Campus security systems
The Security Industry Association (SIA) has launched a new course to help industry professionals prepare to take the Certified Security Project Manager (CSPM) exam. The new CSPM Review Course expands SIA’s CSPM offerings; it will be offered virtually and will be taught by CSPM-certified instructors with extensive experience in security project management. Course coverage The course covers the key areas of knowledge and topics tested by the CSPM exam, shares...
Allegion, the globally renowned provider of security products and solutions, including Schlage readers and locks, together with CBORD, a renowned higher education technology solutions provider, announced that they have expanded their offerings and now provide on-campus mobile credential solutions on Android phones. Students, faculty and staff on participating campuses can now use their Android phones to conveniently, safely and securely access campus buildings and make purchases through Google...
Further demonstrating their commitment to the security industry and drive for excellence, Third Millennium (Third Millennium Systems Ltd) are pleased to announce that Rob Hills ASyl, one of the company’s product engineers, has recently been accepted as an Associate of the Security Institute. Pivotal role in technical support Third Millennium’s General Manager, Paul Grimshaw, was eager to comment on how Rob Hills plays a pivotal role in giving technical support to both pre-sales and...
PSA Security Network (PSA), the globally renowned consortium of professional systems integrators, has announced the addition of EAGL Technology to its Managed Security Service Provider Program (MSSP). EAGL Technology is a manufacturer of indoor/outdoor IoT wireless gunshot sensors, as well as sensors that can detect vape, car collisions, flood waters and critical infrastructure failures. Active shooter threat detection “EAGL produces solutions that address today’s real-world securi...
Understanding access control technology has surpassed its core application as a security tool and is helping protect individuals from infection, Anviz has announced the release of a strategic addition to its product line, Go Touchless - FaceDeep 5 and FaceDeep 5 IRT face recognition terminals. Safely Returning to work and school during the post COVID-19 pandemic period leaves people with a key question - With what health and safety precautions? AI-based facial recognition terminal Anviz has i...
Zenitel announces that it has received LenelS2 factory certification as part of the LenelS2™ OpenAccess Alliance Program (OAAP). Zenitel’s ICX-AlphaCom, AlphaCom XE, IC-EDGE, TCIV+, and TCIV interface with the OnGuard® version 8.0 access control system providing customers with solutions for a unified and scalable enterprise security platform. “Zenitel has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system. The...
Heald Ltd., a global innovator in the field of perimeter security technology and one of the major manufacturers of quality security equipment in the United Kingdom, has announced a new partnership agreement with university technical college, Ron Dearing UTC. Since being founded over 30 years ago, the Hornsea-based manufacturer has worked closely with various educational institutions including Hornsea School and Language College, Humberside Engineering Training Association, Beverley College, Hull Training and the University of Hull by providing career insight talks, work experience opportunities, apprenticeships and ongoing learning for their existing employees. Heald - Ron Dearing UTC partnership This new partnership with Hull-based Ron Dearing UTC will provide new opportunities for students to undertake internships and work experience placements with Heald with the potential for longer-term employment opportunities. With many different engineering disciplines within the company, Heald hopes to help guide learning at Ron Dearing UTC to include their specific engineering requirements, which will enable new employees to progress much quicker into full-time employment from apprenticeships or trainee levels, there by benefitting both the individual’s career progression and the business offering. Glenn Jensen, Senior Assistant Principal for Employer Engagement and Head of Engineering at Ron Dearing UTC said “It’s a great credit to Heald that, during such difficult times, they continue to see the importance of investing in their future employees.” Bridging skills gaps in the engineering and digital sectors Having this new partnership helps us to continue to bridge skills gaps in the engineering and digital sectors" Glenn adds, “It’s invaluable for us to have realistic client briefs when working on projects linked to industry and these play a key role in expanding our students’ skill sets. Having this new partnership helps us to continue to bridge skills gaps in the engineering and digital sectors.” Managing Director of Heald Ltd., Debbie Heald MBE said, “I only recently became aware of Ron Dearing UTC, but after discovering more about what they do and their approach to learning, it seemed a natural fit.” Facilitating students engagement with employers Debbie adds, “With education settings and student’s learning facing significant disruption in recent months, engaging with local schools, colleges and universities is vital to ensure students are able to access meaningful engagement with employers.” She further stated, “In turn, this not only helps them to decide on what they wish to do post-education but it also helps them to transition into their chosen career path, and as a result, can be an excellent recruitment pipeline for those businesses who do engage. We’re very excited about our new partnership with Ron Dearing UTC and we’re looking forward to working with local individuals who are passionate about engineering in every field.”
