Campus security systems
Workplaces, schools, hotels, sporting events, entertainment venues and other large –and sometimes not so large – facilities have become headlines in the news for all the wrong reasons: violent attacks. The Safer Solution is an effective training method that addresses public/workplace violence and active shooter incidents – by both alleviating a situation before it ever occurs, and by preparing civilians with appropriate response skills in the case of a crisis developing. The S...
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million peopl...
Connected Technologies LLC, maker of the award-winning Connect ONE cloud-hosted security management platform, has added Mobile Badge to its wide range of value-add features and capabilities included in the turnkey system interface. Designed for schools, campuses, construction sites, clubhouses or other locations with a changing, fluid population, Mobile Badge puts credentialing identification management on the user’s phone, similar to a traditional physical badge. Mobile Badge can be used...
S.A.F.E., the Safety Alerts for Education Foundation, announced that it is donating the Safety Alerts for Education (S.A.F.E.) emergency mobile alerts platform to all schools, colleges and Universities across the US for free and in perpetuity. This is the exact same, fully featured system that has been in use by The Department of Homeland Security (DHS) and The Massachusetts Emergency Management Agency (MEMA) and other Federal, state and local agencies, and police departments across the country...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR For Security Heads of security at hospitals...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated Systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel ha...
Thailand’s leading business hub for security solutions, Secutech Thailand, is set to return from 28 – 31 October 2019 alongside Thailand Lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang. Under the banner of ‘Smart City Solution Week 2019’, the four fairs together will serve as a one stop shop for smart city professionals to source all of the latest security, building automation, lighting and digital infrastructure solutions. “The Thai government aims to establish 100 smart cities over the next two decades,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Within this context, ‘Smart City Solution Week’ delivers a win-win for Thailand’s smart city stakeholders. The arrangement will not only create visitor synergies amongst the four fairs, but it will also help to build even more momentum for Thailand’s smart city sector.” Secutech Thailand – Security + AI Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019 Secutech Thailand has embraced the smart city concept since the first edition in 2011, and under its new theme of ‘Secutech Thailand – Security + AI – Empowers Sustainable City Development’, the fair will deliver all of the latest AI and IoT security innovations for the smart city sector. The 2018 edition of the fair featured a record 250 exhibitors (2017: 150) and attracted 8,420 visitors to 7,000 sqm of exhibition space. Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019: “Many of the distributors and system integrators that visit Secutech Thailand also have business interests in the lighting, building automation and digital infrastructure sectors. By running Secutech Thailand alongside Thailand lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang, we will create a convenient one-stop sourcing platform that will draw in even more buyers to Secutech Thailand.” Sustainability, The Key Theme At Smart City Week 2019 All four fairs will be held at the Bangkok International Trade and Exhibition Center, and in keeping with the modern push towards sustainable living, each fair offers a unique sustainability theme. The Thailand Lighting Fair is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’ The Thailand Lighting Fair, for example, is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’. Jointly organized by Messe Frankfurt New Era Business Media Ltd and The ExhibiZ Co., Ltd, the fair is a home for exhibitors to showcase their unique lighting accessories and electronic components; as well as smart and sustainable lighting solutions for cities and commercial environments. Sustainable Solutions Sustainable solutions will also be on display throughout the halls of the Thailand Building Fair. Run by the same organizers as the Thailand Lighting Fair, the show is a regional hub for building automation and electrical engineering solutions which include products that promote energy efficiency and facilitate smart living. Meanwhile, established in 2017, Digital Thailand Big Bang is a B2C platform that receives government backing to promote digital technologies. The fair is organized by the Digital Economy Promotion Agency (DEPA) to showcase the ways that big data can be used to transform society and improve urban living standards. Just a few of the solutions that can be found at the fair include city management systems, cloud computing, fintech products, and digital infrastructure such as submarine cables and satellites. Smart Police And Smart Transportation Zones In line with the smart city theme, the 2019 edition of Secutech Thailand will feature four zones, each of which will display products for different smart city sectors. A key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’ The ‘Smart Police zone’, will host IoT technologies that assist smart policing, such as real-time crime mapping systems, body-worn cameras, crowd management systems, gunshot detection systems, predictive policing systems and more. Another key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’. Here, trade visitors will find smart surveillance systems, vehicle monitoring systems, as well as traffic and security control centers. Safe Factory And Smart Campus Zones Elsewhere, the ‘Safe Factory’ and ‘Smart Campus’ zones will deliver the latest early warning disaster systems, emergency response systems, personal alert applications, and products capable of providing real-time air quality information. In addition to this, Thailand’s fire safety fraternity will be able to locate all of the latest fire extinguishers, alarms and emergency equipment at the concurrent ‘Fire & Safety Thailand’ event; while three further events: ‘SMALiving’, ‘SMACity Solution’, and ‘Info Security Thailand’, will host all of the latest advances in their related sectors.
