Promoting the company’s ethos of establishing close working partnerships, CCTV design and manufacturing company, 360 Vision Technology, is celebrating a long-term technical relationship with IP CCTV and security system specialists, Check Your Security. Based in the east of England, with offices in London and Liverpool, Check Your Security offers a wide range of professional expertise and experience in delivering integrated security solutions, using best in class technology - and were the v...
Fujifilm and Videotec announce a new collaboration, integrating top-performance products to supply an innovative solution for accurate long-range surveillance. This solution is ideal for protecting critical infrastructure and transportation networks, including airports, harbours, highways, borders and the environment. The combined system incorporates Fujifilm’s new high-end SX800 camera into Videotec’s ULISSE MAXI PTZ. Integrating the SX800 camera into the robust and precise ULISSE M...
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full po...
Hikvision and Dahua have been added to a U.S. government list of entities “reasonably believed to be involved, or to pose significant risk of being or becoming involved, in activities contrary to the national security or foreign policy interests of the United States.” In effect, inclusion on the list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign...
Axis Communications, one of the market pioneers of network video technology, has received two accolades from security authorities in the form of Cyber Essentials Plus, a scheme operated by the National Cyber Security Center, and Secure by Default self-certification, organized by the Surveillance Camera Commissioner, Tony Porter. The awards demonstrate Axis’ commitment to cybersecurity and its dedication to mitigating cyber risks within the products and services it provides. The UK Surveil...
A week of mass shootings this summer has again spotlighted the horror of gun violence in public spaces. A 19-year-old gunman opened fire at the Gilroy Garlic Festival in California on July 28, injuring 13 and killing four (including the gunman). In El Paso, Texas, less than a week later, a lone gunman killed 22 people and injured 24 others. In Dayton, Ohio, a day later, a gunman shot 26 people during a 30-second attack, killing 9 and injuring 17. Rising active shooting incidents Beyond the gri...
Eagle Eye Networks, the provider of cloud video surveillance worldwide, announced a new partnership with Salto Systems, a global provider of access control systems. In the new and improved Salto KS application, the Eagle Eye Cloud VMS Surveillance product has been integrated via cloud to provide Salto KS customers a more cyber-secure video experience connected to access control events. Within the Salto KS mobile app, a user can confirm a person’s identity before remotely granting access to any door, and share the video footage with offsite, cloud back-up. These and other features delivered by the Salto KS / Eagle Eye Networks Cloud VMS integration, provide considerable benefits to end users in various verticals that need a seamless integration between video and access control. Additionally, the partnership showcases the continuous expansion within the Cloud ecosystem of security products manufacturers. Benefits of cloud integrations “It is great to be able to provide this integration with what we perceive is our twin in the industry for CCTV. Twins because our companies are almost the same age, we share the Cloud vision and both share core values like security, reliability and both sell and support through a global network." - Rick Voogt, MD SALTO KS. SALTO KS provides a flexible access control management system that requires no software to be installed Through secure, restful APIs, cloud integrations are superior to on-site integrations in terms of speed, security and the redundancy of valuable customer data. For system integrators, this new partnership enables valuable opportunities to gain stickier customer relationships with monthly recurring revenues on both video and access control products. Cloud-Based wireless access control system SALTO KS provides a flexible access control management system that requires no software to be installed. The modern cloud-based, wireless access control system is simple to use and the configuration with an Eagle Eye Cloud VMS customer account can be quickly accomplished in a few easy steps with the appropriate Eagle Eye Networks’ customer account credentials. “We are pleased to work alongside Salto Systems globally to provide a better user experience for both end users and channel partners,” says Dean Drako, CEO and Founder of Eagle Eye Networks. “Cloud systems are rapidly becoming the better option in physical security and we are determined to continue leading the transformation with strong partnerships like this one with Salto Systems.”
Qognify, the trusted advisor and technology solution provider for physical security and enterprise incident management, has announced that it will share its expertise of how metropolitan areas can make the shift from being safe and smart to fully cognitive cities, at the 5th National Summit on 100 Smart Cities India 2019. Qognify is the Presenting Partner of the Summit which takes place August 22, 2019 at The LaLiT in New Dehli. Safe & Smart City Solution Qognify, with its Safe & Smart City Solution, is one of the leaders in safe and smart cities in India. It is currently involved in more than 20 safe and smart city projects throughout the country that include high profile award-winning projects such as: Navi Mumbai - Qognify is used to monitor all critical points within the city including public transportation, schools, heavily traveled traffic junctions, city entrances and exits, open-air markets and utility infrastructure. Nanded City has an integrated command, control and communication center (C-Cube) that is powered by Qognify’s Safe City solution that includes Qognify’s Situator, video management and analytics solutions. Kohlapur is using Qognify’s video management and analytics to assist law enforcement and city management in coping with the influx of increased tourism. Regional VP, India at Qognify, Dilip Verma, will present at the Summit and he comments: “Many cities have taken steps to become safe cities, while a smaller but growing number are breaking ground as truly smart cities. At the Summit, we will use our experience, working on some of the most innovative projects in India and around the world, to look to the horizon, where we envisage urban environments becoming truly cognitive.” Safe, smart and cognitive cities Cognitive cities are much better positioned to thrive in the face of significant challenges" Verma makes the distinction between safe, smart and cognitive cities: “A safe city aims to ensure the safety and security of its residents, while smart initiatives go further, improving the operations of city. Cognitive cities take things to the next level by keeping citizens engaged and contributing to the gathering of the relevant data. The insights from which can be used not only to improve security, safety and city operations, but also the lives of residents.” He adds: “Cognitive cities are much better positioned to thrive in the face of significant challenges such as clean water scarcity, climate change, and providing functional and efficient mass transportation at mega-city scales. It is an ambitious goal that not only holds the promise of being more resilient, but at the same time promotes civic participation, sense of community and the health and wellbeing of citizens.” 5th National Summit on 100 Smart Cities India 2019 The 5th National Summit on 100 Smart Cities India 2019 will bring together global thought leaders to focus on aspects of a smart city including urban development, surveillance, power, energy, transport, technology, smart building, smart grid, smart health, network and communication technology.
FlytBase, Inc., an enterprise drone automation company, releases a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications. The journey from the ‘early adopter’ phase to the ‘early majority’ phase of the adoption curve for drone deployments in industrial & commercial security will require: a) reliable, off-the-shelf hardware b) cloud-based, hardware-agnostic software, and c) faster time-to-value, driven by low capex and seamless integration. Security and surveillance Unmanned aerial vehicles (UAVs) can be deployed in a multitude of 24/7 security and surveillance use-casesUnmanned aerial vehicles (UAVs) can be deployed in a multitude of 24/7 security and surveillance use-cases - the pace of which is determined by the intensity of user/customer pain points - such as high turnover of security guards, operations at night and in hostile scenarios, surveillance of hard-to-reach locations, liabilities associated with human and helicopter patrols, CCTV blind spots, need for real-time situational awareness in emergencies, etc. The time for aerial security is now ripe because the prosumer drone market has matured so rapidly in the last few years that commercial-off-the-shelf drones can be used commercially, instead of (expensive, monolithic, low reliability) custom drones, in all but the most demanding security and surveillance use-cases. Real-Time incident response Nitin Gupta, FlytBase CEO, commented, “The physical security market is primed for drone automation and scaling - the time, cost and safety benefits of autonomous drone fleets can create significant business value for this industry.” “Drone patrols will augment human guards and enable security agencies, risk managers, security directors, system integrators and other stakeholders to make faster, better decisions for real-time incident response, remote security operations, event management, disaster response and more.”
The New Jersey Electronic Security Association (NJESA), which represents electronic security professionals, system integrators, fire alarm companies, manufacturers and distributors that do business in New Jersey, is offering a career training class for high school students that will provide extensive training in the electronic security and life safety industry. Certified Alarm Technician Level I The Certified Alarm Technician Level I Training class, exclusive for high school students who are considering a career in the innovative electronic security field, is a 3-day course that presents an overview of the theory, installation and maintenance of alarm systems, basic electricity, standards, perimeter detection, space detection, fire systems, control panels, communications, CCTV, job planning, and false alarm prevention. By the end of the course, students will have an understanding of the industry and their role within it, understand the importance of codes and standards and how to locate them and apply them, be able to define basic installation procedures, and compare the underlying technology behind the various security system tools and equipment.Electronic security deals with cutting-edge technology including networking and IT Enhancing security knowledge One of the goals of NJESA president, Christine Marzano when she took office, was to generate an awareness in high schools and share the message that the security industry is admirable and a fantastic opportunity. “The security industry has been good to me,” she said. “I can't begin to say how proud I am of our industry and I hope our high school students in New Jersey will learn, grow and have the same pride for our amazing industry.” Electronic security and life safety For high school students in New Jersey, the class opens the doors to an alternative to college and to learn and experience a trade at an early age. In addition, electronic security deals with cutting-edge technology including networking and IT, hot topics today that opens many career opportunities. The Certified Alarm Technician Level I Training course will be held July 23 – 25, 2019 from 9:00am – 5:00pm at the Affiliated Monitoring facility in Union.
As public security concerns spread across the globe, public areas that lack guard during non-business hours are requiring reliable surveillance equipment in the case of high crime rate at night or poor lighting conditions. In response, Dahua Technology, a video-centric smart IoT solution and service provider, develops “Starlight Technology” with comprehensive camera portfolio including PTZ, IPC and HDCVI to serve various needs of low-light environment. Starlight cameras Compared to traditional video monitoring cameras, Dahua Starlight cameras feature high light sensitivity to provide brighter view under low-light environment. Offering clear image with rich details and ultra-high definition from 1080P to 4K, the Starlight cameras guarantee 24/7 reliable and detailed monitoring of public places such as parking lot, street, campus, store, etc. Besides, the high color reproduction and longer color video period enable the probability of collecting valid human, vehicle, and event evidence. Starlight, Starlight+ and Full-Color Variations From Value Starlight to Full-color, Dahua Starlight family meets both entry-level and high-end needs Under same lighting condition, a Starlight camera turns Black/White later and presents brighter image with far more details whereas a full-color camera presents 24/7 color image. From Value Starlight to Full-color, Dahua Starlight family meets both entry-level and high-end needs according to different lighting conditions. While Value Starlight represents cost-efficient solutions for entry-level markets, Starlight, Starlight + and Full-color respectively offer right solutions for common users, critical scenarios and toughest environment with their various performance. Smart IR and Smart Light technology Behind Starlight’s great performance is Dahua Technology’s strong R&D ability and technological attention paid on different parts of camera. Starlight camera employs high-performance sensor or large-sized sensor with 1/1.8” or even 4/3” inch dimension to present better light sensitivity. Large aperture lens instead of conventional lens are utilized to present more vivid and brighter image under low-light environments. High performance DSP and advanced image processing properly balances noise reduction and smear suppression while retaining appreciable clarity, which better enhances the Starlight performance. Furthermore, proper light compensation, like IR lighting (for B/W image) or LED lighting (for full-color image) is equipped together with Smart IR or Smart Light technology to present better night view while avoiding overexposure in total dark environment. All these advantages make Starlight Technology stand out. And undoubtedly, Dahua Technology’s complete Starlight product portfolio are ideal choices for customers who are looking for surveillance equipment with excellent performance for various low-light applications. With a mission of “Enabling a Safer Society and Smarter Living”, Dahua Technology will keep focusing on “Innovation, Quality and Service” to serve both partners and customers around the world.
Hikvision USA has issued a response to recent concerns, expressed in the U.S. Congress and elsewhere, about the parent company’s involvement in surveillance of detention camps in the Xinjiang region of China. According to a corporate spokesperson: “Hikvision takes these concerns very seriously and has engaged with the U.S. government regarding all of this since last October. In light of them, it has already retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company regarding human rights compliance.” Separately, and related to cybersecurity concerns, the spokesperson comments: “Hikvision takes cybersecurity very seriously as a company and follows the laws and regulations in the markets we operate. The company has its products regularly tested for vulnerabilities and has received certifications for their cybersecurity standards, including the U.S. National Institute of Standards and Technology FIPS 140-2.” 2019 ESG report Following are passages from the company’s Environmental, Social and Governance (ESG) report that was published in English on April 24, 2019. We have recently commissioned an internal review of our operations by the U.S. law firm, Arent Fox LLP" This passage is from the Chief Compliance Officer's opening letter: “Over the past year, there have been numerous reports about ways that video surveillance products have been involved in human rights violations. We read every report seriously and are listening to voices from outside the Company. We are taking a hard look at our products and business." "As part of this process, we have recently commissioned an internal review of our operations by the U.S. law firm, Arent Fox LLP, mandating it to look into relevant transactions so the Company can enhance its screening standards to better protect human rights. Arent Fox will also help us improve the policies that will help ensure human rights compliance going forward. As part of this effort, a high-level team from Arent Fox has already traveled to China twice.” Human Rights Governance Here is a section from the ESG report on Human Rights Governance: “Hikvision respects the human rights as set forth in the Universal Declaration of Human Rights, International Covenant on Civil and Political Rights and the International Covenant on Economic, Social and Cultural Rights in commercial practice. A professional legal team investigates, recognizes and tracks the laws and regulations "Meanwhile, we will incorporate these provisions into our business procedures and policies in accordance with the UN Guiding Principles on Business and Human Rights Framework to enhance the value of our business activities.” In 2018, the Company appointed the Chief Compliance Officer, responsible for promoting the compliance construction covering areas of human rights protection, data security and privacy protection as well as social responsibility, etc. A professional legal team investigates, recognizes and tracks the laws and regulations applicable to global operation of the Company and carries out the construction of human rights compliance with the situation of the company. Click here for a PDF link to Hikvision’s full ESG report.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
While security salesmen are touting megapixels and anti-passback features, they are missing an opportunity to communicate the role of technology in the broader context of risk management and incident response – and in saving lives. That’s the message of Gerald Wilkins, PSP, Vice President of Active Risk Survival. Incident response is at the core of how an enterprise reacts to risk and is a standardized approach to the command, control, and coordination of emergency response. Effective incident response requires integrating a combination of facilities, equipment, personnel, procedures, and communications operating within a common organizational structure. All the elements must work together to achieve the desired outcome – to mitigate a risk using countermeasures. Capabilities of systems during emergencies I want to see us have more meaningful conversations with security directors and emergency operations planners"Equipment such as CCTV, access control and mass notification systems can provide effective countermeasures, but salesmen in the physical security market are not ‘connecting the dots’ between equipment specifications and its capabilities as part of the broader incident command system. “Historically, purchases of security technologies have not been considered in that context,” says Wilkins. “Rather, the industry’s sales pitches have been about features and capabilities – pixels or communication distances or intelligence – not about how those capabilities are useful in the specific context of emergency response.” “My goal is to change the industry,” says Wilkins. “I want to see us have more meaningful conversations with security directors and emergency operations planners.” Focusing on the Emergency Operations Plan “We are in the life safety business, and we need to have more conversations about where technology fits into the Emergency Operations Plan (EOP). When was the last time you [as a security salesman] asked a client to look at their Emergency Operations Plan? No one knows the technology better than we do.” What’s missing, however, is attention to how technology is applied to risk management and response“There are so many folks in our industry who are technology gurus, who ‘get’ the technology, and are good at selling it,” he says. What’s missing, however, is attention to how technology is applied to risk management and response. “As an industry, even guys who have been in the business a long time have never heard about incident command,” says Wilkins. “How are we weaponizing technology to maximize the outcome? We don’t talk about it. We want to talk about megapixels and wide dynamic range. But when are we going to talk about how we can apply that technology to mitigate our tangible and intangible risks?” Importance of security equipment In the wake of each active shooter or other incident in the news, Wilkins looks back to consider the missed opportunities and how security equipment could have saved lives. “What technology did we have to help first responders – video, access control and paging – but they weren’t used?” he asks. An example is the San Bernandino shooting in 2015, when police officers were heard asking “has anybody found that access control card?” In effect, a law enforcement officer was asking for technology that should have been included as part of the emergency plan. Situational awareness, such as that provided by video systems, can help responders judge which areas are safe fasterSituational awareness, such as that provided by video systems, can help responders judge which areas are safe faster and provide Emergency Medical Services (EMS) personnel more time to save lives. However, video is not being viewed in that light as a part of the broader life-saving mission. “Our industry needs to sit down with a security director or operations manager and ask: How are you using technology as a resource tool that will become part of your critical response?” says Wilkins. Understanding how equipment works Technology is often not being incorporated in emergency planning, even with something as simple as a fire drill. Most fire drills are ‘one size fits all’ – every person knows where they should go and how they should exit. But what if there is a fire in a particular part of the building? Today’s fire alarms operate in zones to communicate the location of a fire, but this capability is not being used to practice a variety of resulting scenarios that could save lives. “We need to understand as an industry how our partners in law enforcement and EMS do their jobs,” says Wilkins. “We can help stakeholders in a building understand how our equipment works every day and how they can use it in a critical incident. We need to understand Emergency Operations Plans (EOPs), how incident command works, and how we can help emergency responders.” Security training for salespeople I want to know everything I can know to help guys sell things that can change the outcome if something bad happens"“If a guy wants to talk about his pixels or his anti-passback, he should instead consider having a meaningful conversation with the client about best practices and how to mitigate risk. This creates a different position [for the salesman], and if there is a critical incident, something you said or did might save someone’s life.” When it comes to training and taking a more strategic approach to sales, to some extent, the security technology industry has been a victim of its own success. When business is good, security companies are less likely to look for ways to train their salespeople. “We’re in the life safety business, not in the ‘stuff’ business,” says Wilkins. “I want to know everything I can know to help guys sell things that can actually change the outcome if something bad happens.” Another problem is “we don’t know what we don’t know.”
When it comes to emergency planning and response, there is an abundance of resources to help enterprises prepare to mitigate the impact of an incident. The U.S. Federal Emergency Management Agency (FEMA) has devised the National Incident Management System (NIMS), aimed at defining and standardizing ways that resources can be used to manage and respond to an incident. An enterprise’s Emergency Operations Plan, or EOP, incorporates NIMS concepts and spells out what to do in an emergency. Security equipment purchases But how does an EOP relate to security equipment purchases? In the language of FEMA, enterprises should ask themselves: How do I currently ‘resource type’ my electronic countermeasures as part of my critical incident response plan? In FEMA parlance, ‘resource typing’ is categorizing resources according to capability using FEMA’s ‘Typing Library Tool’. The tool identifies technologies that can improve response. Technology purchases should be considered in the context of their role in the larger plan, says Jerry Wilkins, PSP, Vice President of Active Risk Survival. “Currently, that doesn’t happen, and we as an industry do not even speak in the same language as those who guide emergency responses to which security equipment can be a useful contributor,” Wilkins says. The National Incident Management System is aimed at defining and standardizing ways that resources can be used to manage and respond to an incident Wilkins speaks with authority based on a long career in the industry. Beyond his experience working in burglar alarms, home security, and as a manufacturer’s rep, Wilkins has expanded his expertise to the broader categories of incident command, emergency response and law enforcement. He has received FEMA IS-0100 (incident command training) and has sought to apply it to critical incidents, active shooters and other emergency situations. He has attended Solo Engagement Operator Training (SWAT school) and Tactical Emergency Casualty Care (TECC) military training. Responding to emergencies As a student in a broad array of disciplines, Wilkins has sought to engage the security technology industry in an important conversation: What can we do as an industry to apply technical capabilities to the question of how to respond to an emergency? Adherence to best practices can help to avoid liability – and save lives For example, CCTV is a valuable tool for situational awareness, but it wasn’t deployed in the aftermath of the Parkland, Florida, school shooting in 2018 until 24 minutes into the incident. “By the time they decided to use the video, [the shooter] was already gone. They had 15 high-definition cameras, but they did not know how to use the technology for situational awareness because it was not part of the Emergency Operations Plan. They could have known every move [the shooter] made if the technology had been part of the EOP,” says Wilkins. Here is another example from the Parkland shooting incident response. When responding to an incident, Emergency Medical Service (EMS) typically divides a site into three levels – hot zones, warm zones, and cold zones – based on danger levels. In the Parkland shooting, the 1200 building went ‘cold’ – meaning it was safe – as soon as the shooter left the building. But it was 58 minutes before they called it a ‘cold’ zone, thus delaying survivors’ access to emergency care that could have saved lives. Better situational awareness, provided by leveraging CCTV, would have made the difference. If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?" There are a number of other available standards, processes and other documents to guide emergency response. Adherence to best practices can help to avoid liability – and save lives. Ignoring known and well-documented best practices can leave an enterprise vulnerable in the aftermath of an incident. Understanding these principles and best practices can help security equipment companies understand how the benefits of their products can be maximized in this context. Here are some available resources: NFPA 3000, a 42-page provisional standard for responding to an active shooter, addresses all aspects of the process, from identifying hazards and assessing vulnerability to planning, resource management, incident management at a command level, competencies for first responders, and recovery. National Association of School Resource Officers (NASRO) has created Standards and Best Practices for School Resource Officer Programs. PASS (Partner Alliance for Safer Schools) has compiled School Safety and Security Guidelines and a School Security Checklist. Federal Bureau of Investigation (FBI) has released ‘Making Prevention a Reality: Identifying, Assessing and Managing the Threat of Targeted Attacks’. Department of Homeland Security (DHS) has released ‘Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide’. U.S. Secret Service has released ‘Enhancing School Safety Using a Threat Assessment Model: An Operational Guide for Preventing Targeted School Violence’. OSHA 3148 provides policy guidance and procedures to be followed related to occupational exposure to workplace violence. (OSHA is the Occupational Safety and Health Administration) OSHA’s ‘general duty’ clause requires that each employer furnish to each of its employees a workplace that is free from recognized hazards that are causing or likely to cause death or serious physical harm. “If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?” says Wilkins. “It’s regulatory guidance that you could have followed but didn’t.”
Following a competitive tender process Corps Security has been awarded a three-year contract to provide security services to Registers of Scotland at Meadowbank House, in Edinburgh. A team of 10 officers will provide guarding services with a focus on front-of-house, customer service, CCTV monitoring and patrols. Like-Minded organization Registers of Scotland is the public body responsible for compiling and maintaining registers relating to property and other legal documents in Scotland. Mike Bullock, Chief Executive of Corps Security, said: “We are delighted to be working with such a like-minded organization. Corps Security is a trust which was set up to provide employment for ex-servicemen returning from the Crimea. We share values with Registers of Scotland and look forward to working closely together.”
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualiszation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfill project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
Comelit 4 camera wireless CCTV system has been selected on site at the iconic, Grade II listed Chichester Cathedral, to protect the retail area and provide 24x7 high-quality monitoring capability and extra peace of mind for staff. Wireless CCTV surveillance This magnificent Cathedral has stood at the center of Chichester for over 900 years. With unique architecture from each century of its life, this Cathedral is both ancient and modern, where original medieval features sit alongside world famous contemporary artworks. Any works needed to consider the sensitivities of working in such a historic building. Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image A representative from Chichester Cathedral commented, “When it came to upgrading CCTV for the retail area, we contacted Envisage Technology Ltd who recommended Comelit’s 4 camera wireless CCTV system. It has proven to be the perfect solution, with the system proving simple to install. Staff now have access to monitors by the till points that also act as a significant visual deterrent. The high-quality images available add extra peace of mind.” Four camera wireless CCTV Kevin Brown, Managing Director, Envisage Technology added, “Chichester Cathedral is one of the most prestigious visitor sites in West Sussex. Comelit’s wireless CCTV specification, coming from such a renowned brand, provided the necessary infrastructure to embrace the need for delicate installation, minimizing the need to run cables, and still provide the high-quality footage. We can support the ongoing maintenance process to ensue volunteers, customers and staff are kept safe and secure.” Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image. Installed outside of opening hours to avoid disruption to the retail environment, monitors were positioned directly by the till points, enabling staff to have full visual access of the complete area at all times. Retail surveillance Tim Edmonds, Comeilt CCTV Manager concluded, “The retail area, established in such a significant Cathedral is a great example of how Comelit’s wireless CCTV system can be used to protect any environment.” “Working with Envisage, the solution was presented as a simple, yet effective option, installed with absolutely no impact on the surrounding building. The result is a powerful visual deterrent and peace of mind that staff in store, and in back offices can keep an eye on operations quickly and easily, on a 24x7 basis.”