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security management system is an advanced solution in Carrier’s Healthy Buildings Program, and provides critical features like occupancy management, enhanced access control and proactive screening solutions to better protect people and assets, and optimize building health and efficiency. LenelS2, a globally renowned company in advanced security systems and services, is a part of Carrier Global Corporation, an international provider of healthy, safe and sustainable building and cold chain solutions. Transforming security data into actionable insights OnGuard version 8.0 provides end users with the tools to be in complete control of their security environment “OnGuard version 8.0 provides end users with the tools they need to be in complete control of their security environment and transform security data into actionable insights,” said Jeff Stanek, President of LenelS2. He adds, “As the world returns to the workplace, the breadth of new features, updates and enhancements in OnGuard version 8.0 make it an ideal solution for today’s unique security challenges.” Magic Monitor unified client The OnGuard security management system version 8.0 system enhances security and situational awareness through integration with the Magic Monitor client, a Windows and Mac OS client, which provides a unified view of access control, video surveillance feeds and web content in a single display. Users can view OnGuard system alarms, credentials as well as live or recorded video from the LenelS2 Network Video Recorder (LenelS2 NVR) platform, or third-party video management systems, including the Milestone XProtect system. The Magic Monitor unified client supports a single display, a command center workstation or expansive video walls. OnGuard Reports and Dashboard features To turn security data into actionable insights, the OnGuard version 8.0 platform now features a new OnGuard Reports browser client that provides customizable reports. An OnGuard Dashboard feature offers powerful visualization of system, cardholder and alarm data in a variety of graphical formats. The new interactive OnGuard Maps feature offers browser-based visualization of facility layouts and provides dynamic system feedback. With OnGuard version 8.0, the Maps feature is included within the OnGuard Monitor client and is accessible from any computer, tablet or smartphone. Usability enhancements and cyber security upgrades OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades The OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades to improve safety and convenience. Usability enhancements include easy-to-access language options in OnGuard Visitor Self Service mobile app version 1.5 and a richer video viewing experience across OnGuard web clients. The improved video experience includes new audio, digital zoom, snapshot capture and Milestone XProtect video support in OnGuard Monitor and Surveillance web clients. Enhanced security in K-12 education segment To enhance security in the K-12 education segment, integration with the Allegion Von Duprin Remote Undogging/Remote Monitoring (RU/RM) solution enables an electronic override of mechanical undogging for facility emergency lockdown and remote door status monitoring. ‘Secure by Default’ settings, coupled with license administration security improvements, further enhance cyber security across the OnGuard system.
Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, shared the results of a state of the industry report based on insights from over 1,000 physical security leaders. The report looks at how the physical security industry is reacting to the threat of COVID-19, how security professionals are coping, and how day-to-day operations and plans are affected for the coming year. Physical security industry Challenges Not surprisingly, the survey reveals that COVID-19 has led to a focus on security efforts to ensure the safety of people and facilities. For the majority of security professionals, the top three challenges during the pandemic are managing employee/visitor safety; dealing with physical security threats (e.g. vandalism, theft, break-ins, etc.); and the remote management and securing of buildings. However, while the pandemic has brought on numerous new challenges, the vast majority of organizations have had to face them creatively. Priorities The survey showed that 68% of respondents reported project delays/downsizing or cancellations this year; however, looking into 2021 48% expect budgets to stay flat or increase with a focus on ongoing investment in existing systems and deployment of tools to support ongoing response to the pandemic. With pressing new requirements and more limited resources, physical security organizations are stressed but finding ways to pivot to address extraordinary circumstances. Using resourcefulness and creativity, many security professionals (48%) are looking to existing systems to help them face these new challenges. Resilience & Resourcefulness “The security industry excels at planning for the unexpected, and while the pandemic took the world by surprise, our industry has shown extraordinary resilience and resourcefulness.” “We have seen so many of our customers and partners quickly adapt to the new needs and challenges posed by the situation.” “They’ve been able to repurpose and adapt their existing security infrastructure to meet some of the new challenges created by the pandemic,” said Pervez Siddiqui, Vice President of Business Development at Genetec, Inc. Physical security behind in cloud adoption 61% of security experts had no cloud plans, 74% indicated a small part and less than 25% was or would become cloud While 37% of respondents said they were evaluating new technologies, the adoption of cloud-technology continues to be slow in the physical security industry. In stark contrast with the accelerated adoption of cloud-based solutions observed in other sectors in 2020, more than 61% of security professionals reported that they had no cloud plans, often citing concerns over cost and data security, and 74% indicated only a small portion of their environments (less than 25%) was or would become cloud or hybrid cloud. Modern cloud-based solutions “The move to a predominantly remote workforce was made a lot easier for organizations that had already invested in cloud-based technologies, yet very few companies had already started that transition,” said Christian Morin, Vice President of Cloud Services and CSO at Genetec, Inc. “As companies continue to re-evaluate how they get the work done, modern cloud-based solutions should be at the top of their list.” Cyberattack risks In spite of cybercrime continues to increase, and remote work creating more technology challenges, the physical security industry remains behind in its approach to addressing cyber threats. The survey reveals that only 35% of respondents took steps to improve their cybersecurity strategy as a result of the pandemic. “This new reality has underscored the fact that the network perimeter is truly dead with the bulk of the workforce working remotely. This forces many organizations to rapidly rethink and evolve their cybersecurity strategies,” added Morin. Survey methodology Genetec Inc. surveyed physical security professionals between September 21 and October 13, 2020. 1,074 respondents were included in the sample for analysis. Survey samples were run across all regions including North America, Central America, Caribbean, South America, Europe, Middle East, Africa, Asia, and Oceania. Further research in 2021 To remain abreast of the evolving market, Genetec will continue primary research into the new year. This will begin in the first quarter with a review of the EMEA physical security market and continue in other regions later in the year.