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based multi-platform solution, is demonstrating the capabilities of their visitor management and communication software at ISC West this week. Originally developed for school campus applications, the software incorporates a fully-integrated suite of modules including visitor management, lockdown initiation and much more. “Our desire for a better way to protect the students, staff and visitors at schools was the initial impetus for the development of the SilverShield system,” said Robin Baker, CTO, SilverShield. “Now we are expanding our focus to offer our unique solution to a wider audience, including medical-related facilities and businesses of all types.” Unmanned Visitor Screening Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time Designed to expedite emergency security procedures, the SilverShield Visitor Management System enables manned or unmanned visitor screening at all types of facilities. Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time. If there is a threat identified at any entrance, the system allows silent alerts to be sent immediately to designated stakeholders. You can also use the SilverShield system to create temporary ID badges, identify any known VIPs upon arrival, notify your staff of VIP or other visitor arrivals, and maintain a database of visitor history. When integrated with the SilverShield ID Badge System, the system can also generate permanent ID badging for staff, students, volunteers and vendors. The SilverShield Virtual Lockdown System alerts designated stakeholders via an audible siren sent to all users’ computers or cellphone devices in case of an emergency. Visitor Management System This siren, audible even if the users are wearing earbuds or have other applications running on their devices, instantly prompts users to take immediate action to initiate their lockdown procedures. The SilverShield Incident Management System is a near-real-time alarm system that integrates directly with the Visitor Management System or can be used stand-alone. It can alert local police, initiate a virtual lockdown, and produce mass emergency notifications via email, SMS/text, cellphone and web push notifications. The siren is audible even if the users are wearing earbuds or have other applications running The SilverShield Event Management System pre-screens guests against watchlists and the national sex offender database, ensuring that unwanted guests are not invited to your events. The system will manage RSVPs and can even issue parking and visitor passes to approved guests via email and SMS/text– letting event administrators increase control over their events. Learning Management System SilverShield Virtual Academy can be used for all types of security and other proprietary training. A video-based Learning Management System with lessons and assignments that you can create or purchase from SilverShield ensures that your staff is trained properly. The in-app SilverShield HR & Safety Resource Center connects schools and businesses with local, highly-trained security professionals to develop a security assessment, plan and documentation – ensuring your organization and staff is prepared and trained in the event of an emergency. The SilverShield Kiosk System empowers visitors to register themselves upon arrival – manually or by scanning a valid ID. Ideal for organizations with unstaffed entrances, the Kiosk System will quickly notify staff of VIPs or unwelcome guests, increasing security at all entrances.
Aiphone, the international manufacturer of intercom and security communication products, released ‘Best Practices for Keeping Students Safe: A Guide to Campus Security’, an eBook providing public and private K-12, college and university campus administrators with proven best practices for protecting an entire campus population. The free 31-page eBook looks at current technologies, policies and procedures required to handle a variety of security challenges. It includes interactive checklists to prepare for new security projects and for choosing a security integrator. There are quick safety tips, as well as a list of resources for finding additional security information. Determining The Total Cost Of Ownership Sections look at everyday occurrences such as theft and vandalism, along with every administrator’s nightmare – an active shooter. There’s information about determining the total cost of ownership of new projects; the need to properly maintain equipment; ways a security investment can be shared with other campus departments; and the use of environmental design to heighten security. Dana Pruiett, marketing manager, Aiphone, said the education sector has long been an important market for the company. Through the years, Aiphone has worked closely with administrators, law enforcement, integrators and others involved in campus security. Collated Expert Insights “We gathered insights from internal and external experts with decades of combined campus security experience to provide up-to-date, practical information that administrators can use before, during and after their next major security project,” she said. “Our convenient, interactive resource can be used to help keep students, staff and assets safe by addressing the overall security puzzle. We’re proud to supply an important piece of the solution.”
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercializes a complete range of personalization and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group's business development and establish a long-term presence in Japan. Evolis Japan K.K. Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers, expand the traditional distribution network, develop channels dedicated to new industry sectors, and strengthen response to the demands of government bodies and financial institutions."Japan is one of the world's leading economies with more than 125 million people. We therefore see strong potential for card personalization in several markets. The creation of a Japanese company will help in our existing business relationships and facilitate the development of new partnerships" says Eirik Bakke, Managing Director, Evolis APAC. On-Site Encoding And Securing Key Cards Evolis systems allow for the on-site personalization, encoding and securing of cards that support various applications, such as access control badges, debit and credit cards, ID cards, resident permits, drivers' licenses, transport passes, student IDs, as well as product tags for the retail and hospitality market.Evolis' solutions support any requirement in card personalization, from basic printing in small runs up to the personalization of advanced and secured cards in large volumes. Numerous governments, financial institutions and large retail chains are using Evolis' card personalization systems to issue their cards. Card Personalization Systems Due to its flexible manufacturing capabilities and technical expertise, Evolis meets stringent customer demands in terms or technical features, quality and delivery lead times. A project team is dedicated to designing specific and tailored solutions, recognized at national and international levels.
Ojo Technology, one of the fastest growing security integrators in Northern California, has named Shailesh Prasad as its new vice president of operations and promoted Jeffrey Gutierrez to general manager for its growing Central Valley office. Prasad will work from the company headquarters in Fremont serving as vice president of operations and overseeing day-to-day operations as well as strategic planning and goal-setting. Gutierrez will lead the company’s rapidly expanding office in Stockton, California, responsible for operations, planning and sales. Expanding Company’s Presence The personnel changes and additions are a result of the company’s continued strong growth, according to Angie Wong, president and founder of Ojo Technology. “Shailesh and Jeff have strong systems and security backgrounds,” she said. “We are looking to them to be part of the management team that will help us continue to expand throughout the region.” Ojo Technology already has a great name in transportation, municipal and campus security" Previously, Prasad was a senior executive and engineer for Hayward-based HSQ Technology where he led integrated systems projects for organizations including BART, eBART, Sound Transit and the San Francisco International Airport. He has an extensive background in working with a variety of industries including light-rail, waste water management and airports. “Ojo Technology already has a great name in transportation, municipal and campus security,” said Prasad. “I’m looking forward to using my past experience to strengthen those markets and reach beyond them.” Experienced Security Integration Professional Gutierrez has been with the company for more than three years as director of sales. He is an experienced security integration professional. Prior to joining Ojo Technology, he was a senior account executive for Johnson Controls and has also worked with Siemens, Tyco and ADT. “We are seeing tremendous growth potential in California’s Central Valley, working with some of the top organizations in the region,” said Gutierrez. “I’m looking forward to using my years of experience to continue to expand our presence in the area.”
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualization and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West. It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organizations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you. Protecting Educational Facilities UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses. The primary mission of these organizations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different. This organization, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus. Active Shooter Incidents In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue. Educational institutions face an increasingly complex risk environment UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder. At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralize video management, viewing and analysis. Upgrading From Analog Systems Altogether, its security system consisted of older analog platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralize system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed. Security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure The university deployed an HCI solution, one that is optimized for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximizes performance and storage capacity utilization. The platform also hosts the university’s video management solution, which serves as a centralized source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection. Protecting Air Travel And Airports In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernize and expand the facility to meet increased passenger demand. While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs. Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process. Storage System Updates It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance. Users rely on video to validate whether something did or did not happen - and this is essential in airports HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible. Reducing Expenses And Costs The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialized IT skills. These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organizations of all types and they need to ensure their investment in capturing this data is protected. From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated Video Cloud Service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organizations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-Accelerated Solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM Software Platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial Recognition Software IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognize multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorized person and track him or her across non-overlapping cameras. Enhance Situational Awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-Class Security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimized to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic Physical Security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable products UL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive Automated System Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create Significant Value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organization.
A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices. Hypervisor software separates a computer's operating system and applications from the underlying physical hardware. The elements continue to function as before, and software keeps them separated virtually, while also enabling the system to run more economically on less hardware. Virtualization Within Hyperconverged Systems Hypervisor software separates a computer's operating system and applications from the underlying physical hardware Software companies such as VMWare, Microsoft Hyper-V and Nutanix provide virtualization software that enables hyperconverged systems in the IT world. However, bringing hyperconverged systems to the world of video surveillance requires special handling, and security integrators may not be aware that hyperconverged software from the IT market does not work seamlessly with video data. Specifically, these hypervisor software systems have latency problems that are not compatible with video. Therefore, hyperconverged software systems must be adapted to meet video’s needs. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations of security integrators and end users while also providing economic and operational advantages of hyperconverged systems. Why A Virtual Machine Can Aid Your Server Solution A hyperconverged system can transition a stack of 10 or more application servers down to three servers, with all the applications still virtually separated on fewer machines. Each server is used to 100 percent of its capacity, which is more efficient. Companies working to bring hyperconverged systems to the video market are taking proper measures to ensure that those systems deliver on expectations Both operating and maintenance expenses are lower, and if more computing resources are needed for a virtual machine, the software interface enables an end user to allow more processing power, RAM or disk space to that application. Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses. When a video system is working on a hyperconverged cluster, what happens if there is a hardware failure? The virtual system gets moved to a cluster that is working, but there might be a 30-second gap in video, which would not be acceptable for a critical application. All video must therefore be saved in two places. Virtualized Server Stacks From BCDVideo BCDVideo has entered into an engineering partnership with Scale Computing to develop an optimized hypervisor based on Scale Computing’s HC3 software that is also efficient for writing video.Less servers equate to less equipment costs, and also less costs for rack space, cooling and other related expenses Virtualization in the physical security market can create traffic patterns that are unlike traditional IT, and changes need to be implemented to accommodate for that. To avoid a “bottleneck” that can occur during the virtualization process, the virtual machine and the underlying physical hardware must be optimized to account for the virtualization process. “Performance and high-availability are critical in the video surveillance market and not all HCI solutions will adapt to video data,” said Dan Pierce, VP of Strategic Sales at Scale Computing. “With Scale Computing’s HC3 platform and BCDVideo’s ‘purpose built’ approach, customers will benefit from a solution that’s adapted to meet industry wide requirements while simplifying the management and maintenance of their infrastructure.” Hyperconverged infrastructure will become more and more prevalent in the video market, especially for large systems that have high camera counts and longer video retention times. Hyperconverged systems offer a more efficient use of resources and save costs because hardware is more fully utilised. Previous problems of using hyperconverged systems for video have been solved, which paves the way for much more widespread deployment. Over time, we should expect hyperconverged system to become more common for larger video installations, such as gaming, sports arenas, large cities, universities, corporate campuses and airports. The key to success is applying knowledge both of the needs of video systems and of how hyperconverged systems can be adapted to meet those needs.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
Maintaining an educational environment that is conducive to learning requires, at a minimum, that we keep our school children safe and secure. It’s easier said than done, given the wide range of sizes and types of educational institutions. Campus Security High-profile violence in educational environments highlight the urgency of the need for security and safety systems High-profile violence in educational environments highlight the urgency of the need for security and safety systems, and the challenges extend beyond preventing the active shooter incidents that grab headlines. In the United States, 79% of public schools recorded that one or more incidents of violence, theft, or other crimes had taken place, amounting to 1.4 million crimes. That translates to a rate of 29 crimes per 1,000 students. Security is a 24-hour challenge. Protecting schools involves deployment of a range of security and physical hardening tools. Reducing risk requires that access to school buildings be controlled, while also preserving an ‘open’ campus atmosphere that promotes a learning environment. Schools should be an inviting place for students and families, so technology solutions aimed at restricting access should be low-profile and unobtrusive. School security must also be designed in layers, or concentric circles of protection, starting at the school’s perimeter and working inward to secure individual classrooms and other internal areas. Enhancing Video Security At Schools Video surveillance is a technology that is unobtrusive and can promote security beginning at the outermost boundaries of the school environment – at the perimeter and as automobiles drive onto school grounds. Surveillance can keep a silent and constant watch on people comes and goes. Furthermore, incorporating new artificial intelligence (AI) and deep learning technologies are increasing the real-time capabilities of video surveillance to provide early warning of a possible security threat as it enters a campus. AI and deep learning analyze the content of video feeds and provide usable information to security personnel, including analysis of trends and real-time alarms when an event takes place. Incorporating AI Into Video Security Video feeds are analyzed in real-time and alarms can be raised only if there is a problem In addition to controlling perimeter access, video surveillance incorporating AI can also provide other benefits, such as keeping watch on a school campus after hours – before and after school, or even on weekends when extra-curricular activities may be taking place. The systems can monitor traffic flow and ensure that only authorized vehicles enter an area. The benefits of AI-driven video systems also enable greater effectiveness of systems that are not being actively monitored. Video feeds are analyzed in real-time and alarms can be raised only if there is a problem. Whenever a vehicle passes into a restricted area on a school’s campus, the video system captures a vehicle image and automatically provides significant data. ANPR systems Automated number plate recognition (ANPR) systems identify the license numbers of cars that enter a school’s parking entrance or gate and can match the numbers to a watch list and provide an alarm. The technology could also be used to monitor compliance with restricted areas; for example, to only allow vehicles that registered for a parking pass to park in a certain lot. A more advanced approach could involve dual identification technologies – vehicle plate and facial recognition of a driver – to add another layer of security. Video systems with illegal parking detection can define a zone for no parking at a school. If any vehicle enters the area, the camera will be triggered to collect evidence. Images are captured of illegally parked vehicles, and the system provides data about when and where it occurred, the vehicle plate number and the parking violation. Traffic Cameras With DL Technology Traffic cameras with deep learning technology can also identify and classify vehicles Traffic cameras with deep learning technology can also identify and classify vehicles; in effect, to distinguish between small and large vehicles and even detect a vehicle’s make, model and color. For instance, it is possible to differentiate between cars and buses in ‘buses only’ areas. Currently such cameras are more commonly deployed on public streets and highways, but the capability is there. The system can also capture images and produce alarm data if a vehicle is driven in the wrong direction, such as into an exit-only lane or the wrong way on a roadway. Facial Recognition Systems Facial recognition can be used at school entrances and gates to promote security of students and staff and to identify known suspects who attempt to enter the building. ‘Blacklist alarm’ technology generates a notification if a known suspect enters. Clarity is paramount when identifying faces, and cameras that provide wide dynamic range (WDR) can offset challenges such as backlighting on a bright day when the light behind a person coming in is brighter than the ambient light inside. People Counting Cameras Facial recognition systems can also be used inside school buildings. A facial recognition terminal installed at the entrance of a campus building or library can be configured to ensure that only registered students and staff have access to the buildings. People counting cameras can be used in cafeterias and libraries to provide daily or monthly traffic reports and to better understand peak times and arrange workflow accordingly. Unified Security Solution Tedious and error-prone manual monitoring can now be replaced by more intelligent systems Feeds from all the cameras can be managed, monitored and stored in an authorized security center, either located on a campus or in a central location that combines camera feeds from multiple campuses in a school district, for example. In general, security staff can access surveillance data in a variety of ways, via a desktop, laptop, or mobile device. Such flexibility makes the job of security personnel easier. A campus police or resource officer can view video on a mobile device while patrolling the campus. Often video surveillance systems at schools are not monitored. School security personnel have more pressing duties than sitting in front of a video monitor, and it is difficult for operators to stay alert for detailed incidents that may be shown on the screen. Tedious and error-prone manual monitoring can now be replaced by more intelligent systems that provide alarms only when there is something to see. Maximizing School Surveillance Capabilities Systems to maximize school surveillance and security include dedicated, high-performance cameras for event capture, embedded network video recorder for event recording and storage, and a centralized video management platform to unify the system. AI and deep learning technologies automate security processes and provide useful real-time information that extends beyond video images. Deploying these technologies at the perimeter can promote better security campus-wide by preventing danger from entering the learning environment.