Doug Dickerson has joined Razberi Technologies as CEO to propel its growth in the video surveillance security arena. He brings more than 25 years of technology industry experience to the role. Founder and former CEO Tom Galvin has been appointed chief product officer to spearhead continued development of the technology he originally invented. “I’m excited to be joining Razberi at this opportune time, because we see in the news every day the importance of securing our digital and phy...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
Moxa Inc., a provider of industrial communications and networking, and Trend Micro Incorporated, a provider cybersecurity solutions, announce they have executed a letter of intent relating to the formation of a joint-venture corporation-TXOne Networks, which will focus on the security needs present in the Industrial Internet of Things (IIoT) environments, including smart manufacturing, smart city, smart energy and more. Historically, Information Technology (IT) and Operations Technology (OT) ha...
Shaking hands, exchanging business cards, and making meaningful business connections with exhibitors were 8,420 trade visitors from both government and commercial sectors who roamed across 7,000 sqm of exhibition space at the Bangkok International Convention and Exhibition Center. “Smart city was an overarching theme at this 6th edition of the fair,” said Ms Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Limited. “This, together with three concur...
ISS, Intelligent Security Systems, global provider of intelligent VMS and analytics, is showcasing two highly specialized analytics solutions for vehicle surveillance and law enforcement applications at ISC East 2018 (booth #527). Natively developed and designed to seamlessly integrate with ISS’ SecurOS v10 platform, SecurOS UVSS (Under Vehicle Surveillance System) combines advanced software and hardware for remote under-vehicle surveillance. Furthermore, the ISS SecurOS Motus is an IP-cam...
FLIR Systems, Inc. has announced FLIR TruWITNESS, an industry-first wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. FLIR TruWITNESS Wearable Sensor Platform TruWITNESS is designed for any public safety organization that requires on-scene, real-time...
Hikvision’s PanoVu products are essential components of solutions in retail, hospitality, transportation and education Hikvision USA Inc., global supplier of security equipment and solutions, will provide training and demos of its multi-sensor camera technology at ISC East 2018, slated to take place at the Jacob Javits Center in New York City on Nov. 14 and 15. Product Showcase And Training Session Hikvision will exhibit from Booth 324 on the show floor on both the days. In addition to multi-sensor cameras, Hikvision will also showcase access control and intercom solutions. On Wednesday, Nov. 14, from 11:30 a.m. to 12:30 p.m. in Room 1A23, Hikvision will offer a free training session: ‘PanoVu Overview: Innovative Systems for Retail, Education, Hospitality and more’. "Ideal for retail, hospitality, transportation and education applications, Hikvision's PanoVu products offer multi-camera technology in one easy-to-install device," said Eric Chen, general manager, Hikvision North America. "We're excited to discuss and demo this key technology for integrators and end users at ISC East this year." Hikvision PanoVu Cameras Product Line Hikvision provides a wide variety of PanoVu products to meet every installer's needs: Everything from 180- and 360-degree view in a stitched image from multiple cameras, to cameras with adjustable gimbals for optimal views. A wide selection of cameras is available for both indoor applications or outdoor, longer-range viewing. Common applications include warehouses, large open spaces, lobbies, city centers, park entertainment venues, and harbors.
Pivot3, the hyperconverged infrastructure (HCI) performance and technology pioneer, announced that it experienced more than 50-percent growth in bookings in Q1-Q3 2018 over the same period in 2017, with significant growth among large enterprises and complex, mission-critical use cases. With IT requiring automation and intelligence to manage increasingly complex workloads and multi-cloud environments, Pivot3 saw high demand for its Hybrid Cloud solutions. Pivot3 also experienced continued expansion with Internet of Things use cases, particularly with Smart and Safe City initiatives. “Q3 2018 was remarkable for Pivot3, from our growth in sales and introduction of new products to the announcement of our global strategic partnership with Lenovo,” said Ron Nash, CEO, Pivot3. “Enterprises are demanding more from IT, and our growth indicates that the market is increasingly aware of Pivot3 and the power of our Intelligence Engine to simplify management at scale as well as deliver the security and resilience needed to support mission-critical workloads.” Continued adoption of its Hybrid Cloud solutions, representing more than 60 percent of new sales in Q3Pivot3’s Developments In Q3 2018: More than 50-percent growth in bookings in Q1-Q3 2018 compared to the same period in 2017, with 86 percent of new bookings in Q3 comprising large enterprises. A 95-percent increase in average deal size in Q3 2018 over the 2017 average. Nearly 65 percent of 2018 sales to date have come from satisfied existing customers expanding their deployments to include multiple mixed workloads. Additionally, more than 70 percent of new customers deployed multiple mixed workloads on Pivot3’s platform, indicating that customers are increasingly – and repeatedly – relying on Pivot3’s Intelligence Engine to automate and manage multiple mission-critical applications on a single platform. Continued adoption of its Hybrid Cloud solutions, representing more than 60 percent of new sales in Q3. Named a Strong Performer in Hyperconverged Infrastructure in The Forrester Wave: Hyperconverged Infrastructure, Q3 2018. Pivot3 ranked within the top three vendors in the current offering category and achieved the highest scores possible for the criteria of built-in security, customer support options and quality of operations and support. Announced a global strategic partnership with Lenovo to develop, market and sell solutions optimized for mission-critical Smart City applications and use cases, both in the core data center and at the edge. Continued growth of mission-critical Smart City initiatives, including with the City of Bogotá, Colombia, which is deploying a highly-efficient Lenovo/Pivot3 solution to achieve maximum infrastructure efficiency and scale as its surveillance needs grow. Launched Intelligent Edge Command and Control, a new ruggedized and SWaP-optimized Hybrid Cloud solution to support sophisticated analytics, VDI and IoT use cases for defense, intelligence and other extreme operations at the ‘tactical edge’. Released a new large-scale IoT solution designed to support mission-critical deployments of 500TB or more with greater resilience, scale and ease of use, fundamentally altering the economic equation for customers in large IoT data capture scenarios. A diverse range of new customers, including numerous military and federal agencies as well as local governments, a nuclear research facility, multiple educational institutions, a large manufacturing organization and a major sports and entertainment complex. The top industry verticals represented in Q3 sales include government, logistics and transportation, energy and utilities, hospitality, and education. Certified its infrastructure solutions for mission-critical IoT, Safe Cities and Smart Building environments operating with Milestone Systems video management software. This allows organizations to gain access to infrastructure proven to deliver the performance, resilience and scale required in mission-critical environments. Advanced Resilience And Security The key to Pivot3’s differentiation in the HCI market lies in their Intelligence Engine, which delivers advanced resilience and security"“IT organizations need new levels of automation in their infrastructure to provide the resiliency, availability and low latency required to support rapidly expanding volumes of data and the proliferation of applications and business services,” said Mike Leone, Senior Analyst from Enterprise Strategy Group. “The key to Pivot3’s differentiation in the HCI market lies in their Intelligence Engine, which delivers advanced resilience and security, and automates manageability at scale for customers’ most demanding workloads.” “Pivot3 has led the industry in supporting mission-critical use cases where security, resilience and management simplicity are required at enterprise scale,” said Nash. “As customers turn to IT to solve their most pressing business challenges, automation, artificial intelligence and machine learning will become key drivers in enabling the next wave of enterprise-scale digital transformation. Pivot3 is positioned to support this evolution with a foundation of Hybrid Cloud and IoT solutions for the enterprise’s most critical environments.”
The Security Industry Association (SIA) has identified and announced the 2019 Security Megatrends – the foundation of SIA’s signature yearly report defining the major trends and forces at play in the global security industry. Forecasting of 2019’s top 10 Security Megatrends was based on survey data generated in September and October 2018 from top security industry business leaders, association leadership and key volunteers and speakers for the next Securing New Ground (SNG) – the security industry’s executive conference – taking place Oct. 25-26 in New York City. Modern Security Solutions By nearly 30 percentage points, industry leaders said cybersecurity’s impact on physical security solutions was the most impactful trend The Security Megatrends report is provided each year to SIA member companies and registered attendees of SNG. These trends – the top factors influencing both short- and long-term change in the global security industry – are expected to have sweeping impact on almost all businesses within the industry. As such, these Security Megatrends are an essential component of the thoughtful discussions at SNG, an annual conference attracting security industry business leaders, entrepreneurs, investors, industry visionaries and senior-level chief global security officers. Cybersecurity was identified in the 2019 report as the standout trend shaping the security industry. By nearly 30 percentage points, industry leaders said cybersecurity’s impact on physical security solutions was the most impactful trend they were expecting to face in 2019. A resounding number of respondents also called for artificial intelligence (AI) to be recognized as a megatrend, noting that AI is becoming vital to supporting the heightened volume of data produced by modern security solutions. Increases Responsiveness Other new Security Megatrends emerging for 2019 include workforce development, the emphasis on data privacy, advancements in digital identity and the integration of security into smart environments like smart buildings and smart cities. The 2019 Security Megatrends are: Cybersecurity Impact on Physical Security Internet of Things (IoT) and the Big Data Effect Cloud Computing Workforce