Johnson Controls, the pioneer in smart and sustainable buildings, and Microsoft Corporation announces a global collaboration to digitally transform how buildings and spaces are conceived, built and managed. Microsoft also announced the general availability of Microsoft Azure Digital Twins. As a key partner for Azure Digital Twins, Johnson Controls’ OpenBlue Digital Twin is a comprehensive platform that will support the entire ecosystem of building and device management technologies with digital cloud technologies. IoT connected solutions Johnson Controls is a Microsoft partner leveraging several Azure services including Active Directory Services, Azure Data Lake, Access Control and Time Series Insights. Microsoft’s Azure Digital Twins is the newest Azure platform service integrated into Johnson Controls OpenBlue platform that aims to enable the creation of next-generation IoT connected solutions that will model the real world. Johnson Control’s platform turns the physical world into computable objects that will enable customers to create detailed digital versions of physical buildings, assets and systems. The use of digital twins plays an important role in helping technicians identify the root cause of issues Digital twins are digital replicas of physical entities capable of providing an in-depth analysis of data and the potential to monitor systems to mitigate risks, manage issues and utilize simulations to test future solutions. The use of digital twins plays an important role in helping technicians identify the root cause of issues accelerating problem solving. Existing building infrastructure Additionally, building managers are able to support COVID-19 safety and security protocols, while ensuring efficient use of energy and other facility resources. Azure Digital Twins enables the creation of knowledge graphs based on digital models of entire environments, whether they are buildings, factories, farms, energy networks, railways, stadiums or entire cities. These digital models empower property managers with actionable insights that drive better products, optimize operations, reduce costs and create breakthrough customer experiences. OpenBlue Digital Twin is a unique platform that is purpose-built with smart buildings and spaces in mind, enabling and unifying all aspects of an intelligent building; security, employee experience, facilities management, sustainability and more. The open platform’s open system seamlessly integrates with existing building infrastructure, regardless of brand, make or model. Analyzing large datasets Our partnership with Microsoft is a vital ingredient in our innovation strategy" “Our partnership with Microsoft is a vital ingredient in our innovation strategy, as the company shares our vision of using technology to transform the environments where people live, work, learn and play,” said Mike Ellis, vice president and chief digital and customer officer at Johnson Controls. “Digital twins are playing an increasingly important role in the design, construction and ongoing operation of healthy buildings and spaces, and can be particularly valuable when analyzing large datasets and predicting patterns and trends to tell our customers things they don’t yet know. Our OpenBlue digital platform, closely connected with Microsoft’s platform and workplace technologies, represents an unbeatable opportunity to help our customers make shared spaces safer, more agile and more sustainable.” Safe and sustainable campus "We have an incredible opportunity to use advances in cloud and compute capabilities to help customers reimagine the physical world," said Scott Guthrie, executive vice president, Cloud + AI, Microsoft. "By integrating the power of Azure Digital Twins with Johnson Controls OpenBlue Digital Twin platform, our collaboration will provide customers with a digital replica and actionable insights to better meet their evolving needs.” Among the numerous pilots currently under development is an ambitious effort at The National University of Singapore (NUS). As part of the university’s ongoing efforts to create a smart, safe and sustainable campus for students and staff, the new alliance’s complementary products and services are coming together to test the foundations of a Digital Twin-powered operations platform. Integrated building management National University of Singapore (NUS) is excited about using Microsoft’s Azure Digital Twins technology" The data-driven platform will enable integrated building management across the campus and serve as the foundation for energy and space optimization, predictive maintenance, and unmanned operations. “National University of Singapore (NUS) is excited about using Microsoft’s Azure Digital Twins technology and Johnson Controls OpenBlue platform, in our digital transformation journey that changes the way we design and manage our buildings and infrastructure, while retaining smart, sustainability and safety principles at the core of the entire campus," said Professor Yong Kwet Yew, senior vice president (campus infrastructure), NUS. Supporting sustainability efforts Working with Microsoft, Johnson Controls will address how people can return to work to maximize space while operating facilities safely, including: Energy Optimization – optimising energy usage within facilities maintenance with a goal of reducing carbon emissions that save money and support sustainability efforts. Access Control and Safety - addressing physical access and safety using live video analytics and spatial intelligence, combining Microsoft cloud services and Johnson Controls security access controls hardware end points. Collaboration for Facility Managers - integrating facility management workflows with workplace collaboration platforms such as Office 365 and Microsoft Teams to increase productivity and collaboration across remote teams. Workspace Optimization - maximising the use of spaces by merging building and occupancy data with experiences to create actionable insights for facility managers and the occupants.
