s existing camera systems and video analytics to detect weapons in real time. As soon as a visible weapon is detected, an alert with the image of the weapon goes to the ZeroEyes monitoring team. Once confirmed, an alert is sent to a local emergency dispatch, onsite security staff, police and school administrators via cellphone and desktop. South Side Area School District operates three schools: an elementary school, middle school, and high school, with approximately 980 students. Weapons detection solution The school has invested in a number of different technologies focused on keeping staff, students and visitors safe, taking a pioneering stance in prioritizing school safety. ZeroEyes is the first weapons detection solution installed on premises. ZeroEyes’ AI weapons detection platform allows security personnel to quickly enact security protocols “As a rural public school district, it’s absolutely crucial for us to take the steps needed to ensure the safety of everyone who sets foot on campus,” said Alan Fritz, Superintendent at South Side Area School District. “ZeroEyes has consistently demonstrated their steadfast focus and commitment to public safety, and we believe that their weapons detection solution will play a critical component in our overall security approach.” Active shooter threats ZeroEyes partners with its customers as well as local first responders to ensure that organizations - including schools, commercial and government buildings - have an additional layer of security to identify and stop threats. ZeroEyes’ AI weapons detection platform allows security personnel to quickly enact security protocols, or direct first responders to a threat. “ZeroEyes was founded with the core focus to help mitigate school shootings, and we’re excited to partner with a school district that is taking proactive measures against active shooter threats,” said Dustin Brooks, Vice President of K-12 Education at ZeroEyes. “We look forward to the partnership with the South Side Area School District and forging a strong relationship built upon deeply caring about protecting students and faculty.” Prevent mass shootings Founded by former Navy SEALs and military veterans with over 50 years of collective military experience, ZeroEyes’ mission is to detect weapons before shots are fired, enable faster response times for first responders and security personnel, and ultimately prevent mass shootings.
Monitoring campuses to protect students, parents, and staff means balancing proactive measures with effective response to incidents. Ava Unified Security (previously Vaion) helps one identify unwanted events like vandalism, intrusion, loitering, parking violations, or people involved in suspicious acts so that one can focus on what truly matters: delivering positive academic experiences. Anomaly detection in real-time Powered by Spotlight™, the dynamic video view with instant notifications draws attention to the relevant video feeds with potential risks. Identify intruder break-ins, loitering, guns, or unauthorized vehicles in real-time. Operators can switch between live and playback with the click of a button. Smart Presence™ depicts people as dots on maps and live footage of persons of interest. Combine with access control to monitor hallways for a complete picture of loitering, theft, or even active shooter scenarios. Gain insights on occupancy counting in classrooms and libraries for better energy efficiency. Accurate search and integrated audio analytics Smart Search™ allows operators to search by appearance, events, objects, similarity, or image Smart Search™ allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, such as laptops or vehicles, identifying suspicious people inside or just outside campus, locating missing students now take minutes instead of hours. With the same or fewer resources, operators can provide compelling evidence and mitigate liability risks. Ava Dome and Ava 360 perform perform exceptionally well either indoors or outdoors and in any lighting conditions making them suitable for different settings, such as classrooms, assembly halls, sports halls, or dormitories, and blend discreetly as interior fixtures. The integrated audio analytics identifies sound patterns and sends instant alerts in cases of broken glass, screaming, and gunshots. Key benefits Build from existing investment while retaining privacy Integrate with existing cameras Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Save storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what one needs, when one needs it, without the hassle of complicated licensing Safe and welcoming environment Capture every detail at all times with discreet security cameras Increase situational awareness Enable preventative action through immediate response time Collaboration and flexible licencing Globally access live feeds and recordings Share video links with law enforcement authorities to facilitate ease of investigations Maintain the integrity of records with video watermarking With a simple licensing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, has announced that Army and Navy Academy, a college preparatory military boarding school in California, has upgraded its security infrastructure with Hanwha security cameras. Located on a 23-acre beach-front property, the Army and Navy Academy is home to more than 300 students and employs more than 140 faculty and staff members. Two-fold surveillance upgrade According to Jeffrey Gibson, a system with analytics to keep a close watch on the campus could act as a force multiplier With a commitment to continuously adapt and improve, the Academy developed a strategic plan that focused on supporting the long-term success of their cadets. When the school began building and renovating facilities, they included an upgrade to their technology and physical security system. With a two-fold approach, the school first needed to replace their existing, out-of-date analog camera system. Second, they needed a system that could keep up with current technology. According to Jeffrey Gibson, Assistant Commandant, Operations, Safety, and Security at the Academy, a system with analytics to keep a close watch on the campus could act as a force multiplier. Hanwha security cameras with Wisenet WAVE deployed After an extensive vetting process, the school deployed a video surveillance solution