Security researchers at Check Point have unraveled a six-year, ongoing surveillance operation apparently run by Iran-based threat actors against regime dissidents. Going back as far as 2014, the attackers used multiple attack vectors to spy on their victims, including hijacking victims’ Telegram accounts, extracting two-factor authentication codes from SMS messages, recording a phone's audio surroundings, accessing KeePass password manager account information, and distributing malicious T...
Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd, a provider of cyber security solutions globally, publishes its latest Global Threat Index for August 2020. Researchers found that the Qbot trojan, also known as Qakbot and Pinkslipbot, has entered the top ten malware index for the first time, ranking as the 10th most prevalent malware in August, while the Emotet trojan remains in 1st place for a second month, impacting 14% of organizations globally....
Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors. Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organizations where public health and safety is a pri...
LexisNexis® Risk Solutions releases its biannual Cybercrime Report, which tracks global cybercrime activity from January 2020 through June 2020. The report dives deep into how the COVID-19 pandemic has impacted the global digital economy, regional economies, industries, businesses and consumer behavior. The period has seen strong transaction volume growth compared to 2019 but an overall decline in global attack volume. This is likely linked to growth in genuine customer activity due to chan...
Dahua Technology, the globally renowned video security and smart IoT solutions provider, is helping businesses reopen amid the COVID-19 pandemic. Thermal imaging, face detection, and other technologies play key roles in screening for skin temperature and determining whether someone is wearing a mask or not. Thermal temperature monitoring “Since the start of the COVID-19 pandemic, Dahua has been devoted to providing an array of solutions to help keep businesses running wherever possible,&...
The massive explosion that shook Beirut on August 4th had a devastating impact on Lebanon and its citizens, killing at least 180 people and injuring thousands. At the same time, tens of thousands of the city’s residents were left homeless after the blast destroyed their houses and properties. International organizations and peacekeepers from all over the world have reached out to send daily necessities and medical supplies to the region and assist in the reconstruction of the affected area...
Dallmeier electronic, one of the manufacturers of video security systems, introduces the remote-controlled "Privacy Shield" for their Panomera® cameras. With a few mouse clicks, government authorities, police forces as well as private businesses can cover the lenses of the cameras with a kind of "privacy curtain" in order to protect the privacy rights of individuals concerned. The use-cases could be during peaceful public assemblies, company staff meetings or strikes. Data protection One important prerequisite for the acceptance of video surveillance in public and business environments is that the privacy of data subjects must be respected. In early 2020 for example, several German courts ruled the following: During peaceful gatherings, not only must permanently-installed video systems be switched off, but this must also be "sufficiently reliably evident" to all participants in the public assembly. Moreover, a growing number of companies must also protect the right to privacy of their employees, not least in response to the requirements of the EU GDPR or other national data protection laws. Substantial logistical effort Until now, deactivating surveillance cameras visibly has caused a substantial logistical effort Until now, deactivating surveillance cameras visibly has caused a substantial logistical effort: The police or security personnel must disguise each camera individually, at great expense with the aid of elevating platforms. Returning the installations to their original condition is equally time-consuming. Given the several hundred assemblies per year held in larger cities, shift changes or strikes in businesses, this rapidly leads to substantial costs for additional manpower and the requisite equipment such as elevating platforms. Furthermore, the police and security personnel are unable to activate the cameras again at short notice if indications of possible dangers become evident. Camera technology The German video security manufacturer Dallmeier has developed a system called "Privacy Shield" to tackle these issues: Users can remotely control a kind of "blind" – that is made of a special non-transparent material – directly via the GUI in the control center, and within a few seconds cover the lenses of the Dallmeier Panomera® systems. The Privacy Shield has a highly visible color and bears the printed image of a crossed-out camera The Privacy Shield has a highly visible color and bears the printed image of a crossed-out camera, showing clearly for any person: there is no video observation or video surveillance. This solution could also be used in business environments if area or parking lot surveillance is to be deactivated at certain times, for example, such as during shift changes, company meetings or strikes. The system is not only available in the latest Panomera® generation; existing systems can also be upgraded easily. Full information on this subject is available from the manufacturer. Efficient and sustainable "As a German manufacturer, we have mastered the topic of data protection and data security through years of cooperation with authorities. This is why it was important to us to make a system available for government authorities, and private businesses as well, which addresses these many requirements in a single solution," says Dieter Dallmeier, Founder & CEO at Dallmeier electronic. "This includes the need for comprehensive protection of the privacy of citizens, or employees, to be able to comply with the legal provisions and to be able to comply with the requirement to deactivate and activate surveillance at reasonable expense. With our Dallmeier Privacy Shield, we demonstrate once again that innovation "Made in Germany" is not just an empty phrase, but offers clearly identifiable added value for all parties involved. The fact that the system can also be retrofitted, underscores our efforts to ensure sustainability."
Interface Security Systems, a service provider delivering business security, managed network, and business intelligence solutions to distributed enterprises, announces it is expanding its Interactive Remote Video Monitoring services with a new highly-affordable Virtual Security Guard Monitoring package designed specifically for small and mid-sized businesses (SMBs) and enterprises with moderate security challenges. With installation costs starting at just $2,500, companies are now able to protect their employees, customers, and assets with the help of trained security professionals monitoring their premises with live video and two-way audio. Trained intervention specialists With Virtual Security Guard, businesses such as retailers, restaurants, banks, hotels, and more, will be able to rely on Interface’s advanced technology and trained Intervention Specialists to immediately intervene in the event of shoplifting, robberies, customer arguments, and any other emergency or potentially volatile situation. “We are seeing increased demand from SMBs and enterprises across a range of verticals for advanced security solutions as they embrace new business models and face heightened security concerns,” said Brent Duncan, Chief Revenue Officer at Interface Security Systems. “With our Virtual Security Guard solution, businesses can ensure employee and customer safety, reduce shrink, and lower insurance and guard costs.” Intrusion alarm monitoring The low-cost Virtual Security Guard package gives customers the flexibility to rapidly roll out a security solution Available immediately, the new low-cost Virtual Security Guard package includes intrusion alarm monitoring, interactive live video and two-way audio monitoring, up to eight video cameras, and one audio zone. Every alarm will be verified with live audio and video to reduce false alarms. Businesses have the option to leverage their existing security cameras and network connectivity infrastructure to make the solution even more cost-effective and easy to implement. The low-cost Virtual Security Guard package gives customers the flexibility to rapidly roll out a security solution and then graduate to a more advanced version of the service based on threat levels or to accommodate business expansion. Video monitoring solutions Enhanced services include remote guard tours, scheduled announcements, and operational compliance audits. Customers can also upgrade to a full suite of interactive video monitoring solutions that come with extensive video camera coverage, multiple audio zones, on-demand security escorts, and smart personal safety devices. Businesses interested in exploring the Virtual Security Guard service can take advantage of a complimentary security risk assessment that includes a free site survey for a limited time.
IP audio and control innovator Barix is bringing its IP paging and intercom expertise to large broadcast and emergency response networks with RackBox, a universal cloud-based, any-to-all platform for widespread delivery of critical messages. Initially custom-developed for a large national US TV broadcaster, Barix has now productized RackBox to serve a broader set of paging and intercom needs inside and outside the broadcast industry. In addition to TV and radio networks, RackBox is ideal for professional alarm and notification applications over military, emergency response and business networks that serve many locations. RackBox’s single-button user interface enables immediate delivery of important messages to all stations over local and wide-area networks — “push to talk” in its purest form. Transmitter and receiver RackBox systems are infinitely scalable, with each device programmable as a transmitter, receiver, or both. Using independent, ultra-reliable Barix AudioSpread devices, the system replicates the live stream globally to receivers anywhere without depending on multicast or complicated configurations. An optional management portal supports real-time monitoring and central configuration. RackBox’s robust hardware ensures constant availability, assisted by redundant power connections, and the system layout can be set up using dual-network paths while seamlessly integrating with an organization’s central IT infrastructure. Its limited bandwidth requirements, low latency, and standards compliance make the RackBox system ideal for use on existing IT infrastructure. Remote monitoring and cloud “RackBox represents our latest advances in cloud-based replication and remote monitoring technology to serve a broad variety of universal communication requirements,” said Johannes Rietschel, CTO and Founder, Barix. “As one of the first vendors to innovate paging and intercom solutions for use on IP networks nearly 20 years ago, Barix brings reliable emergency communications over the network to a global scale with RackBox, along with the cost-savings that come from transitioning to IP from satellite for widespread communications.” The transition from satellite-based communications has been especially appealing to broadcasters who have been using similar satellite-based systems for decades. RackBox allows broadcasters to quickly communicate critical information, breaking news, and operational info across its complete network of stations, using available, low-cost IP networks. Critical Communication RackBox provides the same value and benefits for emergency messaging over fire and police networks, and also allows communicating critical messages across enterprise networks. Rietschel cites banking networks that want to quickly communicate important financial and stock market updates as one application of interest within the enterprise business community. The 19-inch 1U RackBox integrates Barix’s IPAM400 IP Audio module at its core, with support for multiple audio formats, interfaces, and IP-based streaming and control. The Linux-based programmable module adopts the latest standards, allowing users to comfortably operate RackBox on standard IP networks as well as the public Internet.
Calipsa and Immix are bringing their proven AI Video Alarm Verification solution to central alarm monitoring stations in the Americas. The news follows the successful launch of the solution, known as AI Link, in Europe, Middle East and Africa (EMEA) and the Asia Pacific region (APAC) in May 2020. The integration, which will be available starting September 1, will allow Immix customers to add Calipsa’s False Alarm Filtering technology to their cameras directly via the AI Link feature in Immix Central Station (CS) and Guard Force (GF). The news that Immix will make this integration available to customers in the Americas is a significant development in the partnership between Immix, a global provider in central alarm monitoring station software, and Calipsa, a deep learning technology company who provide a solution for False Alarm Filtering. Following the launch of AI Link False Alarm Filtering to the Americas, the integration will be active for all central alarm monitoring stations globally. Integration of two technologies For existing customers of both Immix and Calipsa, the integration will lead to significant savings in both time and resources The AI Link integration provides improved usability for Immix and Calipsa users by streamlining the way the two technologies work together. Where previously set-up and management was required on both platforms to connect Immix and Calipsa, the new integration will allow for Calipsa’s False Alarm Filtering analytics to be added to cameras directly in Immix CS/GF - with a simple click of a button. Users no longer need to use both platforms to manage their cameras, and can enjoy the benefits of Calipsa’s False Alarm Filtering via their Immix CS/GF account. For existing customers of both Immix and Calipsa, the integration will lead to significant savings in both time and resources as users will now have the option to instantly enable Calipsa analytics on any new or existing device. In addition to improving the operational efficiency for existing Calipsa customers using Immix, the integration will give all Immix customers the opportunity to easily access Calipsa’s cutting-edge False Alarm Filtering Filtering analytics. Reduced nuisance alarms As Calipsa has been proven to reduce false alarms by over 90%, Immix customers who implement the solution will significantly reduce the time spent reviewing nuisance alarms. As a result, there will be more time to review genuine alerts, quicker response times to incidents and more efficient monitoring operation. Monitoring centers This is a quick and easy way for monitoring centers to raise their margins and be more effective" "We are excited to expand our integration with Calipsa through AI-Link to bring this ground-breaking solution to the global market,” said Chris Brown, Immix CEO. “The challenges faced by central monitoring stations have always been managing signal traffic and properly allocating resources, and we feel that this AI Verification solution meets those challenges head-on, enabling video-based monitoring centers to realize significant cost savings while eliminating the “noise” from video monitoring. This is a quick and easy way for monitoring centers to raise their margins and be more effective while only having to focus on true, actionable events. We are seeing the solution deliver meaningful false alarm reduction in our European clients and happy to now see this solution offered in the Americas.” Central alarm monitoring Brian Baker, Vice President of the Americas at Calipsa adds, “We are pleased to be able to offer our AI Link integration with Immix to customers in the Americas. Since launching to the rest of the world earlier this year, we have been overwhelmed by positive feedback from central alarm monitoring stations who have reaped the benefits, so we look forward to bringing the same efficiencies to the US market. We are also delighted to be expanding our relationship with Immix, a partner who shares our core values and beliefs, and look forward to a successful future of collaboration with them.”
Synectics announced that it has received LenelS2 factory certification and joined the LenelS2 OpenAccess Alliance Program (OAAP). Synectics' command and control platform, Synergy 3, interfaces with the OnGuard® access control system, allowing customers to fully benefit from the respective feature sets with ease and peace of mind. "Synectics has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system," said John Marchioli, OAAP Product Management, LenelS2. "We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program." Access control system Through the LenelS2 OnGuard access control system, Synergy 3 users can view current hardware status, open doors, set reader modes, control access alarms, activate/deactivate pulse outputs, and detect risk indicators such as forced or held doors, tampering, and equipment failures. David Lowe, Director of Business Strategy, Synectics, said, "As a business committed to open-architecture design, it is our responsibility to work with leading solutions providers to ensure compatibility. It means our customers have greater freedom and flexibility when selecting their security and site management system.” “Achieving OnGuard system certification for versions 7.5, and 7.6 reflects this commitment, delivers value for Synergy 3 users, and has cemented a business relationship we hope to nurture through our membership in the LenelS2 OpenAccess Alliance Program.” Overseeing access control functionality “The interface between Synergy 3 and the OnGuard application creates a unified experience for customers to manage their security needs. Control room operators can oversee the access control functionality directly from their Synergy 3 window, simplifying investigations and access control operations by tying together entry and alarm data directly with the associated video to aid visual verification," continued Sreenath Namelil, Product Manager – Integrations, Synectics. Synergy 3 is an enterprise-class, flexible, open-architecture platform that enables alarms and events, security and process control sub-systems, video, and data to be monitored, managed, and recorded from a single unified interface. Designed with ease of use in mind, Synergy 3 supports a wide range of integrations to the world's safety, security and operational systems.
Senstar, a world provider in perimeter intrusion detection systems (PIDS) and video management software (VMS) announced its systems are now successfully integrated with Genetec’s Security Center via Senstar’s Network Manager software. Network Manager provides the common software interface for monitoring and controlling Senstar perimeter sensors from VMS, SMS, and PSIM systems, and functions as a data server, which collects and distributes alarm point and control point status. Alarm monitoring screens Using Network Manager as the sensor interface, the Security Center integration allows sensor zone alarms to be monitored from the Security Center map and alarm monitoring screens, provides the means to trigger Security Center event-to-action programming, and supports arming/disarming individual zone alarms. Full sensor health status is displayed in Security Center and the ability to trigger sensor actions such as relay closures through Security Center event-to-action programming is supported. Intrusion detection systems “This integration allows users to optimally combine Senstar’s industry-leading perimeter intrusion detection systems with Genetec’s Security Center platform to provide unified management of their complete security environment,” said Senstar Product Manager Stewart Dewar. “This is a deep integration that enables users to take full advantage of all the features of Senstar intrusion detection systems from within the Security Center environment.” Senstar sensors supported by the integration include OmniTrax® buried cable sensor, Senstar LM100™ hybrid perimeter intrusion detection and intelligent lighting system, FlexZone® fence sensor, FiberPatrol® FP1150 and FP400 fiber optic fence sensors, UltraWave™ microwave sensor, XField® electrostatic sensor, and UltraLink™ input and output modules.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
icetana, globally renowned Australia-based intelligent video surveillance solutions company, is pleased to announce its first purchase orders for the US correctional services market, after two new 5-year client orders were confirmed with hardware systems vendor, Rasilient Systems, Inc. The order includes supplying icetana’s video analytics solution to two US correctional facilities (prisons). video analytics solution The orders are significant as they represent icetana’s first US prison customers and a geographic expansion of the correctional services vertical market sector, beyond the company’s already existing Australian based prison management clients. The US prisons market (US correctional facilities) is one of the largest in the world and the state authority is known as a pioneering operator in the US, providing an excellent reference opportunity for the companies, Rasilient Systems, Inc. and icetana. Total camera footprint of the state prisons This deployment represents a small subset of the total camera footprint of the state prisons This deployment represents a small subset of the total camera footprint of the state prisons operated by this end-customer, with the potential to extend coverage over time to additional sites with this customer and to other correctional services clients in the US. Chief Executive Officer (CEO) and Managing Director at icerana, Matthew Macfarlane said, “I am very pleased with the progress of this opportunity despite the challenging market conditions being experienced globally.” Motion intelligence platform Matthew adds, “This is a significant opportunity for icetana to demonstrate its full capabilities of our motion intelligence platform to a new geographic market and potentially expand into a larger subset of the customer prisons.” The purchase orders for the US correctional facilities have a combined value of US$ 100,000 (AUD$ 137,000), inclusive of 5 years of support and maintenance.
Dahua Technology – one of the pioneer video technology companies – has entered into a six-figure sponsorship deal with Celtic FC, supplying the club with state of the art video-based technology and equipment. Under the sponsorship deal, Dahua is supplying video walls for locations such as the Celtic Store and Media Center at Celtic Park, high-tech quad-rotor drones to help with player training and development, and electronic whiteboards to be used for staff training, as well as meetings and presentations for staff and visitors. Highly visible aspects As part of the new partnership, Dahua will be appearing across a range of Club assets, on LED pitch-side banners, and on the club’s website and match programs. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland “We are thrilled about our sponsorship of Celtic FC,” said Michael Lawrence, Marketing Director at Dahua Technology UK & Ireland. “As well as the highly visible aspects of the sponsorship, this deal represents a real partnership between Celtic FC and Dahua, and is an example of our engagement with communities across the UK and Ireland.” High quality technology Commenting on the deal, Cheng Zeng, Business Development Manager for China and Asia at Celtic FC said: “We are delighted to launch this partnership today with Dahua Technology. Their expertise and high quality technology will enhance both fan experience in our stores and business operations as a whole. We hope to work with Dahua long into the future.” As well as the equipment supplied to Celtic FC, Dahua Technology manufactures a range of innovative and technically advanced video equipment. These include TiOC, a three-in-one camera that integrates 24/7 full-color monitoring, active deterrence and Artificial Intelligence into one smart unit; WizSense, a series of products and solutions that utilize Artificial Intelligence and deep learning algorithms; and its Starlight range of low-light video technology.
Custom Consoles announces the completion and delivery of Steelbase Lite desks and a MediaWall video monitor display mounting system for the Agricultural Development Bank of Ghana (ADB). Commissioned by Virtual InfoSec Africa, the new installation is situated at ADB's headquarters in Ghana's capital city, Accra. "We were looking for a production partner with a good understanding of video technology, able to produce robustly built and ergonomically efficient control room furniture," says Bondzie Acquah, VP Operations at Virtual Infosec Africa. “With its long experience of the security business and proven ability to meet the demands of heavy industry, Custom Consoles was the logical choice both for the desks and the display mounts. Based on SteelBase Lite and MediaWall, we were able to integrate a complete system into a compact 8 by 5-meter room while at the same time ensuring that all staff could function safely and effectively. Computer equipment is housed in ventilated desk frames with easy front and rear access via black-finished lockable doors for routine technical maintenance." Video display screens Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use by up to four operators. Two 24-inch video display screens are mounted in front of each work position on individually adjustable support arms. The desk is located 70 centimeters forward of a 5.2-meter wide MediaWall giving a clear view of eight 55-inch Samsung video display screens mounted in a four wide by two high configuration. Front to back depth of the MediaWall is just 50 centimeters. The second desk is a single-bay dual-screen unit measuring 1.5 meters wide by 1-meter front-to-back. This is configured for use by a supervisor. Both desks are finished in rust-colored Marmoleum with black PVC edging and silver anodized aluminum legs. The supervisor's desk faces a 76-centimeter high printer support unit with a 60 by 60-centimeter top surface, height-adjustable shelf and integral cable tray. Control room consoles "SteelBase, SteelBase Lite and MediaWall continue to be in strong demand for a very wide range of process control, security and corporate applications," says Custom Consoles' Sales Manager Gary Fuller. "We are very pleased to have worked with Virtual InfoSec Africa on this project and look forward to partnering with them in the future." A variant of Custom Consoles' long-established SteelBase series, SteelBase-Lite is a compact structured desking system which can be configured from 1.2-meter wide powder-coated modules and Marmoleum finished work surfaces, providing a self-assembly hard-wearing ergonomic solution for control room consoles. Panels and ventilation SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams. Additional design features of the SteelBase Lite range include hinged removable access doors, 19-inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. All elements of SteelBase and SteelBase Lite are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO 9241 part 5, ISO 11064 Part 4 and EN 527 Parts 1, 2 and 3. MediaWall monitor displays First announced in 2006, Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. MediaWall can be used as a fully self-supporting structure or coupled directly to the studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths.