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organization’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analog camerasRequirement Of IP Camera Technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analog cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analog cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation Of 3xLogic Hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing Discrete Areas With VIGIL Software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working With Community Partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard Solution For Emergency Situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center, for prioritized verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
ProdataKey (PDK), an innovator of cloud-based network and wireless access control products and ASSA ABLOY, the pioneer in door opening solutions, announced the completion of a campus-wide security upgrade at Glenaire Retirement Community in Cary, North Carolina. Modern Systems, of Yadkinville, North Carolina, has installed a fully integrated wireless lock and access control solution securing 370 doors spread across the community’s main building entrances, public access areas, offices and residential apartment units. It makes use of ASSA ABLOY’s Aperio wireless locksets with PDK’s cloud access control software, providing administrators with the ability to remotely lock and unlock doors, set specific hours for maintenance workers’ access to buildings, continuously monitor door use, and easily retrieve system-wide reports. ASSA ABLOY IN100 Aperio wireless locks feature sleek readers integrated with the door hardware, helping to preserve the upscale aesthetic of Glenaire’s many buildings. Accessing PDK Software From Mobile Device System management of PDK software can be handled completely from any mobile device or computer browserThe system will continue to grow, with expansion to all electrical rooms, storage rooms, mechanical rooms and closets, bringing the total to approximately 650 doors, as well as another 190 apartments and 40 assisted living units. As new doors come online, they will appear within the completely scalable PDK interface with no interruption to service or administrative functions. System management of PDK software can be handled completely from any mobile device or computer browser. Modern Systems was able to upload the user database from Glenaire’s legacy access control system to PDK’s cloud servers, allowing residents to retain use of their existing cards, which previously were used only to open the front doors of main buildings. With the PDK/ASSA ABLOY system, they now use those same cards to access public areas and their own private residences. ‘Guest’ cards, with more restricted access, are available for residents to give to family or friends as appropriate. Customized card permissions have also been established for staff groups, including service workers, nursing professionals and dining staff. Integrating Security Solutions When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access cardModern Systems plans to soon facilitate an integration between the PDK software and several other security solutions they have installed at Glenaire. Mapping between doors and surveillance cameras, which are part of a new Milestone Systems video management solution, will not only enhance security but assist with Glenaire’s missing resident protocol. When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access card. They also plan to connect the facility’s Situational Awareness and Response Assistant (SARA) risk management solution and mass notification system, from Status Solutions, with PDK. This integration will be important both in campus lock-down situations, as well as to assist with entry for response teams during medical emergencies. Glenaire’s Director of Facility Services, Ryan Ferguson, says he was wowed by the cloud-based PDK solution, which he says, “has the most modern, up-to-date access control software of anything I’ve seen. In addition, we were able to install the wireless PDK/ASSA ABLOY solution in about half the time it would have taken to install a wired solution, and for about half the cost.” Protection From Cyber Vulnerabilities The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless"Cory Jackson, PDK’s Vice President of Strategic Sales, adds, “The Glenaire project demonstrates the many ways in which our cloud solution makes sense for enterprise scale customers. “The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless – even across multiple buildings or sites, we offer seamless integration with solutions from valuable partners like ASSA ABLOY and others, and the customer’s in-house network is not exposed to any potential cyber vulnerabilities, are all reasons that PDK is gaining traction with larger customers.” “Retirement communities like Glenaire face a very unique set of challenges. The ability to provide a sense of security to residents and their families while still creating an environment that feels like home is paramount,” says Caleb Allen, electro-mechanical specialist for ASSA ABLOY Door Security Solutions. “We were happy to offer them a solution that made it easy and affordable to install comprehensive access control throughout the facility.”