comprised of Hanwha cameras integrated with Wisenet WAVE, a highly customizable and reliable IP-based video management system (VMS). Integrating the Hanwha security cameras using the Wisenet WAVE IP-based VMS made it possible to create a video surveillance solution that was exclusively tailored to the campus’ specific needs. The Academy was able to quickly train security personnel as required, considering the WAVE video management system (VMS) is extremely intuitive and easy to use. Multi-sensor, multi-directional PTZ cameras installed The Army and Navy Academy now has a total of 141 cameras, including PNM-9081VQ multi-sensor, multi-directional cameras for covering wide areas, which allows them to use fewer cameras while seeing more. They have also installed PNM-9320VQP multi-sensor, multi-directional PTZ cameras for zooming in and for covering long distances. Additionally, to be able to effectively monitor between buildings and cover their coastline, the Academy chose PNM-9020V multi-sensor 180° cameras. In-camera and VMS analytics features By taking advantage of the in-camera and VMS analytics available in their new system, the security teams at the Academy can now monitor internal and external areas with high precision and efficiency. The primary cameras installed focus on higher priority, greater risk areas, while the VMS analytics keeps track of the rest of the areas in the campus. Perimeter protection with line crossing analytics With the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics As a result of the surveillance system upgrade, most of the campus perimeter is now protected using line crossing analytics. With Hanwha cameras installed above the fence, the system sends an alert to the Security Operations Center (SOC), if it detects something crossing the fence in either direction. Once the system pulls up the camera feeds, operators can see if it’s a false alarm and then decide whether or not to dispatch a security team or call local police. Enhanced students, faculty and staff safety The security team has developed a strategy for inside the fence as well that allows them to focus on specific areas that have higher traffic at specific times of the day. The in-camera analytics looks at the low-traffic areas. If the camera detects movement, the Security Operations Center is alerted and can then determine whether or not to send personnel. Because the new Hanwha security system provides both coverage and analytics, the Army and Navy Academy’s security team is able to focus on what matters most, the safety of students, faculty and staff.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that NC State University in Raleigh, North Carolina, has installed new turnstiles as part of a major renovation of their D. H. Hill Library. Founded in 1887 as a public, land-grant, research university and part of the University of North Carolina system, NC State is the largest university in the Carolinas. The university is home to two libraries: the D. H. Hill Jr. Library on the North Campus and the James B. Hunt Jr. Library on Centennial Campus. Different common spaces The Hill Library houses over one million volumes of the libraries' total collection and offers a number of different common spaces for work and study. A recent renovation transformed the interior with the addition of an open grand staircase. The stairs connect the second and third floors to the lobby and flood the space with natural light. Two of the new turnstiles are for visitors entering the library, and the other two are dedicated for those exiting As part of this renovation, four Boon Edam Lifeline Speedlane Swing optical turnstiles were added to the Hillsboro Street entrance on the north side of the building. Two of the new turnstiles are for visitors entering the library, and the other two are dedicated for those exiting. The Hill Library is open to the general public during certain hours, with visits limited to the campus community the rest of the time. Exterior swinging doors lock During the day when the library is open to all, the turnstile barriers are kept open for free entry and exit. After general hours, the exterior swinging doors lock and authorized visitors must use their ID badges to unlock the doors and subsequently pass through the turnstiles. The Speedlane Swing turnstiles are known for their ultra-slim, stylish cabinets as well as their user friendly and responsive LED lighting system, which turns on when users approach and shows where to present their badge. The turnstiles offer support to security staff in the library lobby, helping ensure that no unauthorized individuals can access the library during non-public hours. If tailgating occurs, the turnstiles sound an alarm and security staff can respond immediately. Avoiding barrier contact On a typical day during the school semester, the turnstiles process approximately 6,000 to 7,000 students and other visitors. During the summer, this number drops to 400, but during exam time, usage peaks with up to 10,000 people entering the library every day. The campus population had no difficulty adapting to the new turnstiles at the Hill Library The campus population had no difficulty adapting to the new turnstiles at the Hill Library, as there were already turnstiles in place at the Hunt Library. According to Travis Tyo, the Director of Facilities for the Libraries, the new Speedlane Swing turnstiles were an improvement from the older turnstiles, due to their accurate ability to sense tailgating attempts and avoid barrier contact with fast moving users. Implementing another installation The University is already implementing another installation of Speedlane Swings at the south entrance to the Hill Library. The new entry will match the layout of the north entrance, with four turnstile lanes and a security guard on site. A future installation at the Hunt Library is also in the works. Travis says of the installation, “We worked closely with our Security and Applications Technologies departments here on campus; we tested different products and everybody liked the Boon Edam turnstiles and the ability of the company to respond whenever we need them. Ultimately it is much simpler and more efficient to have people badge in than to have a security guard look at IDs as each person enters the library.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?