Aiphone, the foremost international manufacturer of intercom and security communication products, is announcing its IXG Series tenant, guard, and entrance stations are integrated with Telecoil (T-Coil) to assist individuals with hearing loss or impairments who wear compatible devices. Integration This integration allows the IXG-DM7-HID IP Video Entrance Station to send out an electromagnetic signal that the T-Coil within a person’s hearing aid picks up, allowing the hearing aid and the intercom system to directly connect to produce a clearer sound and to remove audio interference. This feature allows those who suffer from hearing impairments to more easily communicate using an intercom system in multi-tenant facilities, as well as medical or elder-care facilities. Support accessibility “The Telecoil integration is important to ensure Aiphone’s intercom and security communication products can be easily used by individuals who are hearing impaired and require the assistance of a hearing aid,” said Brad Kamcheff, Marketing Manager for Aiphone Corp. “More than 13 percent of people in the United States report some difficulty with hearing and Aiphone wants to ensure that our devices support accessibility and the Americans with Disabilities Act." Process of T-Coil integration The T-Coil integration works like this: when a hearing-impaired individual approaches an intercom, the sound signal is connected to an amplifier, which generates a current to pass the signal to the induction loop, which is usually made of copper tape or wire. The loop then produces an electromagnetic field and is then picked up by the T-Coil. As each hearing aid individually tailors the sound to the specific needs of the individual, the integration with T-Coil allows for reduced background noise and the full spectrum of sound frequencies required for intelligibility will be available. IXG Series The IXG Series from Aiphone features the benefits of an IP intercom with the versatility of a multi-tenant solution, all powered by a single, full-featured system. IXG Series solutions are ideal for commercial sites, industrial facilities, schools, campuses, parking garages, retail, emergency calling, and correctional applications.
The implications of COVID-19 have been profound, and the road to business recovery is evolving and fluid. Facility providers around the world are shifting priorities. The focus was once creating a workplace that promotes employee productivity and company values. Now, it’s ensuring that the workplace, and everyone who enters it, remain safe and healthy. With all the coronavirus uncertainty, it might feel strange to start working on how to open offices again. But no matter whether offices are planning on reopening in one month, or one year, that’s precisely what needs to be done. The office will never be the same again, and returning will be a bigger adjustment than most think. Those who procrastinate risk wasting a lot of time and money on last-minute, inadequate solutions. Where to start? While many companies are focusing on clean-desk policies, one-way corridors, and fewer seats in conference rooms, these habits alone won’t be enough. To meet the new standards for workplace safety, organizations will need to adopt technology in order to create a high-functioning, healthier, and safe space for the employees and visitors. Enter touchless technology Read on to learn four ways to increase safety and security in the new workplace with touchless technology: Hands-free authentication Once a luxury, now a necessity for the new workplace. Hands-free, frictionless, contactless, or touchless, whatever one calls it, it’s not just a convenience factor anymore. Avoid Contact with Surfaces: Avoiding unnecessary contact with any potentially contaminated surfaces during these times is critical. With employees returning to the workplace and visitors coming and going (cleaners, contractors and guests to name a few), that’s up to hundreds of people per day who could be touching the same reader to get access. Mobile Access: With touchless mobile access, companies can create a convenient, reliable and safe environment that instills confidence in employees, tenants, and visitors. Virtual Credentials: Touchless access using virtual credentials stored in a mobile phone or wearable can activate boom gates, turnstiles, doors, elevators, and more from a configurable distance, unlike keycards that often require direct contact to work. Bluetooth Access: Without removing the phone from the pocket, touchless access via Bluetooth provides contactless, barrier-free and user-friendly access that guarantees secure entry, minimises high-frequency touchpoints and reduces the spread of germs. Implementing a touchless check-in experience A touchless check-in experience can limit surface contact and help prevent the spread of COVID-19 and potential future outbreaks in the workplace. Rather than touching a tablet to enter information, or signing in on paper manually, touchless check-in does not require touching equipment or surfaces upon entry into a building, office, or facility. Here’s how it works: Send visitors the check-in information before the arrival, either via email or SMS. This will include basic building information such as where to park, where to go once they arrive, and steps to obtain the visitor pass. Have important health and safety information to read in advance so the visitors know what to expect while at the workplace. Allow guests to sign any documents or take photos in advance. This could include a COVID-19 screening questionnaire that dictates whether visitor access is permitted. When all necessary information has been received and the person has passed the questionnaire, the organization’s admin can issue a temporary credential OTA to the visitor’s mobile device. This eliminates the need for a face-to-face sign-in, makes it faster and easier for authorized contractors and visitors to access the building, and ensures that when the set time-period on that credential expires, the visitor will no longer be able to gain access. Maintain comprehensive activity and incident logs Employees access offices with keys and cards, and visitors check-in at the front desk makes it difficult to track down close contacts It can take up to two weeks before someone sick with COVID-19 begins showing visible symptoms, during which they are unknowingly highly contagious to others. This is where the ability to conduct thorough contact tracing is crucial to stop the spread as soon as possible. Where employees access offices with keys and cards, and visitors are checking in with an illegible scribble at the front desk, it becomes incredibly difficult to track down close contacts. Employees could be socially tailgating the co-workers, and visitors could forget to sign in, meaning people can be unaccounted for, and records of who entered the organization and when become inaccurate. Using touchless access technology, the reader can detect nearby Bluetooth devices, whether the user badges in or not, making it simple to recall detailed logs of everyone who was present when an infected individual was around. Dynamic management of credentials So, let’s say the organization gives the employees and visitors a touchless access experience. Now they can track person-to-person proximity with contact tracing. How do they stay