Development AI Emphasis on Data Privacy Move to Service Models Security Integrated in Smart Environments Advanced Digital Identities Impact of Consumer Electronics Companies “Today, modern physical security solutions are comprised of IoT devices and sensors that generate high volumes of security data. Applying analytics and artificial intelligence systems makes this data more actionable and increases responsiveness for security systems users,” said SIA Chairman of the Board Scott Schafer. Noticeable Impact “Cybersecurity continues to be at the top of the list of the most important trends identified by security industry manufacturers, systems integrators, security practitioners, architects and engineers, and SIA will continue to address this trend over the next year and in the foreseeable future.” The forecast for 2019 also identifies other forces at play in the security industry that may have a noticeable impact on some or all businesses In addition to defining the latest Security Megatrends, the forecast for 2019 also identifies other forces at play in the security industry that may have a noticeable impact on some or all businesses, and the research identifies three potential areas of business disruption the security industry may face in 2019. Residential Security Market The official 2019 Security Megatrends report will be published in late November 2018 and available online for download and/or purchase. The 2018 Security Megatrends report is currently available to all members and non-members. Each year at SNG, senior-level industry leaders and financial partners gather, trends are spotted, connections are formed and minds are opened. In addition to highlighting these Security Megatrends, SNG 2018 will feature keynote remarks by Jerome Pickett, senior vice president and chief security officer at the National Basketball Association, and Valerie Thomas, executive information security consultant at Securicon, and panel discussions on topics like the shift from smart cities to conscious cities, harnessing cyber-physical security technologies and how the changing residential security market is staying nimble.
At IACP 2018, Genetec Inc., a technology provider of security, law enforcement, and analytics solutions will showcase a comprehensive portfolio of products designed to enable communities and law enforcement agencies to foster greater collaboration through technology and to build-out Strategic Decision Support Centers (SDSC) uniquely designed to meet local neighborhood requirements. “Genetec is working successfully with cities like Chicago to provide a powerful and accessible decision support system as the foundation of their SDSC strategies. Empowered by our technology it is now also for small metro areas to cost-effectively deploy an SDSC to target unique neighborhood challenges and investigations,” said Giovanni Gaccione, Law Enforcement Practice Lead at Genetec. “This new approach to edge-based policing, public safety and community service has yielded excellent results. Our law enforcement customers are seeing crime statistics fall and public trust in their policing improve.” Crime Reduction Strategies SDSC strategies are being actively rolled out by law enforcement agencies in cities around the world. The goal is to empower police leadership in both small and large metro areas to better direct resources and be more responsive to specific community needs. These localized decision support centers allow for the creation of targeted crime reduction strategies and improved investigations through data analysis, human intelligence and community input. IACP visitors will also be able to get hands-on demos of Genetec Citigraf, a public safety decision support system IACP visitors will also be able to get hands-on demos of Genetec Citigraf, a public safety decision support system, Genetec Clearance, a digital evidence management system, and find out how Genetec Community Connect is helping cities build ties between local public and private sectors. Public Safety Support System Genetec will demonstrate Genetec Citigraf, a public safety decision support system that unifies operations across city departments, disseminates timely information, and provides greater situational awareness. Citigraf is the foundation technology behind the SDSC approach to policing and features a powerful correlation and analytics engine that instantly detects and displays relevant information from disparate sources for officers and responders to act on; such as CAD (Computer Aided Dispatch) systems, CCTV footage, ALPR data, and RMS (Record Management Systems). It enables a fast ‘on-scene’ response with highly-accurate GIS location and visual information, ensuring officers and emergency responders can make safe and effective decisions for situations in progress. Digital Evidence Management System The amount of evidence available to investigators is increasing dramatically, supported by growth in surveillance systems, increased use of body-worn cameras and the omnipresence of smartphones. This helps public safety agencies solve crimes but presents new logistics and privacy challenges. To help address these challenges, Genetec has developed Genetec Clearance, a digital evidence management system that strengthens the cooperation between security departments, outside agencies, and the public. It speeds up investigations by allowing police officers, investigators and security managers to collect, manage, and share evidence from different sources. With Clearance, agencies can reach out to the general public and private businesses and involve them in crime-solving efforts With Clearance, agencies can reach out to the general public and private businesses and involve them in crime-solving efforts. It provides a new, simplified sharing process, which will be showcased for the first time at IACP. Investigators can now instantly create a link for the public to share relevant video and photos from their cell phones and surveillance systems with law enforcement agencies. This link and custom QR code can be shared using social media, traditional media, the web or on the news. Anyone can then easily upload videos, photos, and other evidence directly from their phones or PCs into Clearance for police officers, investigators and security managers to review and use as part of their investigation. Cloud-Based Video Monitoring At IACP, Genetec will also highlight Community Connect, an initiative designed to build safer communities through greater cooperation between public and private organizations. Community Connect connects law enforcement to privately owned cameras, connected to Stratocast or other third-party technology, from participating businesses and organizations throughout their city. This initiative helps cities create their own public-private partnership program with business owners, and work towards lowering crime, promoting economic growth and operating more efficiently, even with constrained budgets. Stratocast is a cloud-based video monitoring service from Genetec. Easy to deploy, it offers greater security through HD video surveillance and allows owners to keep an eye on their business from anywhere using their laptop, smartphone or tablet. As part of a city’s Community Connect program, business owners can connect their cameras to the city’s Genetec video surveillance network, expanding its reach and directly contributing to their neighborhood’s safety.
Edesix, a provider of Body Worn Camera (BWC) solutions, will showcase its new integrated security technology on the Genetec stand at Security Essen 2018, the world's most important trade fair for security in Germany. Edesix has an integrated technology partnership with Genetec which enables Edesix Body Worn Cameras, and associated VideoManager software, to integrate seamlessly with Genetec Security Center. This integration offers streamlined wearable security management, support and storage for city wide surveillance and law enforcement. Edesix VideoBadge And VideoTag BWC Edesix will be showcasing its camera streaming gateway software, called ONStream, at Security Essen 2018Users of Security Center will be able to automatically view live video and audio captured on an Edesix VideoBadge or VideoTag BWC. Features currently found within the Edesix solution, such as RFID touch-assign, video encryption and video offloading, will be accessible through the Genetec system, allowing for effective large-scale deployment and estate management. Edesix, global provider of Body Worn Cameras (BWC), will be showcasing its camera streaming gateway software, called ONStream, at Security Essen 2018, alongside the company's suite of wearable cameras, designed for markets such as police, security, retail and prison services. ONStream integrates Edesix's VideoManager platform with the existing Genetec Video Management Systems (VMS) for fixed IP camera networks. Cameras integrate seamlessly with VideoManager and Security Center, meaning captured footage can be instantly shared and viewed by security staff in one integrated picture. Seamless integrations "The Genetec open-architecture allows technology partners like Edesix to offer seamless integrations for its Body Worn Cameras with Security Center and Genetec Clearance—our collaborative investigation management system," said Georges Tannous, Director of Strategic Alliances, Genetec Inc. "Together, these technologies are helping law enforcement and security professionals capture, respond to, and manage video evidence and data (with privacy and encryption) which speeds up investigations. We invite all show attendees to request a demo on our stand during Security Essen 2018," added Tannous.
Axis Communications, Citilog and Genetec converge at ITS World Congress 2018 to showcase best-of-breed technology that is making roads safer, smarter and more sustainable Axis Communications, the market provider of network video technology, will be showcasing alongside Citilog and Genetec a best-of-breed traffic management solution to help ease congestion and identify traffic collisions in real-time at ITS World Congress 2018. The event, which takes place Copenhagen, is one of the most important in the transport industry, with major players presenting solutions that make our road networks and cities safer, smarter, and more sustainable. Utilizing Machine Learning Technology The combined traffic management system utilizes Citilog’s Automatic Incident Detection solution, which can identify incidents in real-time utilizing machine learning technology. The analytical software can recognize what is normal within a scene, so when an abnormal activity occurs, such as cars stopping suddenly or traffic coming to a standstill, an alert can be sent to the operator via unified mobility operations with Genetec Traffic Sense. Decisions can then be made in real-time to help manage an incident. This is made possible through Axis’ innovative range of network-connected cameras, which enable operators to review a scene in great detail. Daren Lang, Regional Manager, Business Development, Northern Europe at Axis Communications, states, “Our roads are getting busier, especially on motorways and in cities. As populations across Europe continue to rise, so too does the number of cars on our roads. This in turn leads to greater pollution, more accidents, and increased congestion on our networks. Identifying accidents, congestion, or illegally parked cars in real-time is crucial to help our transport systems run smoothly with less of an environmental impact, keeping road users safe and on the move.” One of the vital elements of this incident detection technology is the efficiency in detecting incidents and accidents quickly and reliably" Incident Detection Technology Axis, Citilog and Genetec are attending ITS World Congress 2018 between 17-21 September, Copenhagen. Eric Toffin, CEO at Citilog, states, “One of the vital elements of this incident detection technology is the efficiency in detecting incidents and accidents quickly and reliably, allowing traffic operators to manage incidents efficiently. An additional benefit is that you don’t have to deploy an entirely new infrastructure on a road network for this to work, which can be timely and extremely expensive. Instead, an existing video-surveillance infrastructure can be used with network cameras that support analytics on the edge. The technology can also be applied to a server-based system, so transport operators can breathe new life into and extend the lifespan of their existing technology.” Unifying Video With Traffic Management Christian C. Lemire, Team Lead, Intelligent Mobility Practice at Genetec, states, “Historically, video operators have monitored a large number of screens looking for anomalies in traffic flow, meaning often incidents were missed. Unifying video with traffic management, and turning this video data into smart data, means transport operators can retrieve additional value from their existing infrastructures. It’s more cost-effective and intelligent, meaning a safer and smarter journey for the road user.”
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting eventsThe IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis And Application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyze data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant Access To Connected Devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyze this data is of imperative importance. Real Time Data Storage Availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing Stored Data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilize surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
A deep native integration of Bosch cameras with software from ISS proactively catalyzes the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS SecurOS maximizes camera performance for license plate recognition, face recognition, and container / train carriages recognition. The cameras meet the performance needs for advanced analytics, ensuring the success of projects and saving time, resources, and cost. The partnership has delivered multi-thousand-camera safe city deployments, industrial analytics solutions, and systems for large-scale transport providers. The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each vehicle License Plate Capture The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each and every vehicle. Operations managers are accountable for efficient logistical flows and effective use of roads and parking lots. Knowing the ins and outs of the transport infrastructure and what’s going on at all times provides the knowledge required to ensure operations are running safely, efficiently and in compliance with the rules and laws. An important part of this comes from monitoring which vehicles are entering an area and ensuring they are allowed to be there. Capturing license plates of every vehicle moving in an area provides knowledge of traffic flows and usage patterns. Such a solution should also allow a customer to easily configure and manage monitoring preferences and permit easy data exchanges with other operational management systems and services to manage an infrastructure and logistics as a whole. Reliable License Plate Data Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments As transportation infrastructures are often operating around the clock, reliable vehicle identification data is required 24/7. This means that the cameras capturing this data should work in all lighting and weather conditions, for both slow- and fast-moving vehicles. Cameras must be built to produce usable images 24/7 in all weather conditions. For quality license plate recognition in both day and night, the cameras make use of supplementary infrared light. A special License Plate Recognition (LPR) mode, developed in collaboration with LPR software, delivers readable license plates even with glaring headlights and with fast moving vehicles. Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments. License Plate Capture solution The SecurOSTM AUTO system of ISS, when used with Bosch cameras, provides easy to deploy solutions for all of these requirements. It recognizes license plates from many countries, manages and matches white, hot and blacklists and notifies the operator either in the GUI or through a messaging interface to other management systems. Additionally, the system can be used and managed as a standalone or embedded in other management systems on the premises.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analyzing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analyzing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analyzing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video Transmission And Privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organizations to optimize how video data is transmitted depending on their particular needs. For example, while some applications may favor a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximize accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR For Physical Security Professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organization, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organization.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specializes in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting Video Surveillance Systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Hytera, a global provider of innovative Professional Mobile Radio (PMR) communications solutions, announces that it has signed contracts with Secretariat of Public Security of the State of Alagoas, Brazil to provide TETRA communications infrastructure as the expansion of the statewide mission critical communications network and four-year maintenance service. The total contracts value is around 6.5 million US dollars with the infrastructure contract around 1.3 million and the service contract around 5.2 million. “We are excited being chosen as the equipment and service provider of Alagoas’s statewide TETRA system. The state authority shows confidence in Hytera’s ability to deliver advanced and reliable public safety communications networks. For the expansion, we presented the latest development of TETRA technologies,” said John Zhou, the General Manager of Hytera Brazil. “The new contracts as a milestone for Hytera Brazil recognize us not only as a leading TETRA solution provider, but also a trusted service provider, and it is the embodiment of Hytera transformation globally.” In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas TETRA Communications Network In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas, who were modernising its communications systems to better serve the communities and prepare for the global soccer fiesta, the World Cup 2014. The newly signed equipment contract includes 31 sites with Hytera’s latest TETRA innovation, DIB R5 base station. It adopts a maintenance-free, space-saving design and can be installed on walls, antenna masts or in tunnels. Thanks to its low power consumption and passive cooling, it is ideal for use in areas where power supply is critical or where there is a need for battery-based, portable base station solutions. With the expansion of the TETRA network, different public safety forces such as police, firefighters and emergency response in the State of Alagoas will share the network to facilitate optimal cooperation when the situation requires, which is another big step forward by the local authorities to improve the security of the state.
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe. Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety “With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus. When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities. Aerial/Drone Surveillance He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.” Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying dronesToday, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann. Hoverfly’s LiveSky Systems Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
Ulaanbaatar is the capital and the largest city of Mongolia, with a population of over 1.3 million, which is almost half of the country's total population. Over the past decade, the number of vehicles in Ulaanbaatar has risen by more than 300,000. As the political and cultural center of Mongolia, the increasing number of inhabitants and vehicles within the city has caused a series of social, environmental, and transportation problems. Dahua’s sophisticated ITS (Intelligent Transportation System) solution has integrated advanced software and hardware including sensors, information and data processing and physical electronics and communication technologies to assist the transportation department of Ulaanbaatar, in enhancing the safety and efficiency of its transportation system. Intelligent Transportation System In recent years, the government of Ulaanbaatar has prioritized the improvement of traffic management and has identified the need of a cost-effective solution towards speeding, traffic light violations and other road safety related issues, to create a more secure environment for citizens. Due to the high-latitude geography of the city, this project is particularly demanding on the monitoring equipment withstanding harsh environments. Based on advanced intelligent algorithms, Dahua has provided the city with its cutting-edge ITS solution consisting of the ANPR (Automatic Number Plate Recognition) system for 28 main roads, the E-police system for 8 junctions, 2 mobile speed measurement systems as well as 15 high spot PTZ surveillance units. The project took only three months from the initial analysis of the client’s demands and solution design to, the final delivery, overcoming various tough issues along the way. The Dahua team worked in collaboration with a partner to customize a Mongolian license plate recognition algorithm ANPR System As there are no current systems for license plate recognition in Mongolia, the Dahua team worked in collaboration with a partner to customize a Mongolian license plate recognition algorithm. This was then integrated into Dahua’s traffic cameras, achieving a reliable recognition rate, much to the satisfaction of the client. Dahua’s traffic cameras installed at the significant main roads of the city, are able to function between a temperature of - 40 ℃ ~ + 80 ℃ and a 10%~90% humidity environment. The cameras will actively monitor and inspect each suspicious vehicle, and automatically capture their license plates in real time, sending out an automatic alert when blacklisted vehicles pass by. E-police Monitoring System The monitoring equipment set up at the eight junctions can help the Ulaanbaatar transportation authorities in making quick responses to traffic accidents that are caused by running red lights. When a violation occurs, the Dahua all-in-one capture camera takes a series of images of the vehicle’s license plate number, along with the status of the traffic signal and an aerial image of the scene as evidence. Afterwards, the DSS management and storage platform collects the data from each camera and distributes it to operators for further processing. The mobile speed measuring system detects vehicles that surpass the speed limit in all weather conditions Mobile Speed Measuring System The mobile speed measuring system detects vehicles that surpass the speed limit in all weather conditions. The system features an all-in-one design, making it easy to use and install at different locations at a moment’s notice. This portability allows traffic police to move the system to different places whenever necessary. It consists of an 8MP CCD camera with a multi-target tracking radar, allowing for an accurate instant speed measurement of each passing vehicle and crystal-clear imaging. The IR flash lamp also ensures excellent imaging capabilities even during the dark of night. Technical Security Training To better serve the client, Dahua’s team has provided the operators of the local transportation department, with relevant technical training and demonstrated to them, the installation and deployment of devices. Additionally, all three systems are unified on a single platform within the control center, further enabling the end user to more efficiently monitor and manage road safety. Dahua’s ITS solution facilitates road safety and keeps the traffic flowing smoothly, raising the safety awareness of drivers, resulting in a more pleasant journey for drivers. Advanced technologies such as LPR and fuzzy search, actively reduces manpower demands on the police force, while increasing the efficiency of current enforcement. Furthermore, Dahua’s solution has assisted the government of Ulaanbaatar to finance a sustainable, growing, and well-maintained system of security and safety.