Three leading Australian universities are introducing SafeZone technology from CriticalArc in a drive to improve safety, increase their security teams’ capabilities and provide better care for students and staff. With 30% of Australian universities now using SafeZone, this latest wave of roll-outs confirms CriticalArc’s position as the most comprehensive safety and security management solution provider in the Australian market. Adding to CriticalArc’s growing network of customers, the University of Tasmania (UTAS), the University of Southern Queensland (USQ) and the University of the Sunshine Coast (USC) have more than 75,000 students and staff working in 33 campuses and associated facilities across four States, meaning that SafeZone now serves the needs of 1.5 million students and staff at more than 500 locations across the world. Ensuring Best Safety Standards SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable"“UTAS, USQ and USC each have their own unique character and particular priorities but ensuring the best standards of care for students and staff is top of the list for all of them,” says Robert Christie, CriticalArc’s Customer Success Manager, Asia Pacific. “Preventing crime, managing public safety and handling emergencies are still the top concerns of university security teams, yet SafeZone is also enabling those teams do much more to address issues that are increasingly important. "From improving support around mental well-being to tackling sexual harassment and making campuses inclusive environments where everyone can feel safe and welcome, security and response teams are playing a much bigger role than they traditionally did. SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable.” Notifications In The Event Of Emergencies SafeZone puts individuals directly in touch with response teams at universities, hospitals, government departments and similar large organizations, making it easy for them to use their mobile phones to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they areThe technology also lets students and staff share their situation with response team members by checking-in when working alone outside hours or in higher-risk environments such as laboratories and workshops. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they are – including those working out-of-hours on campus, those traveling between campuses locally or on field projects, or traveling overseas for study or research placements. Precise Location Of Vulnerable Individuals With its global reach combined with its ability to precisely locate vulnerable individuals, SafeZone is helping universities around the world to better meet their duty of care obligations, says Darren Chalmers-Stevens, CriticalArc, Managing Director. “SafeZone offers all the functions that university teams want, in one easy package. It is not only helping them to deliver better care, it is letting them demonstrate this fact in an accountable way.”
Majmaah University is based in Al Majmaah, a city of 130,000 people located approximately 180km north of Riyadh. The university was founded in 2009 as part of a state-sponsored Ministry of Education initiative to expand university education and the number of graduates in the Kingdom of Saudi Arabia, particularly outside the biggest cities. Key aims of the university include more provision for higher education, high quality scientific research and development, support for the regional economy and meeting the needs of local communities. The university serves a wide area including Majmaah city, Zulfi, Remah, Ghat and Hawtat Sudair. The main campus is situated in the southern part of Majmaah city, with teaching and research delivered through 13 academic schools. The university has around 20 buildings across its multiple sites which provide accommodation for the colleges, administration, deanships and medical services. Enhanced Student And Staff Safety Today’s higher education sector is major business and maximizing student safety is central to any university’s duty of care and reputation. With this in mind, the security team at Majmaah University wanted to upgrade protection for students, staff and visitors. To achieve this, they needed to identify a cost-effective HD surveillance system combining robust performance with state-of-the-art functionality. The team needed a solution to provide centralized control, reliable remote monitoring and full redundancy for key university facilities at multiple campus sites located almost 50km apart. Digital Media installed a comprehensive mix of networked systems at campus sites in Majmaah, Hawtat Sudair and Alghat Additional requirements included innovative features guaranteed to deliver excellent image quality, rapid video retrieval and optimized use of network bandwidth. Other key priorities included compatibility of all surveillance systems; simple plug-and-play deployment; video management software; ease of use; live and simultaneous video playback; simultaneous map monitoring; minimal maintenance; plus, user-friendly diagnostic, administration and reporting capabilities. Integrated IP-Enabled HD Surveillance Assisted by expert regional security systems integrator Digital Media, Majmaah University chose a complete, integrated IDIS DirectIP solution that offered superior performance, dynamic multi-stream control and multi-view functionality to minimize bandwidth usage-all at a low total cost of ownership. Digital Media installed a comprehensive mix of networked systems at campus sites in Majmaah, Hawtat Sudair and Alghat. Equipment included: 336 pan-tilt-zoom (PTZ), box, dome and infra-red bullet cameras; 18 network video recorders (NVRs); a suite of ISS Expert servers and clients; and 16 DAS systems. The new command center at Majmaah was fully equipped with control systems including an IDIS Software Solution (ISS) Video Wall and 512CH Federation server to provide centralized monitoring across multiple campus sites. Following a smooth, swift installation by Digital Media, IDIS DirectIPTM is providing cost-effective surveillance to improve campus safety and protection.
Round table discussion
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?