responsive with continually changing access requirements? If a person or persons have been exposed to someone who has COVID-19, how does the organization stop that person from accessing the workplace? Instant OTA Credentials: With a cloud-based access manager, issuing and revoking access is simple. Instantly issue a secure mobile credential with the click of a button, eliminating the need for face-to-face onboarding and handling cards. Remote Access: Changes are immediate, meaning the organization can manage touchless credentials remotely and take fast action towards health and safety breaches. Wellness: COVID-19 risk profiling is essential for businesses to ensure that no one presenting flu-like symptoms is permitted to access the workplace. Sign-in Access: Conducting daily health screenings before allowing employees to return to the office and integrating this into the touchless visitor sign-in progress, allows the organization to reject access to people who don’t meet basic return-to-work guidelines. Restrict Access: With remote management of credentials, a visitor who fails to pass a health questionnaire before arriving can have access restricted. Control Density with Booking Systems: To control the capacity of specific spaces within the building (maybe it’s a meeting room or even a gym class studio), implement booking systems that only enable authorized users inside. Valid Credential: It might seem like a simple solution, but linking touchless access technology with booking systems ensures no one can join spaces without a valid credential. Notifications in Real-Time: When headcount reaches unsafe levels, the reporting system will notify security, safety, and workplace teams in real-time. All that needs to be done is set a maximum number of devices for that space and the access control system will do the rest.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organization, because the previously under-utilized data can be harnessed for enhancing productivity and performance. Video Analytics Software When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organizations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. The video intelligence software processes and analyses video to detect all the people and objects that appear Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognize patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining Public Safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviors of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video Surveillance Data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimizing city management and infrastructure. When video data is aggregated over time, it can be visualized into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous. A city could, for instance, analyze the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behavior, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. Video analysis empowers cities to harness their video surveillance data as operational intelligence Enhancing Situational Awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organizations can make data-driven decisions about scheduling and services. Analyzing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimized based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large Education Campuses Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimization. Countless Business Operations Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimization – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus In the case of AI-backed video analytics, diverse organizations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational Awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognize potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security Best Practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organizations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology In School Security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-Hour Monitoring Solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar Detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorized to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting And Landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing Physical Environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing really powerful AI will expand the cost differences.” Combining AI and cloud video To finance realization of their vision to combine AI and cloud video, Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end users,” says Francis. In effect, end users have maximum flexibility to manage and analyze their video data however they wish The system sends captured video to the cloud, where a variety of AI or video analytics systems can extract valuable data from the captured video. Eagle Eye offers an application programing interface (API) to enable integration of best-in-breed third-party AI and analytics systems to leverage the video. In effect, end users have maximum flexibility to manage and analyze their video data however they wish. Delivering lower costs In addition to offering integration with third-party systems, Eagle Eye is investing in its own AI development, and hiring additional development and customer service personnel. As new technologies become part of the Eagle Eye platform, customers benefit from lower costs because of economies of scale. Keeping the emphasis on development of cloud systems, Eagle Eye also offers customers maximum flexibility in choosing their cameras. Eagle Eye’s on-premise cyber-hardened “bridge” can connect to almost any camera from thousands of manufacturers, including those connecting with HD-over-coax. The COVID-19 pandemic has expanded the need for end users to view their premises remotely, and in the process has highlighted shortcomings of their existing video systems. As a result, video manufacturers - including Eagle Eye Networks - are seeing a surge in end users updating their systems. Cloud video surveillance Given the costs of installing and maintaining hard drives for local storage (and additional challenges during a pandemic lockdown), more end users are opting to use cloud systems. In effect, the COVID-19 pandemic is accelerating installation of cloud video surveillance. “Our industry is the most resilient in the world,” says Francis. Eagle Eye Networks was on track to double their growth in the first quarter, and then COVID slowed everything down As a whole, 2020 has been a successful year for the cloud system provider. Eagle Eye Networks was on track to double their growth in the first quarter, and then the COVID lockdown slowed everything down. During the second quarter, their revenue from setup fees and appliances fell by 35% or so, but subscriptions increased slightly including customers looking to keep watch over their shuttered businesses. Temperature alerting solutions The third quarter saw another big uptick in business; August and September were booming, and not just from projects that were delayed from Q2. There has also been a spike in customers looking to apply temperature alerting solutions, says Francis. In uncertain economic times, cloud systems require around 40% less up-front costs, and provide flexibility to eliminate the system (and the expense) at any time without losing a large financial investment. Cloud video has reached a tipping point in the