The saying goes that “business is business,” but many experienced executives in this industry have come to learn that a few ounces of compassion and understanding can sometimes be both necessary and appreciated. Operations don't always go as planned; we know that uncontrollable, tragic incidents may occur, and we want to be sure we're there for our customers and partners when they need it the most. This time of need often presents itself during a significant crisis, such as the one Puerto Rico experienced and continues to face from the devastation of two major hurricanes in September 2017. Hurricane Maria, which made landfall on Sept. 20, and was considered a “catastrophic event,” brought intense rain and wind to the island for longer than 30 hours, leaving residents without power, communication and water. TimeQuest Reconfigures Access Control Solutions Vanderbilt dealer TimeQuest Technologies, located in San Juan, was forced to suspend active projects and focus all resources on recovery The destruction and damage to roads, communities and businesses changed the lives of almost everyone involved — with the inability to access supermarkets, banks and gas stations, daily tasks were severely interrupted, and so too were security activities. Vanderbilt dealer TimeQuest Technologies, located in San Juan, was forced to suspend active projects and focus all resources on recovery. With its customers' having lost everything and their buildings destroyed, TimeQuest Technologies Vice President Alberto Cupeles took his team to visit each in person, surveying the need for basic necessities and offering their assistance. As its customers started to begin construction in the aftermath, TimeQuest Technologies was forced to reconfigure and reconstruct its access control systems, software and solutions, while trying to adjust to a shift in electricity and combatting inconsistent power from day to day. Vanderbilt-TimeQuest Collaborate On Disaster Relief Having known Vanderbilt for more than 20 years, Cupeles was grateful for the trustworthy and sympathetic relationship that had developed over time, extending far beyond daily business operations. Both companies worked together to ensure overarching support and commitment to restoration, allowing TimeQuest Technologies to spend its time and effort where it was needed most. “The help we received helped not just our customers but also our families,” Cupeles said. “This wasn't just a business-only situation. There were people in the middle.” Collaborations in the security industry often run deeper than what's seen on the surface; when dealing with an unexpected occurrence, at the end of the day, providing comfort and consideration should always take precedence.
The historic village of Leybourne in Kent is situated closed to the M20 and benefits from easy access to London, the channel ports and the motorway network. It’s a village with a strong community feel and an attractive rural character, however good transport links can bring problems. Leybourne Parish Council was particularly concerned by the risk of crime coming in from outside the area and to protect the community from vandalism and anti-social behavior and wanted a video surveillance system capable of deterring wrong-doers. IDIS HD IP Video Surveillance Solution Leybourne already had limited public area surveillance, but the system used outdated analog technology that was proving costly to maintain and difficult to adapt to changing needs. Budget constraints also meant that data-streaming had to be capped and as a result video evidence was only being recorded part time. London-based integrator iC2 CCTV was consulted and asked to devise a solution that would extend coverage, improve image quality and guarantee no data loss – and all that had to be achieved within the parish council’s limited budget. A combination of 3-megapixel and 5-megapixel IDIS domes and bullet cameras gives significantly improved coverage and image detail For significantly upgraded coverage, but with the lowest total cost of ownership, iC2 CCTV recommended installing the latest IDIS technology on a 5GHz point-to-point wireless infrastructure. At the heart of the new system is a powerful 64-channel, full HD NVR recorder – model DR-8364D – which offers the important advantage of flexible H.265/H.264 dual codec performance. This feature allows recording in high-definition H.265 but viewing on a variety of older screens using H.2264, so it means existing display equipment can be retained. A combination of 3-megapixel and 5-megapixel IDIS domes and bullet cameras mounted on lamp-posts in key locations gives significantly improved coverage and image detail. IDIS Smart Failover and H.265 Technology Furthermore, IDIS Smart Failover provides the best guarantee against data loss: if Leybourne’s network connection is compromised for any reason, all recordings continue to be stored on SD cards within the cameras and are then automatically downloaded as soon as the connection is re-established. The IDIS technology together with the wireless network, installed over five weeks by iC2 CCTV without disrupting the village, gives Leybourne significantly improved protection without high ongoing costs. Unlike the old analog system, recordings are now easily searchable with time/date stamped footage and the high definition image quality is ideal for use in investigations and as evidence. IDIS Smart Failover ensures that uninterrupted evidence is always retained in the event of transmission failures, without the need for time-consuming manual data downloads from individual cameras. More cameras can now be easily added, or the location of cameras changed, as the need arises.
One of the UK’s largest video surveillance projects in recent years involving the deployment of 845 Wisenet cameras manufactured by Hanwha Techwin, is nearing completion. The video surveillance system, which is designed to play an important role in helping ensure the safe and reliable delivery of public transport across the West Midlands, is being used to monitor activity at over 50 railway stations, 11 bus stations, 3 Midland Metro park and ride sites, as well as the main Number 11 bus route around the City of Birmingham. Live and recorded images from all cameras are being monitored at an advanced control room, located in central Birmingham Wisenet HD IP camera integration The project which is targeted for completion in July 2018 has so far seen approximately 845 Wisenet cameras installed by Total Integrated Solutions Ltd. (TIS) on behalf of Transport for West Midlands which was set up by the West Midlands Combined Authority (WMCA) to co-ordinate investment needed to improve the region’s transport infrastructure. The remaining work includes the deployment of the latest generation of Wisenet high definition IP cameras at a number of car parks, together with significant camera upgrades in Walsall and Solihull, two of four Local Authority public space CCTV systems are already monitored by WMCA. Live and recorded images from all the cameras are being monitored at a £1.2M state-of-the-art control room located in central Birmingham. “Our approach to this very large, complex project was not simply one of agreeing to meet exacting KPI’s from a performance perspective,” said Eamonn Murphy, Coleshill based TIS’s key account manager. “We felt the route to success would be to adopt a more partnership type approach, where we were not only the provider of technical solutions but were also involved at a strategic level in identifying with Transport for West Midlands a pathway of system upgrade, improved efficiency, cost reduction, innovation and utilising latest technology such as video analytics to the best advantage.” TIS is assured seamless integration between Wisenet cameras and Veracity Coldstore ‘direct to storage’ solution Wisenet cameras & Veracity Coldstore solutions Transport for West Midlands evaluated cameras available from 9 different manufacturers. The subsequent decision to source all the cameras from Hanwha Techwin, (previously known as Samsung Techwin), was partly due to the price/performance ratio of its cameras, but there were two other important factors which were taken into consideration. Firstly, Hanwha Techwin has a close working relationship with its technology partner, Veracity. This meant TIS could be assured that there would be seamless integration between Wisenet cameras and the Veracity Coldstore ‘direct to storage’ solution. This negates the need for Network Video Recorders (NVRs) and thereby substantially reduces capital costs, as well as minimising setup and maintenance requirements. Open Platform cameras The Veracity Coldstore recording solution is unique in the linear way that data is written to the hard drives. Only 2 hard drives are spinning at any one time, meaning a significant reduction in power consumption, lower heat generation and greater longevity of the hard drives, reducing the overall cost of ownership. When drive failures do occur, the faulty drive can be swapped with a new drive allowing uninterrupted use. The second important factor was the capability of the Wisenet open platform cameras to accommodate a variety of edge-based analytics such as ANPR and heat mapping, should Transport for West Midlands wish to deploy these at some point in the future. Trials of the Wisenet People Counting application are currently being carried out. This utilises the analytics software developed by Facit Data Systems, another Hanwha Techwin technology partner. Wisenet SNP-6320H cameras are configured for the transmission of 25 images per second (ips) at 1080p resolution Intelligent Day/Night cameras A large percentage of the cameras installed are Wisenet SNP-6320H 2 Megapixel Full HD network PTZ dome cameras. In addition to being a true Day/Night camera which is able to capture high quality images in low light, the SNP-6320H’s powerful 32 x zoom capability enables operators to observe the close-up detail of any activity. Trials were conducted where the cameras were capped at 2 Mbps and configured for the transmission of 25 images per second (ips) at 1080p resolution. The performance at this low bandwidth level was impressive and further contributed to the selection of the Wisenet SNP-6320H, which are also equipped with intelligent auto-tracking capability to ensure a greater level of detail can be captured when no operator is present. Other Wisenet cameras deployed as part of the project include the SNV-6084R vandal-resistant IR dome and the SNB-6004 fixed camera, both of which are able to capture Full HD 2 Megapixel images. Video Surveillance Technology “Working on rail, Metro and bus station sites spread across the wider West Midlands area is a complex and challenging operation and the TIS team deserve recognition for its expertise and diligence,” said Mark Babington, Safety & Security Manager for Transport for West Midlands. Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment" “TIS’s engineers were qualified to the highest degree to support the latest video surveillance technology, as well as being experienced to cope with older legacy systems. Both were needed within the unique environment of a busy integrated transportation network which brings its own exceptional requirements of compliance with bespoke health and safety legislation.” “Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment in the West Midlands transport infrastructure.” Commenting on the success of the project, Bob (H.Y.) Hwang Ph.D., Managing Director, Hanwha Techwin Europe, said: “We greatly value the opportunity to have been involved in this project. It is a excellent example of the benefit of all stakeholders interacting with each other in partnership at an early stage of a project to ensure the most suitable products are specified and subsequently installed to the client’s satisfaction.”