Thermal imaging is a technology that can provide many benefits in a wide range of applications. In particular, thermal imaging cameras have been deployed successfully as highly affordable solutions in the security industry. Accepted throughout the industry as the best 24-hour visual surveillance imaging solutions available, thermal security cameras are vital tools in securing borders, airports, sea ports, nuclear facilities, and other critical infrastructure. Today these affordable solutions are also protecting homes, corporate campuses, industrial facilities and retail businesses. Infrared-Illuminated cameras They can easily detect intruders and other potential hazards in any weather Thermal security cameras let people see what their eyes can’t: invisible heat radiation either emitted or reflected by all objects, regardless of lighting conditions. Because they see heat, not light, thermal cameras are effective tools in any security setting. They can easily detect intruders and other potential hazards in any weather, as well as day and night. Cameras that create images based on visible light—such as conventional CCTV or infrared-illuminated cameras— have the advantage of creating images that are familiar and easy to interpret. Unfortunately, the ability of a given detector, whether the human eye or a camera sensor, to create these images relates directly to the amount of light available. At night, for instance, when there isn’t much visible light, objects appear faint, or not at all. Thermal imaging cameras In contrast, thermal cameras make pictures from heat, not light, having nothing whatsoever to do with reflected light energy. They see the heat given off by everything under the sun. Everything we encounter in daily life creates or reflects heat energy, called a ‘heat signature,’ which thermal cameras can see clearly. Another limitation of relying on visible-light detection is visual contrast. Regular cameras that capture only visible light can be fooled by visual camouflage, or situations where similar colors or patterns blend together and, thus, obscure objects or people that need to be detected. Thermal imaging cameras don’t suffer this same problem. For example, an intruder standing under a densely-branched tree may be hard to detect using an IR-illuminated camera, but with a thermal imaging camera, the intruder would be clearly visible. Providing constant protection One of the biggest benefits of thermal imaging comes in the domain of security These advantages over visible cameras have led to the wide spread use of thermal to detect the presence of people in restricted or suspect areas, assess the tactical situation, and respond accordingly. No one within the view of a thermal camera can hide their heat. Thermal security cameras are the best tool to determine how many intruders are present, and, consequently, how many officers or agents should respond to meet the threat. One of the biggest benefits of thermal imaging comes in the domain of security. Security cameras have become a staple of protection for many (if not all) major businesses across the globe. In such a domain, the need to produce images of surrounding perimeters is critical to providing constant protection against potential intruders. False alarms experienced No matter what you need to see, or what perimeter you need to protect, thermal security cameras let you see clearly, even in total darkness, and through camouflaging foliage, smoke, dust, and light fog. Another reason why thermal imaging cameras often prove cost-effective is that they help reduce the number of false alarms experienced in a business protection scenario. Visible light cameras can be easily fooled by many naturally-occurring phenomena, such as blowing trees, shadows, insects, birds, or oncoming cars. In terms of motion detection, microwave, fence sensors, motion sensors, RAFID, and radar can all detect a possible intrusion, but they are essentially ‘blind’ technologies compared to thermal imaging. When a motion sensor is triggered, a user still needs an additional method of assessing the nature of the alarm, in order to determine the most appropriate response. For example, is it a person climbing the fence or just a harmless squirrel? CCTV security system Because of thermal security cameras’ high-contrast video output, security professionals have found that they work very well with video analytics. They can provide more reliable alarming with fewer false reports than visible-light cameras, even during the day. Thermal imaging security cameras offer both alarming capabilities and reliable images – two solutions in one. Prices for thermal imaging cameras have come down substantially in recent years Thermal imaging cameras are an affordable option for many businesses that want to ensure they have the best security and protection available. Prices for thermal imaging cameras have come down substantially in recent years, to the point where they are on par with regular visible-light cameras, while providing the superior ability to capture images that in many situations regular cameras simply cannot match. In addition, the total cost of ownership of a security system with thermal imaging cameras is, in general, much lower than a CCTV security system, for two main reasons. Monitor multiple areas First, a business would require fewer thermal imaging cameras than if deploying CCTV cameras, thanks to the excellent range performance of thermal imaging cameras. Since each camera needs only a mast for mounting, power, and a video feedback connection, fewer cameras are required. Business can keep their infrastructure simple, minimizing maintenance costs. Another area of cost savings is that thermal imaging cameras work perfectly in complete darkness and don’t require any lighting to maintain security and protection. Not only is lighting expensive to install, it also requires a great deal of electricity to keep those lights on all night. Businesses that wish to monitor multiple areas of their premises would be wise to deploy one or more thermal imaging cameras to provide the best protection against potential intruders, especially at night, when visible light is either low or non-existent. In short, any business that wants to achieve the maximum level of security and protection of their intellectual and physical property should consider deploying a thermal imaging solution.
K9 Fuels are a family run, fuel distribution business providing an efficient and customer focused service in and around Lincolnshire. Since moving to their new premises on an industrial site, they weren’t able to leave their fuel trucks in the yard because of constant break-ins and theft. CCTV was installed but wasn't enough of a deterrent. Seeing a Gallagher monitored pulse fence at nearby TC Harrison, K9 Fuels wanted more information on how a similar system could benefit them. Monitored building alarm A simple stand-alone, four zone system linked to their existing monitored building alarm was installed. There is potential to upgrade this to a network based system, using the same F32 fence energizers, if the company expands. System height is 3.0m (32 wire), with a fence length of approximately 200 metres including one sliding gate and one double leaf gate. The break-ins stopped after the monitored pulse fence was installed and K9 Fuels are at ease knowing that their premises are monitored and protected 24 hours a day.
AT Brown (Coaches) Ltd is a premier coach company based in Telford, England that has been operated by the same family for over 100 years. After moving to larger premises in the town’s Hortonwood Industrial Estate in 2005, AT Brown began suffering from constant diesel theft. Installing a Gallagher monitored pulse fence stopped the thieves overnight. Despite having installed CCTV cameras and employing mobile patrols, AT Brown owner Ewen MacLeod says the diesel theft problem continued for the first eight years on the new site. “Thieves were coming through the security fence and syphoning fuel out of the coaches. The investment in CCTV cameras and mobile patrols wasn’t paying off.” Perimeter security solution Gallagher Security partnered with SPG Security Systems UK Ltd to provide a perimeter security solution that would let AT Brown get back to running their business. A Gallagher monitored pulse fence was installed around the whole site, including the large double leaf access gates. The monitored pulse fence was easily retrofitted to AT Brown’s existing security fence, making it a cost-effective option that could be quickly installed without any disruption to the business. SPG and Gallagher very quickly got to know what our requirement was and installed it around us" “SPG and Gallagher very quickly got to know what our requirement was and installed it around us,” says Ewen. “There was no impact whatsoever on us running the business.” Gallagher Security strategic business development manager Kevin Godfrey says the monitored pulse fence provided deterrence and detection for the whole site. Building alarm system “It’s a really simple, effective solution that has negated the need for guard patrols and a CCTV system.” The fence can be armed or disarmed with the building alarm or a keypad, and any break-ins are notified on a phone, through the building alarm system. Since the monitored pulse fence was installed in 2013, there have been no further incidents at AT Brown. The fence provides a powerful visual and practical deterrent to would-be thieves, preventing further break-ins and resulting in happy staff, and children getting to school on time in the mornings. “Everyone feels more secure, which is a very important factor,” says Ewen. “Now we can just carry on running our business the way we want to.”
Round table discussion
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s Expert Panel Roundtable to reflect on instances when the industry may fall short: Which segments of the physical security industry are most under-served and why?
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a video surveillance system and why?
CCTV surveillance: Manufacturers & Suppliers
- Dahua Technology CCTV surveillance
- LILIN CCTV surveillance
- Visionhitech CCTV surveillance
- Bosch CCTV surveillance
- Hikvision CCTV surveillance
- Hanwha Techwin CCTV surveillance
- Bolide CCTV surveillance
- Vicon CCTV surveillance
- Arecont Vision CCTV surveillance
- FLIR Systems CCTV surveillance
- eneo CCTV surveillance
- Videcon CCTV surveillance
- Geutebruck CCTV surveillance
- Vanderbilt CCTV surveillance
- Sony CCTV surveillance
- videotronic infosystems CCTV surveillance
- Panasonic CCTV surveillance
- Pelco CCTV surveillance
- Videotec CCTV surveillance
- GBC CCTV surveillance