United States, Mexico, and the United Kingdom, among other locales, but the technology lags in some other geographic areas such as France. Driving adoption is availability and cost of sufficient upload speed and bandwidth. In addition to Eagle Eye’s branded growth, the company also provides the OEM engine behind a half dozen or so cloud systems offered by other manufacturers. Backing multi-site enteprises About eight years old, Eagle Eye Networks has focused squarely on the small- and middle-sized business (SMB) market, especially multi-site businesses such as retail, banking and healthcare. They also work with local governments and K-12 schools. Moving forward, the company will seek to expand more into multi-site enterprise customers, some of which have 1,000 locations around the world and need to store their video locally to meet regulatory requirements. Multi-site businesses, benefit from the cloud by eliminating the need for local IT equipment and expensive staff Multi-site businesses, especially, benefit from the cloud by eliminating the need for local IT equipment and expensive staff. As Internet connectivity becomes less expensive than installing new cable infrastructure, cloud systems will become more attractive to large campus environments such as colleges and airports, says Francis. The advent of 5G connectivity will also be a plus. All Eagle Eye products are NDAA compliant. Premium support services Further expanding its services, Eagle Eye Networks is poised to launch “Premium Support Services,” in which the cloud provider’s employees will proactively monitor and service customer sites for a minimum additional monthly fee. The cloud structure enables most problems to be addressed and solved remotely without needing to send personnel to a site. The new investment from Accel, a funding partner of top-tier tech companies such as Facebook, Dropbox and Spotify, is Accel's first investment in the security industry. In addition to investing in AI, Eagle Eye also plans to leverage the funding to expand into new regional markets with new data centers and additional staff in business development, sales and support roles.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimizing their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Keeping out unwanted visitors is a major task in a district with 16,000 students, 2,500 employees and 2,100 regular volunteers. Aiphone’s IX Series and a visitor management system work together to control and protect each school’s single visitor entry. “The mission of anything we do in security must enhance the ability for teachers to teach and students to learn,” said Guy Grace, Director of Security & Emergency Preparedness, Littleton Public Schools. Littleton Public Schools (LPS) operates 24 campuses in suburban communities within the Denver, Colorado metropolitan area. Increasing entry security Keeping out unwanted visitors is a major task in a district with 16,000 students, 2,500 employees and 2,100 regular volunteers. Many campus security issues begin at the front door. The LPS security team works diligently to keep out unwanted visitors. However, this is a major task in a district with 16,000 students, 2,500 employees and 2,100 regular volunteers. Protect the entries at 13 elementary, 5 middle, 4 high school campuses, and 2 charter schools Enable security and other trained district staff to clearly see and speak with visitors before remotely unlocking a door Unify multiple systems to increase entry security Visitor management system Employees enter through assigned doors using an access control card All exterior doors at elementary and middle schools remain locked 24/7. Security officers are assigned to the two entries on each high school campus that remain unlocked during parts of each school day. Employees enter through assigned doors using an access control card and reader or a personal identification number entered on a keypad. An Aiphone IX Series video intercom, three security cameras, and a visitor management system protect each school’s single visitor entry. Visitors pushing the intercom call button gain the attention of a staff member using a master station in the school office. A trained employee can see and conduct a two-way conversation with the visitor before remotely unlocking the door. Intercoms are also installed at delivery bays and the front doors of 13 school-age childcare centers. Video management system The intercoms can be locally monitored and operated on campus or by security officers in the district’s unified command center. In fact, the Littleton Public Schools Security team keeps the Aiphone camera and microphone on 24/7. The district also uses 190 Android™ tablets equipped with the IX Series Mobile App. These tablets allow district staff to leave the office and interact with children, while still maintaining control of the entry intercoms. The intercoms and security cameras provide live video to eliminate piggybacking The intercoms and security cameras provide live video to eliminate a practice known as piggybacking, in which additional people enter a door along with an approved visitor. The district’s video management system (VMS) records all IX Series audio and video for later review of incidents. Inside the school building, staff requires visitors to present a government-issued ID card which gets swiped through a visitor management system. Local criminal databases The card’s data will be compared to online federal and local criminal databases and sex offender registries. Approved visitors receive an adhesive ID badge to be worn while on campus. THE RESULTS Aiphone’s IX Series video intercoms are now a vital part of the district’s successful entry-control plan. Two to four video intercoms are installed at each district school. The units have helped staff keep non-custodial parents from gaining entry. “Let’s say we have a disgruntled, non-custodial parent show up at an elementary school – and this has happened more than once,” said Guy Grace, Director of Security and Emergency Preparedness, Littleton Public Schools. Valuable security equipment The units are always monitored including nights, weekends, and holidays “We don’t want that person in the building; he or she may be a potential threat. The Aiphone IX Series intercoms provide us with the information we need to get a sense of the person’s state of mind. That’s why I think this is one of our most valuable pieces of security equipment.” The ability of staff to communicate with people at school entries has helped break up fights and deter vandals. Students feeling threatened while on school property are instructed to use the intercoms to reach a security officer. The units are always monitored including nights, weekends, and holidays and can act as emergency ‘blue phones’ for people who use the school grounds. Remotely provide access The IX Series intercoms also let security officers remotely provide access to community groups, such as scouts, using school buildings after hours. It also helps the district to ensure that the facility user is following the after-hours facility use agreements. Aiphone’s IX Series video intercoms are now a vital part of the district’s successful entry-control plan. The IX Series intercoms also let security officers remotely provide access to community groups, such as scouts, using school buildings after hours.