Co-op, a large consumer co-operative in the UK and one of the largest retailers in the country, is rolling out an integrated body-worn video solution from Motorola Solutions to front-line colleagues, with a focus on further increasing safety in-store against a background of rising retail crime in the industry. The Co-op has seen in-store crime increase by more than 140% year-on-year, despite communities recognizing the critical role played by retail workers in society - true frontline workers in the days of a global pandemic. The number of violent incidents also hit record levels with 1,350 attacks having been experienced by Co-op shop workers in the first six months of 2020. Keeping colleagues safe The retailer warns of a crime and violence epidemic and its targeted deployment of a body-worn video solution forms part of an ongoing commitment to invest a further £70M over the next three years in innovative technology to keep colleagues safe. Co-op will equip front-line staff with more than 1,000 Motorola Solutions VT100 body-worn cameras in around 250 stores initially, with the ability to stream video in real-time to the Security Operations Center of Co-op security partner, Mitie. The footage is used to identify criminals and provide evidence to secure prosecution. The VT100 body-worn camera from Motorola Solutions can be worn in standby mode for up to six months, preserving battery for instances when Co-op store colleagues feel threatened by aggressive or violent behavior. The cameras are operated by a simple one-push activation, instantly recording footage to the camera itself, and streaming live video to the security operations center, allowing for a quick response from security personnel or police. Cloud-based software The cameras are supported by cloud-hosted VideoManager software The cameras are supported by cloud-hosted VideoManager software, which enables secure and efficient camera allocation, user administration and incident management. With security features such as comprehensive audit-trails, encryption, configurable retention policies and RFID camera allocation, this integrated solution ensures footage and incidents are dealt with efficiently and securely. As part of its Safer Colleagues, Safer Communities campaign, Co-op is also building awareness and support for MP Alex Norris’ “Assault on Shop Workers Bill” which has now seen its second reading in Parliament postponed until September. The Bill states that because shop workers have responsibilities to uphold the law on age-restricted products they should be afforded greater protection in carrying out those public duties. Retail crime A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack In its 2020 Crime Report, the Association of Convenience Stores (ACS) found that a quarter of violent incidents resulted in injury, with a weapon used in almost 20% of occurrences. A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack or threaten shop workers. In 2019, Co-op funded research into retail crime, with the hard-hitting findings reporting that shop workers were showing signs of Post-Traumatic Stress Disorder (PTSD). Co-op has committed a further £70M over the next three years in innovative technology to keep colleagues safer, it has introduced SmartWater Fog Cannons, the latest remote monitored iCCTV, body cameras and, communication headsets for all frontline colleagues. Protection for shop workers Cheryl Houghton, Co-op Retail Security Manager, said, “Shop workers play an essential role serving communities, yet they have to contend with unprecedented levels of violence and abuse on a daily basis. As a community retailer we see the impact of social issues in our stores. I have never seen such high levels of violence and abuse, it’s a societal issue that all retailers are concerned about and it’s having lasting effects on the lives of shop workers - both mentally and physically. It is not part of the job to be verbally abused, threatened or attacked and we’re determined to make sure it isn’t. Calling for greater protection for shop workers carrying out public duties and for the root causes of crime in communities to be addressed.” Body-worn videos in commercial organizations Richie McBride, Director of Business Operations, Video & Analytics at Motorola Solutions UK, said, “Body-worn video is becoming a critical element in commercial organizations’ strategy to keep their employees safe. As a company focused on mission-critical solutions, we provide our commercial customers with the right tools to help them enhance their operational efficiency, responsiveness and safety. We are proud to partner with one of the UK’s largest retailers in its work to further improve the shopping experience and enhance safety for both shoppers and staff,”
Marian University is a school with a mission. Having transitioned from a liberal arts college to a comprehensive university in 2009, it has become one of the private education institutions in Indiana. And that’s not all: the university has ambitious goals to grow its programs and broaden its mandate even further. Currently, the school has over 500 staff members and more than 3,500 students from across the United States and around the world. And by 2025, it aims to double its number of annual graduates. Located just ten minutes away from downtown Indianapolis, Marian University’s close proximity to a major center of American business, finance and culture is a major selling point. Managing increased traffic The city is also experiencing an influx of technology companies, making it the fifth-fastest growing municipality in the country for high-tech jobs. However, as in many booming regions, economic success isn’t evenly distributed. While some areas have experienced revitalization, others have seen social unrest and rising crime rates. As such, while Marian University’s campus has the privilege of sitting near a bustling city, these challenges aren’t far away. That fact — along with the increasing number of staff and students on the premises — motivated the university to upgrade their security systems to help keep both its people and the wider community safe. Marian University’s previous security system wasn’t up to the task of monitoring the premises, staff and students — so how would it manage increased traffic and additional properties as the school met its growth targets? High definition cameras ACC™ software is much more than a centralized source from which to review recorded video The ongoing maintenance and licensing costs were also prohibitive. Administrators were at a loss of what to do until the security integrator they were working with suggested Avigilon. With high definition cameras and built-in analytics that seamlessly integrated with Avigilon Control Center (ACC) video management software, it offered a comprehensive, intelligent and scalable solution. Additionally, the licensing fee was a one-time cost, saving the school both time and money. As the security team at Marian University found out, ACC™ software is much more than a centralized source from which to review recorded video. Not only can security operators analyze the video by zooming in and rewinding in real-time, but Avigilon Appearance Search™ technology leverages AI technology to help them instantly locate specific individuals and vehicles of interest. Advanced video analytics Furthermore, Unusual Motion Detection (UMD) technology uses advanced video analytics to flag events that may require further investigation and filter them in the recorded video timeline, allowing security operators to find and review these instances faster. All of this was made possible with the installation of intelligent Avigilon cameras and network video recorders (NVR) across the campus. “The organization is tremendous to work with,” says Ray Stanley, CIO/Vice President of Marian University. “I have never worked with a security company where I've been able to pick up the phone and have someone to help solve issues and make sure we are using the product the right way so that we see good value for our money. This was true not just in the beginning, their support exists right to this day.” Intelligent security system Avigilon coordinates with local third-party integrators to make sure the system is functioning Instead of sending Marian University setup instructions and leaving the security and IT teams to figure it out for themselves, Avigilon coordinates with local third-party integrators to make sure the system is functioning and actively helps operators learn how to utilize it to its full potential. Personnel will come onsite to work with staff and guarantee they know how to get the most from their various video analytics platforms and solutions. The main buildings at Marian University may be surrounded by quiet woodlands and wetlands, but the campus isn’t as isolated as it appears. Being a mere ten minutes away from the middle of Indianapolis, the school’s property borders several roadways, businesses and residential neighborhoods that all benefit from having an intelligent security system in the vicinity. Keeping the community safe “The great quality video has helped keep the community safe, without a doubt,” says Ray Stanley, CIO/Vice President of Marian University. “In one case, local police were able to identify a suspect involved in an incident at a nearby gas station because of our Avigilon system. Being able to help our surrounding community stay safe is absolutely an added benefit for us.” With its Avigilon solution, the Marian University campus has become an extra set of eyes for law enforcement. UMD and Avigilon Appearance Search technologies mean that criminals who make the mistake of moving across campus have a much higher chance of being detected by the authorities who can then quickly track their route to see where they have been and where they are headed. Potentially-Dangerous behavior It enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis With its user-friendly interface and high-quality video, the security installation not only helps with police work and prosecution, but it enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis, creating a safer environment for students and staff. "For example, we were able to see a suspect driving at a high rate of speed across campus, and with Appearance Search, we were able to see where the vehicle went and identify the suspect,” says Chief Richard Robertson, Marian University Police Department. “That helped us to save a lot of trouble and potential injuries.” Protecting local communities In the United States, Indianapolis looms large not only as the crossroads of the country — two-thirds of Americans can drive to the city in ten hours or less — but also as a hub of innovation and investment. However, safety continues to be a top-of-mind issue as crime increases in certain sections of the city. This is why Marian University chose Avigilon: as the school aims to provide a safe space for students and prepare them for the many opportunities Indianapolis has to offer, there’s also a deep-seated obligation to help protect local communities and public spaces. Avigilon allows it to do both — and even better, the solution will be able to scale with the university as it evolves and expands in the years ahead.
Commenced in 2016, the large business club was built with smart infrastructure and modern amenities, in the futuristic town of Kolkata, to provide leisure-cum-business conducive atmosphere to their members and visitors. The contemporary building of business club is spread over 10 acres area and serves as a cultural, commercial, and business hub in the region. Having a beautiful landscape, it attained tremendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business center to name a few. Missing real-time video surveillance With a consistently large volume of patrons visiting the business club for various events, security is the vital component of the successful operations at the site. The customer has been relying heavily on analog video surveillance to secure its facilities and workforce. Due to its limited scalability, there was no way to do real-time surveillance throughout the premises. Moreover, every incident recorded by the video cameras required time-consuming manual investigation, therefore, causing delay in decision-making. Aiming to advancing the surveillance solution, the customer wanted to make an investment to maintain a watchful eye, manage threats/incidents proactively along with integrate existing and new system into the unified interface. Videonetics Unified Video Computing Platform Intelligent Video Analytics (IVA) is helping operators to detect vehicles wrongly parked in ‘restricted’ or ‘no parking’ zones After a thorough evaluation of various solution offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Platform (UVCP™) that blends Intelligent Video Management Software (VMS), Intelligent Video Analytics and seamless integration of existing analog system into one user-friendly solution, able to grow effortlessly with customers’ need over time. Incident response management Videonetics Intelligent VMS is managing 100+ cameras including PTZ network camera, dome cameras, fixed cameras, and bullet cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 legacy analog cameras are also integrated into the unified solution, eventually providing centralized control of the cameras to the security operators. The in-built failover and redundancy features of Intelligent VMS ensure the operators to always have access to live and recorded video. This means if any incident occurs, they can always have evidence of it. Zero Blind Spot at Entrance The Intelligent Video Analytics (IVA) is helping operators to detect vehicles which are wrongly parked in ‘restricted’ or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ camera tracking helps in detecting unusual behavior of the person and provides alert to security operators for faster action. At the entrance, face capture has been installed to detect a person in the scene and locates his/her face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track and record license plates of vehicles along with time and date, entering the premise. Zone monitoring Operators will be notified if a person stays beyond a certain duration in a user-marked zoneThe business club needed a solution that could help it identify theft, intrusion and trespassing throughout its facilities. In the first phase of the project, Videonetics along with stakeholders of business club and system integrator identified sensitive areas, that requiring immediate security system. To monitor suspicious activities, zone monitoring has been enabled at the fence of tennis court, lawn, emergency gates and open field area. Operators will be notified if a person stays beyond a certain duration in a user-marked zone. To combat unauthorized entry in generator room, operators gets alert if any intrusion happens in a marked area. Similarly, unusual activities are also being monitored in this area through loitering detection. Trespassing detection Operators can handle alarms and manage events, reducing manual checks of cases and helping to expedite investigationsAt the peripheries of the business club, trespassing detection has been deployed to detect if any person intrudes into a premise. The system is well capable to trace trajectory of the trespasser and prevent incident before it occurs. The authorities wanted to have alert in case any mob formation happens at the field area, known as forbidden region, of the club. Crowd formation detection has been deployed that estimates density of people in a scene and generated an alert as soon as the density in any defined area crosses a certain limit. Empowering with Cellphone application The ease of use of Videonetics unified solution has been instrumental to the business club. The operators and senior authorities are efficiently accessing videos anytime and anywhere, thru an intuitive interface of IVMS web and cellphone applications. At the time of incidents, operators can handle alarms and manage events, therefore, reducing manual checks of cases and helping to expedite investigations. After various phases of implementation, installation, and testing, the Videonetics unified solution went into live operation. Since upgrading to Videonetics unified solution, the business club has been able to better handle incidents of thefts/intrusion and apprehend suspects. Therefore, the level of security has been lifted by allowing the early detection of incidents and monitoring the premises round-the-clock, even in the harsh environmental condition. Furthermore, the added layer of security has been significant in business club’s efforts to attract more members and sustain business relations with existing members. Detecting patterns Now the operators use the information being collected in the unified interface to better understand the environment. They are successfully detecting patterns on how visitors/members access and move through the club. Thus, using these insights to develop strategies that maximize the use of space and keeps everyone safe. The open architecture of Videonetics unified solution allows customer to integrate with third-party systems such as access control, emergency system and much more. “To go from conventional to a professional and scalable surveillance system was a huge improvement for our client. It has enhanced our client’s reputation for providing safe and secure environment to visitors, employees, and members. Commendation to Videonetics for providing their unified video computing platform that empowered security operators by improving their efficiency in monitoring the premise and handling threats swiftly. I deeply appreciate their dedication and untiring efforts for making it a reality”, said Gaurav Das, Director, Webdesk Technologies Private Limited.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?