Aiphone Corporation (Aiphone), the renowned international manufacturer of intercom and security communication products, has installed its IX Series intercom system at the Roselle Catholic High School in Roselle, New Jersey. Roselle, like many educational facilities across the country, found itself relying on outdated technology and the inability to communicate from classrooms to a main office or centralized security location, a safety risk in any educational institution. IX Series IP Video Intercom System The high school was awarded a grant through the state of New Jersey to implement security improvements. The school chose an Aiphone IX Series Peer-to-Peer IP Video Intercom System, which included two master stations, two video door stations, and 43 audio sub stations to connect each of its classrooms. This new system allows the school’s front office staff to respond to visitor access requests at the main entrance, while also making visual confirmation before admitting anyone inside the building. To handle access requests, the school is equipped with two touchscreen master stations, one located at the front office and the other in the principal’s office. Building-wide pre-recorded notification The Aiphone IX Series can send a pre-recorded notification building-wide An invaluable feature for the school is that it allows teachers to communicate directly to the front office, so that they can also quickly initiate a lockdown to the entire school, in case of an emergency. The Aiphone IX Series can send a pre-recorded notification building-wide, there by alerting students and staff of any threats and providing instructions on what to do next. “With the previous system being unable to talk back to the main office, teachers were left in a bad spot if they ever had to reach an administrator for an emergency,” said Roselle Catholic High School Principal, Tom Berrios, adding “With these improvements, the teachers now feel more secure with what’s going on in the building and they have an easier way to communicate.” ‘Hot button’ capability “This feature is considered a ‘hot button’ capability, because it allows the school to create a pre-recorded message for emergencies,” said Ed Maffey, President of Maffey’s Security Group, the systems integrator tasked with the installation. Ed Maffey adds, “With one push of a button, a pre-recorded message will play continuously and can be used for a variety of scenarios, including fire drills, emergency evacuations, and lockdown situations.”
HID Global, a globally renowned company in trusted identity solutions, has announced that the American School of Guatemala has selected its Seos credential technology to modernize its physical access system. Enhanced campus security The solution significantly improves campus security and traffic efficiency for students and parents, along with enabling staff to easily issue and manage access credentials. “We’ve significantly improved the management of vehicle traffic by reducing the time it takes for parents to access the parking lot. We’ve been able to improve evacuation and emergency processes for our students and staff,” said a spokesperson for the Security Office, American School of Guatemala. Seos credential technology The spokesperson adds, “And, best of all, we have an automated system to manage the entry and exit times of our employees to know where everyone is located on our large campus.” The American School of Guatemala is a private K-12 college preparatory school in Guatemala City, Guatemala. The school partnered with local security integrator, Grupo RQM and HID Global to replace its legacy system, which consisted of written documentation and fingerprint logs. HID readers installed at access points The new system includes HID readers installed at pedestrian and vehicle access points The new system includes HID readers installed at pedestrian and vehicle access points and 1,500 Seos smart cards issued to students, parents and staff. In addition to automating and streamlining access to the school’s buildings, the solution has led to a reduction in the average student drop-off time from 40 to 18 minutes. The school also launched a pilot with HID Mobile Access to allow secure access to the school’s parking lot via mobile IDs stored on smartphones. To gain entry, users simply drive up and hold their mobile phone to a reader, an important feature since most students travel in bulletproof armored vehicles that lack the ability to lower windows. Upgraded security and authentication solutions “The American School of Guatemala’s access control system has all the hallmarks of HID’s industry-renowned security and authentication solutions,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. Harm Radstaak adds, “From flexibility and security to ease-of-use, HID’s unique combination of forward-looking technology and intuitive design helps create a robust solution that fortifies the school’s campuses and elevates the user experience.” Due to the successful deployment, school officials plan to replace its traditional key system with Seos smart cards for additional use cases, such as library and student payment services.
Trinity College Dublin is enhancing safety and support for staff and students by implementing SafeZone technology from CriticalArc. SafeZone technology Through this implementation, the university aims to deliver more rapid response to calls for assistance across all campus facilities, and to better assist students and staff working remotely, including those on placement overseas. When individuals call for assistance, in a wide range of situations, including those working alone out of hours, those with particular vulnerabilities and those with medical emergencies, the technology will enable responders to pin-point their precise location. Access with SafeZone mobile app Students and staff can check-in and use the service with the SafeZone mobile app Students and staff can check-in and use the service with the SafeZone mobile app, which puts them in immediate contact with the university’s support infrastructure. The technology will also make it easy for the responders to optimize response and to provide appropriate intervention in the event of an emergency. “During this challenging time for our students and staff, Trinity College Dublin is doing everything it can to ensure both the physical and mental well-being of everyone in our community. We are delighted to be introducing this advanced technology, as part of our support actions,” stated Trinity’s Head of Safety, Dr. Katharine Murray. Students and staff safety “It’s more important than ever for universities to keep in touch with their students and staff, to fulfill their duty of care and ensure that those who need help of any kind get the quickest possible response,” said Darren Chalmers-Stevens, Managing Director of CriticalArc. Darren adds, “We’re pleased to help Trinity College Dublin with a rapid implementation of SafeZone to help ensure the safety and well-being of students and staff.”
The large La Cité College campus touts ten interconnected buildings and six parking lots, set on 60 acres of land. Securing this campus is no easy feat by any means. Aiphone emergency towers with IX Series intercom stations enable a distressed student to directly have a two-way conversation with campus officers. “I was happy to know we’d have a high-quality, functional system in place soon after I’d started the job,” said Martin Gregoire, Campus Security Director, La Cité College. Multi-layer security system Students at Ottawa’s French language college, La Cité, are protected by a multi-layer security system Students at Ottawa’s French language college, La Cité, are protected by a multi-layer security system. From the time they arrive to one of six parking lots, to roaming within the campus’ 10 inter-connected buildings, students have access to reliable security. Opened in 1995, the La Cité campus is Ontario’s largest French-language college with over 5,000 students. It offers 140 post-secondary programs with degrees ranging from architecture to security management. The large campus touts ten interconnected buildings and six parking lots set on 60 acres of land and securing the campus is not easy. Aiphone emergency towers The most recent addition to the security system is 15 parking lot emergency towers from Aiphone. The towers with IX Series intercom stations enable a distressed student to directly have a two-way conversation with campus officers. The intercom’s embedded camera provides officers with live video to more accurately assess and respond to a situation. Rock Levesque, Project Manager for the Ottawa-based security integrator, ComNet Networks and Security, said the new towers replaced previous call stations created by a member of the campus IT department. IX Series intercom stations The previous stations only allow one-way communication. Pushing the emergency button initiated a siren that was so loud that students had difficulty hearing the security staff. Also, the stations often didn’t work. “It defeated the purpose of having a system,” said Rock Levesque, adding “The only thing guards would know is that there was a call from a specific station. An officer would be dispatched having no idea of the situation. And we could spend a week repairing the stations, with no guarantee the next day they would still work.” Upgrading the emergency system Concerned about student safety, college administrators decided to upgrade the entire system last fall Concerned about student safety, college administrators decided to upgrade the entire system last fall. About the same time, Martin Gregoire took over as campus security director, after 24 years in protective services, at the University of Ottawa. “They asked my opinion of the plan,” said Martin Gregoire, adding “I told them security is a lot like an onion with its many layers. They made the right decision to start on the exterior and work their way in. I was happy to know we’d have a high-quality, functional system in place soon, after I’d started the job.” Customized mobile app La Cité College also uses a customized mobile app that enables students to contact security, receive notifications, and perform other non-emergency functions. Gregoire said he also views the AppArmor program as a valuable security layer that augments, rather than replaces, the emergency towers. “We can have the best plans on paper, but it’s when you get hit that you realize what tools are missing or not working. We need to know that we will eventually be hit and plan for it now,” said Martin Gregoire, Campus Security Director, La Cité College. Importance of multi-layered security “Security is a lot like an onion with its many layers. They made the right decision to start on the exterior and work their way in.” Martin Gregoire, Campus Security Director, La Cité College. “Getting rid of the towers would be a mistake,” said Martin Gregoire, adding “Our towers are connected via landline. They are always on and you can’t lose the signal, as you can with a cellular-based system. The towers have no batteries that can die. And security officers immediately know the precise location of a tower call.” Importance of campus emergency towers The campus’ emergency towers helped to fill the communications gap Martin Gregoire knows about the loss of cellular service. He was at the University of Ottawa in 2014, when a gunman in the nearby Canadian Parliament building led to a campus lockdown and a temporary loss of cellular service. The campus’ emergency towers helped to fill the communications gap. La Cité’s emergency towers have the standard blue light that makes them easy to spot at night or in foggy conditions. The intercoms feature two call buttons for different priority levels. An assistance button enables students to seek directions or report a crime, while an emergency button is for summoning immediate help. Axis 360° multi-pixel, PTZ and bullet cameras Rock Levesque said weather-resistant paging horns attached to the stations are used by officers, provided by Securitas, to provide one-way mass notification information, during a lockdown or other emergencies. This spring, the campus will use optional CCTV arms on four towers to mount Axis 360° multi-pixel cameras. This will provide the security team with more detailed views of the most distant parking lots. Additional Axis PTZ and bullet cameras are mounted on building exteriors. A Genetec access control system is used throughout campus buildings. There are also panic buttons installed in hallways and some restrooms. Highly-layered security and advanced planning Martin Gregoire is a strong proponent of highly-layered security systems and advanced planning. He supports his ideas with a quote from former heavyweight boxing champion, Mike Tyson. “Reporters asked Tyson if he had a plan for a fight in which he had been knocked down,” said Gregoire, adding “He said, ‘Yeah, I had a plan until I got hit’. We can have the best plans on paper, but it’s when you get hit that you realize what tools are missing or not working. We need to know we will eventually be hit and plan for it now.” Campus security upgrade Both Gregoire and Levesque said the next planned campus security upgrade will involve the installation of emergency towers and stations outside buildings and inside on each floor near stairwells. Budgets will likely require installations to be completed one building at a time.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Protecting Your Data Against Physical ThreatsDownload
Six Things To Look For When Adding AI Cameras To Your OperationDownload
Best Practices Guide: Analog Video To CloudDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload