Commercial security system
Johnson Controls has announced the release of the Innometriks Cheetah SE Bio High Assurance Smart Card Reader with fingerprint biometric matching. Seamless integration with PACS The Innometriks Cheetah SE Bio High Assurance Smart Card Reader’s advanced system and seamless architecture allow for efficient integration with a range of physical access control systems (PACS) with its secure and open-based OSDP protocol. With this update, enrollments are captured and stored in a central databa...
Renowned temperature monitoring expert, AMETEK Land, has launched a new human body temperature screening system to help prevent the spread of infectious diseases like COVID-19. Developed over 10 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance, scanning for elevated temperatures that could indicate infection. The VIRALERT 3 is the first of its kind, providing a camera and a temperature-controlled reference source on a single mo...
The ETSI Technical Committee on Cybersecurity (TC CYBER) unveils ETSI EN 303 645, a standard for cybersecurity in the Internet of Things that establishes a security baseline for internet connected consumer products and provides a basis for future IoT certification schemes. Based on the ETSI specification TS 103 645, EN 303 645 went through National Standards Organization comments and voting, engaging even more stakeholders in its development and ultimately strengthening the resulting standard....
Proxyclick, the globally renowned provider of enterprise visitor management software, has launched ‘Touchless Check-in’ to provide enterprises with a contactless check-in solution at the front desk for every step of the visitor journey. "Visibility into who is entering or leaving your premises has become more critical than ever during this global crisis," said Gregory Blondeau, Founder and CEO of Proxyclick. ‘Touchless Check-in’ contactless solution Gregory adds, "Comp...
Significant upgrades to the e3 Series firmware were announced in the Linear Essential, Essential Plus, Elite and ProControl commercial access control systems. The new firmware updates employ the latest code technology to provide improved security and web services protection against the rise in cyber threats for businesses of all sizes. Giving end-customers and users the features most in demand, the upgrades to the Linear e3 Series also include improved encryption, smart reporting and card types...
Businesses are now gradually reopening in many countries, and people can return to restaurants, office buildings, and public spaces. A safe reopening process will rely heavily on effective public health strategies, including increased testing for the virus, social distancing, occupancy restrictions, and cleaning and disinfection activities. In many countries, temperature measurement and the wearing of masks have been commonly made mandatory in both business and public environments. While social...
A series of free interactive webinars is launched by 2N – global provider in Internet-enabled intercoms and access control systems. 2N On Air aims to help owners of residential and commercial property, architects, designers, security firms and building managers to identify and apply touchless technology which protects buildings and their occupants. The webinar series, beginning on 11 June, will profile the latest products for door controls in residential and commercial property. It will also include interactive question and answer sessions for those seeking to understand how to address the needs of their proposed or existing buildings. Coronavirus has already presented many challenges to business. Lockdown in the UK and many European countries has imposed fundamental short-term changes on business as well as individuals. Effect of COVID-19 on businesses Some companies have suffered dramatic drops in demand, with many employees furloughed with many factories, offices and shops empty or with skeleton staffing. Other businesses have been able to adapt in the face of continuing or even increased demand. Some businesses may be better equipped to emerge from lockdown into the new socially distanced normal Production lines have been redesigned to meet new hygiene and distancing regulations. Business processes have had to be adapted rapidly to remote working. Retailers and B2B suppliers have pivoted to an online model, resulting in extraordinary pressures on the infrastructure and capacity of distribution and delivery companies. There have been some clear winners; Joe Wicks, Ocado, Zoom, DHL and the makers of home-baking products. All will hope to carry their lockdown successes forward. By adapting to new public attitudes, some businesses may be better equipped to emerge from lockdown into the new socially distanced normal. For premises, 2N have products to help make them fit for 2020 and beyond. Remote door-controls CEO Michal Kratochvíl explained 2N’s motivation for the 2N On Air initiative. He said: Commercial property managers can integrate Internet Protocol intercoms and remote door-controls with other software" “After this great upheaval in our lives, our attitudes towards hygiene and security may have changed. More than before, we may want to avoid touching surfaces such as keypads which we are not sure are clean. We may want to avoid unnecessary face-to-face meetings with strangers, especially at our own front door.” “In the workplace, there may be greater spacing between employees, including receptionists and security staff who may feel nervous about direct exposure to employees and visitors as they enter and exit buildings. Apartment buildings equipped with intercom or mobile-enabled access control systems offer reassuring security without exposing residents, guests and tradespeople to unwanted face-to-face exposure or unhygienic keypads.” “The 2N On Air series offers seminars on the products in the market – offering resilient security while maintaining social distancing and good hygiene - and advice to those who are considering whether and how they might future proof their buildings. Commercial property managers can integrate Internet Protocol intercoms and remote door-controls with other software such as employee time recording systems.” “Effective high quality video and mobile-enabled door access controls are already recognized as a competitive advantage for forward-thinking building designers and operators. In the new post-coronavirus environment, the resulting wellbeing of building occupants has an even greater value.” Remote control of visitor access 2N itself saw no let-up in demand for its products and its expertise during the lockdown. The advantages of touchless entry controls, remote control of visitor access and socially distanced video intercoms are all the more apparent when so much focus is on hygiene. 2N’s production hub, near Czech capital Prague, continued to operate throughout the period, with automated production and assembly lines and a mixture of social distancing protocols and home working. One of central Europe’s largest hospitals invited 2N to advise on a tailored door control system to flexibly manage access to COVID-quarantined parts of the estate.
Customers may know it as DMP’s enhanced all-in-one system — and until now, the XTLtouch has only been available to Verizon customers. DMP is pleased to announce that the XTLtouch Wireless Control Panel with AT&T LTE is here. “We’re very excited about this,” says DMP’s Vice President of Sales Mark NeSmith. “No other all-in-one offers the same powerful and flexible solution. For areas that require AT&T service, this allows our dealers to much more aggressively compete in the residential and small commercial markets.” Graphic touchscreen keypad All XTLtouch installation options offer Entry Check-In Protection included at no extra price The XTLtouch combines DMP’s elegant and intuitive 5-inch graphic touchscreen keypad with the popular XTLplus. The installer can place it in the best location with the option of wireless sirens and wireless keypads exactly where their customers want them. All the keypads have the exact same interface so users can learn them quickly and move from one to another easily. Plus, it’s competitively priced. In fact, all in a single small footprint, the XTLtouch comes standard with: 99 zones of DMP’s 900 MHz Two-Way Wireless LTE AND Wi-Fi communication Six Areas or Home/Sleep/Away Arming or All/Perimeter Remote control via DMP’s Virtual Keypad app or VirtualKeypad.com Built-in Z-Wave support for up to 140 Z-Wave Plus devices Custom Actions - up to 20 different user programable scripts that can be programed into the XTLtouch Video integration with multiple options via the Virtual Keypad app or browser Proactive safeguard Compared to other all-in-one systems, the XTLtouch offers much more, including: Entry Check-In Protection All XTLtouch installation options offer Entry Check-In Protection included at no extra price. In the event of an intrusion, this is a proactive safeguard against a burglar’s fast tactic to disable the security system before it can send a signal. “Entry Check-In Protection is based on the same reliable check-in technology that we’ve used for years for our high-security customers,” NeSmith explains. External 110dB Wireless Sirens The XTLtouch’s external 110dB wireless siren can be placed anywhere. When it comes to real security, this can make a resounding difference. “The first thing an intruder would typically do is try to disable the soundmaker,” NeSmith says. “But with the XTLtouch, since the siren won’t be coming from the main panel, it’s not alerting the intruder to where the main system is; therefore, it’s more secure.” Fast and flexible installations And they remind, that the XTLtouch offers table-top and wall-mount installation options to fit the customer’s preferences. And, depending on where they find the best cell reception or wireless coverage, the installer will be able to place the panel wherever it works best with the option of installing up to eight wireless sirens, as well as seven additional keypads. Those keypads all have identical user interface as the main unit and can be placed exactly where the customer wants them.
In case of a large multi-national retailer or a smaller high-street retail store, security will be near the top of their list of priorities. In fact, the safety of visitors and staff, coupled with the security of goods, can be vital to any retailer’s success and profitability. CLIQ technology from the globally renowned security provider, Mul-T-Lock Technologies Ltd. offers a smart security solution for all types of retail applications, whether it be a chain of supermarkets or a standalone local retail shop. eCLIQ access control system for large retailers Mul-T-Lock’s eCLIQ access control system allows large retailers to manage access permissions remotely Mul-T-Lock Technologies’ eCLIQ access control system allows large retailers to manage access permissions remotely, from one central location, anywhere in the world. This includes the ability to schedule individual access permissions for each key, as well as to provide time-limited access. This is ideal for retailers with complex access and security requirements, such as 24-hour supermarkets, as it allows tailored access control for members of staff who may be coming and going at various times of the day, and also enables administrators to grant time-limited access control to contractors and delivery drivers. Authorized access control for staff If a key is lost or a member of staff leaves, access can also be revoked, which is particularly useful for retailers that suffer from a high staff turnover or employ seasonal staff for busier times of the year. This not only offers enhanced security but also significantly reduces whole life costing, as it removes the need to replace physical locks. It also facilitates keys to be validated daily, weekly or monthly to keep them continuously secure. Audit trail capabilities The system’s audit trail capabilities also allow business owners to access comprehensive data illustrating who accesses which lock and when, thereby making it ideal for those who are concerned about staff shrinkage or those who want to determine who should have access to certain assets. Working on a modular system, eCLIQ locks are quick and easy to install with no cabling required. Not only is maintenance not required for up to 200,000 cycles, but key batteries are also fast and easy to replace once every 30,000 operations, at a nominal cost to the business, with no need for specialist tools. CLIQ Go access control system for SMEs This access control system also includes the ability to schedule individual access permissions for each key Mul-T-Lock Technologies’ CLIQ Go access control system allows small to medium sized retailers to remotely manage security ‘on the go’. It boasts all the benefits of eCLIQ technology, but can be managed by a designated administrator via the CLIQ Go app. This access control system also includes the ability to schedule individual access permissions for each key, provide time-limited access, and revoke access to particular keys as and when needed – again, making it particularly useful for retailers that often suffer from a high staff turnover. High security eCLIQ locks Mul-T-Lock’s CLIQ Go is the ideal solution for a variety of applications, such as small to medium independent shops with a handful of staff who all need access at varying times, or that require individual permissions for access to storage rooms, for example. The high security eCLIQ locks are easy to configure, are suitable for all door types and can be easily fitted by a local locksmith. With no cabling, the cylinders can be retrofit to existing doors without causing any mess or disruption. The available cylinders are also suitable for a number of different applications, from cabinets housing high value items to all-weather padlocks for exterior gates. In fact, just one key can access doors, cupboards, elevators, machines and many other locking devices.
The Innovation Gallery is an initiative promoted by the pioneering Spanish Security event, SICUR, that recognizes businesses who have demonstrated true innovation and made a significant contribution to technological development in their sector. OPTEX was featured among the top 14 winners in the Security category by a panel of industry experts for its innovative ViiK radar-based vehicle sensors. ViiK’s sensors are above-ground vehicle detectors which require no civil engineering works to be implemented. They can be easily mounted on a pole making it an ideal vehicle detection solution for historical city centers, untarmacked roads, or other locations where digging is not possible or impractical. Automatic gates or barriers The technology combines both microwave and ultrasonic waves to detect vehicles for a range of different operations. It has the ability to ignore human traffic and can be used in conjunction with automatic gates or barriers. The technology provides reliable detection even in adverse weather conditions such as rain and snow, with an operating range up to -30 degrees. ViiK sensors can also be part of a solution to trigger ANPR cameras and LED lights to increase the capture rate in license plate recognition systems. Milton Acosta, Regional Sales Manager for Iberia, says the business never stands still: “We are very pleased to be recognized among this years’ SICUR Innovation Gallery. For many single lane applications, our ViiK vehicle sensor represent an accurate and easy to install alternative to induction loops. By avoiding civil engineering work, it means a less disruptive and far quicker installation job. Sicur was a great event for us to showcase this new sensor.”
OPDC-1-ZW is an optical door/window contact that monitors the opening/closing of doors or windows and alerts users of any irregular activities. Requiring no magnet contact, the optical sensor OPDC-1-ZW significantly reduces the mounting effort and increases the installation flexibility. It also comes with a reflecting sticker for users to fix on the opposite side of the infrared sensor to enhance infrared detection. The sleek and slim housing of OPDC-1-ZW features compact design that allows it to blend seamlessly into any home decor, making a residence a more secure place without compromise in aesthetics. Additionally, its tamper protection prevents unauthorized removal or sabotage. Deliver quality detection OPDC-1-ZW is compatible with other manufactures’ Z-Wave systems and can be conveniently integrated into new or existing Z-Wave systems to deliver quality detection, allowing users to stay in touch, in control, and have peace of mind. Features Integrated infrared sensor to monitor the opening and closing of doors and windows Easy and flexible installation due to no magnet contact required Randomized supervisory signals to check system integrity Simple and flexible installation by using adhesive tape OTA firmware update capability Includes a reflecting sticker to enhance infrared detection Tamper protection to prevent unauthorized removal LED status indicator Highly extensive and reliable communication range Low battery detection Suitable for residential and commercial premises Specifications Communication Protocol - Z-Wave Plus 500 series module Frequencies - 868.40 MHz (EU) / 908.40 MHz (US) Power Source - 1.5V, AAA Alkaline battery x 1 Battery Life - 1 year Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 100 mm x 15 mm x 18 mm
With the MOBOTIX CLOUD, MOBOTIX launches a new cyber-secure cloud video management system that is available via a flexible software subscription. The MOBOTIX VSaaS offering (Video Surveillance as a Service) enables complete video management of local cameras via App. The data is stored in stable cyber secure cloud data centers in regional proximity to the cloud users. "The market launch of the MOBOTIX CLOUD is another important step for us as a complete solution provider for security-relevant video management systems for our customers. Together with our technology partners, we plan, develop, install and support high-end video solutions. In this way, we optimize our customers' business and make it more secure without requiring them to invest additional technical, time or personnel resources", explains MOBOTIX CEO Thomas Lausten. Intelligent bandwidth management The MOBOTIX CLOUD solution includes, in addition to the MOBOTIX Bridge hardware component, all services available in a conventional VMS: event-controlled video recording, archiving, live remote access to each camera, notifications, user administration, Internet security and much more. MOBOTIX CLOUD is available with a monthly subscription model, thus saving on own storage devices, additional video servers and IT personnel for the video system. Each camera communicates with a securely encrypted outgoing connection with the MOBOTIX Bridge” "Each camera communicates with a securely encrypted outgoing connection with the MOBOTIX Bridge, a compact high-security connection box. A single bridge can be connected to up to 15 ONVIF-S network cameras. With several bridges per site, the number of connected cameras can be expanded as needed," explains Hartmut Sprave, CTO of MOBOTIX AG. The bridge streams the video data to the MOBOTIX CLOUD, enables intelligent bandwidth management and, thanks to the integrated hard disk, also local buffering of the video in case of bandwidth fluctuations. In addition, network failures of up to 48 hours can be bridged. All video recordings are secure and stored per camera for a freely definable archiving period and resolution in private MOBOTIX data centers. Data encryption for data storage The top priority for MOBOTIX was to provide cyber secure connections to regionally available MOBOTIX CLOUD data centers for its own cloud solution. Secure end-to-end encryption protects all data stored and transferred in the system. And the integrated hard disk in the MOBOTIX Bridge serves as a storage buffer in case of interrupted or poor connections to the cloud. The MOBOTIX CLOUD video management system combines comprehensive security with a scalable infrastructure. It is suitable for video systems of all sizes. The cloud solution is ideal and easy to manage, especially for projects with a large number of different locations (e.g. retail stores, franchises, restaurants) and users (e.g. security personnel in public buildings or different departments in larger companies with several branch offices). Even for private users, the cloud provides easy access to the use of a video security system. The MOBOTIX CLOUD combines the use of high-quality MOBOTIX cameras with extremely simple and convenient operation. The user interface of the CLOUD is limited to the essentials for efficient everyday use, making it easy even for users without IT or MOBOTIX knowledge to enter and move into the cloud world. Malware protection for videos The MOBOTIX CLOUD solution meets the basic requirements of one's own products with regard to the highest possible cyber security standards. In this way, the MOBOTIX CLOUD reduces potential weaknesses: There are no open ports, no local firewalls and no local software. Furthermore, no firewall installation is required and no incoming Internet connections are allowed. The cameras are not directly connected to the Internet; instead, the MOBOTIX Bridge is connected in between. When a video is stored in the cloud, it is safe from equipment failure, damage, and theft The MOBOTIX CLOUD Datacenter is malware protected without any open network connections and all recorded videos are encrypted. When a video is stored in the cloud, it is safe from equipment failure, damage, and theft. But it's also safe from other unforeseen events such as fire or water damage. The MOBOTIX CLOUD data centers, which are currently located at twelve sites around the world and offer multi-layered redundancy. The MOBOTIX Bridge acts as failsafe recorder allowing the cameras to continue recording for up to 48 hours even during a network outage. Compatibility with MOBOTIX cameras The MOBOTIX CLOUD requires only one H.264 stream from a video source, and is therefore compatible with all current MOBOTIX camera models of the Mx6 series, the MOBOTIX 7 series and the MOBOTIX MOVE models. Both digital and mechanical PTZ functions can be controlled via the MOBOTIX CLOUD as well as hemispheric cameras. Existing third-party cameras with ONVIF-S profile can also be used in the MOBOTIX CLOUD. End customers save money with the MOBOTIX CLOUD. There is no need to buy and maintain software, storage devices or additional servers. One can pay a small initial amount, and then decide on the basis of a flexible subscription plan where one only has to pay for what one needs. Regular updates of the MOBOTIX CLOUD software ensures that the system is always up-to-date.
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand for video surveillance and security products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. Video surveillance technology provides added security for you, your family and your business In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant through these odd times and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable video monitoring solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
At ISC West this year, emerging technologies will be on display to help organizations manage their environments, from the building itself to who’s on the premises and what’s going on at any given moment. Top of mind this year is cybersecurity, compliance and management of security assets as threats rise and governing bodies put regulations in place that businesses need to react to. The good news is that the shift in approach to holistic monitoring of cyber and physical assets can move enterprises to a place of digital transformation and proactive management rather than reactive practices based on threats and changing regulations. The show provides an opportunity for both vendors and potential customers to learn from each other about what’s out there and what’s needed in terms of future solutions as the industry evolves. Are you in cyber and physical security compliance? At this year’s show, we’ll continue to see developments focused on integration of cyber physical security that will lead to deeper understanding of the relationship between devices, device monitoring and spaces in which all devices physically reside. Digital solutions help achieve a digital transformation which stitches the data relationships together to provide better threat vector impact and overall understanding of risk. The technologies in smart buildings are subject to cyberattacks, which pose not just a threat to data and privacy but can compromise the physical space as well. Think of the locked door in a smart building that now is opened with access control via key cards or mobile devices given only to certain members of staff. These integrations increase safety and restrict access across the enterprise, but a bad actor can access and duplicate the necessary data to open the door with a copycat device while hiding the event from the surveillance system. By having a comprehensive cyber whitelist of installed devices, potential rouge devices are prevented from transmitting on the network, therefore providing an automated guard against internal and external attacks. When systems are compromised due to a hack or physical intervention, it puts what’s behind the door at risk, whether it’s money in a bank or information in a sensitive work environment, such as a laboratory. Digital solutions help achieve a digital transformation which stitches the data relationships together It’s increasingly important to highlight the relationship between cyber and physical security. A great illustration of this is the digital twin. A digital twin is a replica of a physical space that uses both informational and operational technology to give real-time information about what’s going on in a space. These can include things like floor plans for the building as well as real-time sensor data from the building management system, HVAC systems, lighting, fire, security, and more. By getting a complete picture of the physical and digital assets of an organization, it becomes possible to monitor all systems from one central location to see how they’re working together and act on the insights they provide. So, in the example of a breach from before, it’s possible to flag that hack, isolate its exact location and devices involved, and resolve it quickly while maintaining preservation of evidence. Compliance: how to get there safely, efficiently and effectively As these threats evolve, governing bodies are taking action to ensure that data is protected to minimize these kinds of threats and ensure that organizations feel confident in the security of their data. Norms and compliance measures are emerging quickly, such as General Data Protection Regulation (GDPR) which began to be enforced in March 2018, and the California Cybersecurity Law, which went into effect in the US just this past January. The regulations of what can be done with data mean that companies need to react or face penalties such as fines, which can be as high as 4% of worldwide annual revenue of the previous year. These are also fluid and can change rapidly, meaning flexibility is important in compliance solutions. However, this presents an opportunity for companies to invest in innovation to ensure they’re prepared for those changes and to protect the safety of not just employees, customers and target markets, but of the larger organization. Getting to a place of compliance can seem costly and time consuming at the beginning Getting to a place of compliance can seem costly and time consuming at the beginning, especially for larger organizations. They may have thousands of security assets (cameras and sensors, for example) and might not even be fully aware of what they have, where they are, and whether those assets are functional, never mind compliant with data protection legislation. The right solution takes all the steps to becoming safe and compliant into account, beginning with inventory and mapping of all assets to get a complete picture of where things stand and where changes need to be made. One large financial institution, upon embarking on this journey, identified an additional 10% of assets that they didn’t know they had, and additional ones that were nonfunctioning and needed to be repaired or replaced for compliance and safety. Monitoring: centralized and remote for rapid response Once assets and data are centralized and a complete inventory is taken, it’s much easier to effectively monitor the complete enterprise. At this year’s show, smart technologies will be on display that reduce cybersecurity risks and monitor assets for compliance. If something changes, that can be flagged, and appropriate parties can be quickly notified to act and neutralize security threats or avoid the expensive penalties that come with noncompliance. Since all these components are centralized in one location, it becomes possible to monitor much more effectively and fix issues remotely in minutes rather than scheduling a trip to a location that may not happen for days or even weeks. A security camera for a large chain enterprise such as a retail store or bank in a small-town location deserves service just as quickly as one in a major city, since the threat that each non-functional device poses is the same to who and what it is there to protect. Keeping it up: a proactive approach to service and maintenance One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach One of the ways that emerging technologies can be a game changer is when it comes to the cost and approach to systems maintenance and operation. In addition to performance and compliance, other types of data, such as historical events, can also be monitored centrally. This gives context to security events and can move organizations from a reactive to a proactive approach to their security as well as operations. If small problems are identified and resolved before they become larger problems, it means that security events can be mitigated more quickly or prevented entirely due to early intervention. On the operations side, early insights into asset performance means that fewer resources are expended on noncompliance fees and large-scale, emergency repairs. These resources can take the form of money, but also of time spent by employees and enforcement agencies to ensure continued compliance. Staff can spend time engaged in active monitoring rather than generating reports, since that can now be automated. In the new decade, it’s time to use the technological resources available to better protect systems for smarter, safer and more sustainable environments. On every level, compliance is important not just for its own sake, but so are the other benefits associated with intelligent management. The show presents an educational opportunity for vendors and customers alike. Walking around the show floor and talking to everyone is a unique way to see what’s out there and evaluate what is and isn’t working for a business while getting information from all the industry experts. Even if they’re not ready for a complete overhaul, taking stock of what’s available, where things are heading and how their operations and mission can be better served by implementing one or more of the solutions showcased is more important than ever. On our end, those conversations about needs and concerns are invaluable in driving innovation.
Security managers, installers and integrators look into a wide variety of factors when selecting a remote video monitoring receiving center to provide continued real-time surveillance of their sites. But there’s one factor which isn’t often taken into consideration, when it really should be. That’s the welfare of the video surveillance operators who are tasked with responding to alarms and ensuring on-site incidents are dealt with appropriately. The fact is, in most UK monitoring center those operators are working extremely long hours: typically 12-hour shifts, often four days in a row. The cumulative effect of that regular extreme shift pattern can be a level of fatigue which is detrimental to the performance of the operators, as well as to their own physical health and mental wellbeing. The result is a reduction in effectiveness of client video security systems. If the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffers. The central aspects of concentration and alertness I’ve worked in monitoring centers for most of my adult life, starting just out of school. When I had the opportunity to begin my own video surveillance and security alarm most In UK monitoring centers, those operators are working extremely long hours: typically 12-hour shifts, often four days in a rowmonitoring center with my business partner Andy Saile, we were clear that operator welfare was a priority. After all, the operator’s job is literally to be alert and responsive, so why would we want to do anything to detract from that? That’s certainly not the case at all remote monitoring centers, though. The vast majority follow the 12-hour shift template, usually in four days on, four off patterns. Anyone who has done any job knows that at the end of a 12-hour shift, fatigue kicks in, and the ability to focus diminishes. That’s particularly the case in roles where concentration and alertness are central to the job. For a video surveillance operator in a monitoring center, fatigue starts to affect the ability to work effectively during the stretch between 9 and 12 hours. That’s the danger period. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working. The operator is the link between the technology and the police. They are a key component of the whole system. If an operator misses a criminal incident because of fatigue, that means the security system the client is relying on is not working Government guidance After working in remote video monitoring centers and experiencing what we considered both good and bad practice, when Andy and I established our business, we were clear that our operators would work in shifts that were no longer than nine hours at most. This delivers the best results for our customers and our staff. Our feeling was backed up by UK government guidance on designing video surveillance control rooms. The Centre for the Protection of National Infrastructure has produced a detailed publication called 'Human factors in video surveillance control rooms: A best practice guide'. This publication says: “12-hour shifts, although common in many settings, rIf the operators are compromised when it comes to clear decision-making, the entire monitoring operation suffersepresent a greater risk to health and performance than 8 hour shifts in terms of higher perceptions of workload, fatigue and stress, risk of more errors and accidents, and higher health risks.” Negative impacts on health and wellbeing It further says: “Research confirms that the interruption of circadian rhythms (the 24 hour natural bodily cycle) by shift work can have a negative impact on both general wellbeing and physical health (short and long term), as well as on performance due to general fatigue (i.e. an increased likelihood of errors). Shift-patterns are often designed to meet commercial and operational requirements, but serious consideration should be given to minimizing negative effects on health and well-being by the use of appropriate shift patterns.” The majority of our shifts cover seven or eight hours, and our operators never work more than four in a row. That allows for an average of three or four days between each batch of shifts. The idea is to avoid running staff into the ground, and that in turn makes our company more efficient and effective in the service of our clients. We’ve seen the results in practice: our operators only took four sick days in the past year. That’s four sick days in total, not per operator. It’s a Video surveillance operators have intense jobs, responsible for monitoring and responding to video surveillance and intruder alarm events from commercial and domestic propertiesremarkably low figure in the remote video monitoring industry. Full readiness Video surveillance operators have intense jobs, responsible for monitoring and responding to video surveillance and intruder alarm events from commercial and domestic properties. They liaise with the police, the customer keyholder, end users and any relevant authorities as required. Our customers are equipped with both cameras and motion sensors, which generate alarms on movement. When a movement in a specified zone occurs, the alarm is raised directly with the operator responsible for that site. The response differs from customer to customer depending on their own protocols. If there are dome cameras in place, for instance, they can be utilised to provide additional situational awareness. Escalating risks Traditional intruder alarm monitoring centers required the operator to react to an alarm by calling a keyholder, who would then respond to the incident. But remote monitoring requires concentration, focus, and deductive skills. The information required to make an informed decision isn’t immediately obvious – the The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiringoperator must work out what has moved and establish its cause. There’s no one to provide extra detail. The operator’s art is in working out for themselves what is relevant information in a scene and what isn’t. That requires their full attention. When operators work four days of 12-hour shifts in a row, risks escalate as a result. The risk that the wrong decision can be made. The risk that customers or police are not notified when they should be. There is a real-world cost associated with those decisions. The operator must be able to snap to full focus at any point over the course of their shift, and it’s tiring, whether there’s an incident to respond to or whether the operator is simply prepared to act. Operator skills are diluted if their shift patterns are not considered. Why would you hire someone based on their skillset, and then work them into the ground until they’re too tired to execute those skills? Choosing a monitoring center Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretation. A video surveillance operator is an Security systems and modern technology are crucial ingredients in protecting people and property, but they also require interpretationinvestigator and a conduit, bridging the divide between images, alarms and authorities, be they police, security guarding operations or keyholders. To run them into the ground is to diminish their ability to make intelligent decisions. It makes sense, then, to opt to work with a monitoring center which puts the welfare of its operators at the forefront of its business. Start by asking your prospective RVRC about their shift patterns. A monitoring center with respected and happy staff is a monitoring center best able to provide a fully effective service, optimising your security systems and maximizing your investment.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-Wave Signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, WA-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA Radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar Technology For Border Surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA Technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar Sensor For Security Applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Optex installs intrusion detectors at a gated, luxury motor coach resort community in the desert area of Southern California. The property features a clubhouse, fitness room, community pool, and 141 "Casitas": 1200 sq ft. custom-built living spaces with waterfront motor coach pad. Because most owners were on site only a portion of the year, the property faced an increasing issue with trespassers in the off- season months. The increase in trespassing also lead to an increase in vandalism and theft cases. The large perimeter, combined with the desert heat, required a robust, long distance solution that would stand up to the elements. Detection range of 650 feet The integrator worked directly with OPTEX to plan out a perimeter system that would overcome the challenges faced on the site. Because power was readily available and a long distance solution was required, hardwired AX-650TF beams with a detection range of 650ft. were selected. After discussing possible mounting options with the OPTEX sales representative, the integrator decided on the AX-TW200 photobeam tower. Because the customer provided a site plan, OPTEX was able to pre-build the towers and mount the beams in them at no additional charge. Once installed, the tower and beam solution provided full perimeter protection by activating strobes and notifying an on-site guard to the location of an intrusion. The result was a huge decrease in the amount of unknown trespassers, thus greatly reducing reports of theft and vandalism.
A very high-risk site belonging to a large and well-known cash handling business was located in a busy commercial complex. The company had identified a security weak-spot in its facility - namely the roof and the skylights within the roof. They had considered using active infrared beams, but these had been discounted because they could not cover the entire roof space. CCTV with video analytics was also considered, but similarly discounted since it is easily affected by varying light and shadow conditions, and its reliability could not therefore be depended upon. REDSCAN unit can protect a flat roof The solution was to install REDSCAN to cover the whole surface of the roof and skylights, integrating the detection units with the existing alarm system so that any potential intrusion is alerted. The detection area of the REDSCAN was easy to set up to the exact shape and size of the roof; a single REDSCAN unit can protect a flat roof. The sensitivity of the target object size and speed can be adjusted to dramatically reduce the possibility of false alarms from birds or fog. The weak spot identified by the customer is now secure, giving peace of mind to the end user. False alarms are at an absolute minimum due to the laser technology and the ability to set the detection area.
ADT announced that, via ADT Commercial, its commercial channel, it is joining forces with Dollar Tree, Inc., to help provide protection to its retail locations nationwide. ADT Commercial, a provider of commercial security, fire, life safety and risk consulting services in the U.S., will provide comprehensive and innovative security solutions and monitoring services at the majority of Dollar Tree and Family Dollar locations across the U.S. “In these rapidly evolving times, we’re thrilled to be partnering with Dollar Tree for what marks the largest contract to-date for ADT Commercial,” said Jim DeVries, President and CEO of ADT. “Dollar Tree has shown itself to be a true provider by seeking out enterprise-level security solutions on the market.” Commercial security for customer and employee safety ADT Commercial will service Dollar Tree and Family Dollar locations across the U.S. The agreement includes equipment and service enhancements, and 24x7 remote support from ADT. “Our goal is to provide custom, innovative, integrated solutions to meet Dollar Tree’s unique needs. With this partnership, we’re helping to shape the future of retail security and look forward to working with Dollar Tree to make that future a reality,” said Dan Bresingham, Executive Vice President, Commercial, of ADT. “It is very important for us to ensure our customers and associates feel safe and secure while in our stores,” said Bob Oberosler, Sr. Vice President of Asset Protection, at Dollar Tree, Inc. “We continue to enhance our in-store technologies, and are fully committed to customer and employee safety.”
There are a handful of amazing things that set San Francisco apart from other global cities. Notably, there is the Golden Gate Bridge, Alcatraz Island, Fisherman’s Wharf and Chinatown, the Twin Peaks overlooking the city skyline, San Francisco Bay, and The Moscone Center. Just how does a convention center fit into the list of places to see in beautiful San Francisco? It is the largest convention and exhibition complex in San Francisco, California. It includes three main halls spread out across three blocks and 87 acres in the prime South of Market neighborhood. The convention center originally opened in 1981 and has gone through several renovations. It is currently upgrading its security system to reflect a modern, state-of-the-art security solution. Securing SMG/Moscone Center Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport. However, clients who use the facility are required to provide their own inside security. When the doors of the convention Center are open to the public, it plays host to people who want to come in and look around. Our new security system will provide analytics, and the ability to look at the images in real time" “We are responsible for facility security inside and on the perimeter outside. This is considered a soft target, so we do everything possible to harden the security,” said Damion Ellis, Director of Security at the SMG/Moscone Center. Damion adds, “The time is right for us to take out the old security system, including the old analog camera system. Our new security system will provide analytics, and the ability to look at the images in real time.” IP cameras installed for wide surveillance Like any major metropolitan area, the San Francisco metropolitan region has its own issues that have to be dealt with that aren’t pleasant. This includes keeping track of the homeless population and what they are doing. Damion Ellis further said, “We are able to place the new IP cameras in places where the homeless population congregates on the outside, in dark corners of the facility.” CompleteView VMS video platform The Moscone Center complex consists of three main halls. Moscone South is located to the south of Howard Street and is three-story tall. It opened in 2017, replacing the original Moscone Center building that opened in 1981. A Keith Haring sculpture stands outside the hall at the corner of 5th and Howard streets. Moscone North is located to the north of Howard Street, and Moscone West is a three-level exhibition hall located across 4th Street from Moscone North. Integration with ProWatch access control platform “One of the most compelling reasons Moscone deployed CompleteView video platform was the integration with Honeywell’s ProWatch access control platform, as well as newly designed multi-sensor cameras,” said Salient’s Regional Sales Manager in the Bay Area, Cindy Doyle. Cindy adds, “The ease of use and intuitive software allowed the guard staff to use maps in the system to identify where triggered events took place for guard dispatch.” Monitoring door alarms Prowatch access control platform is currently being used to monitor door alarms throughout the property Prowatch access control platform is currently being used to monitor door alarms throughout the property and triggering video call-up and/or alarm video event when there is a forced or held open door. In order to keep track of outside foot traffic and provide interior and exterior security, an analytics option was foremost on everyone’s mind, and integrator Microbiz Security Co., dove in with an initial site survey to determine the best course of action. Microbiz has partnered with the SMG/Moscone Center for several years. Video analytics solution “Our goal was to take a look at what it would take to secure the facility, but to do it properly,” said Todd Chritton, President of Microbiz Security. “The integrator had some suggestions in terms of offering better security coverage in some areas,” said Marco Escobar, Vice President of Operations at Microbiz Security, adding “What they knew was three buildings needed to update from its current 2002 technology, and upgrade to 2018 technology. It also was beneficial to the integrator having worked on site for several years and also having worked with Ellis during his tenure with the Hilton Hotel chain.” Multi-sensor and multi-megapixel IP cameras Marco Escober further stated, “We’ve been a long-time vendor at the convention center, and we offer a pride of installation as well as using the best of the best security solutions. We began by updating current cameras to Arecont Vision multi-sensor and multi-megapixel IP cameras and Salient Systems’ CompleteView VMS, Dellintegrated server with RAID6 configuration and CompleteView Enterprise software." He adds, "The VMS is a fully open architecture, enabling convention center security staff to seamlessly leverage existing technology investments and minimize disruption.”
A British university has overhauled its dated suite of security cameras to prepare for expansion and better protect its students and staff. Newman University in Birmingham called in systems specialist Unison Integrated Technology after a major power-surge disabled more than 30 cameras in its ageing system. Newman wanted comprehensive video coverage that was more robust and easier to use as part of its development plan for a safe learning environment for almost 3,000 students and staff. Facilities manager Lewis Palin said: “We contract out our security services, so it’s important for newly arrived officers to be able to use all of the system’s key features with minimal training.” Digital image stabilization Unison proposed an IDIS end-to-end solution that had already performed excellently at a number of nearby schools, colleges and commercial sites. Total cost of ownership was also a factor as Newman needed more than 150 new internal and external cameras, so Palin wanted to integrate its existing cameras and infrastructure with the new kit. It also meant minimal maintenance charges, no license fees and the option to adapt or scale the system as the campus grew or requirements changed. The Unison team delivered an IDIS DirectIP solution with more than 160 cameras, including five advanced 2MP Lightmaster IR PTZ models delivering 36x zoom and pin-sharp images in all lighting thanks to their 350 meter IR, true wide dynamic range and digital image stabilization. Network video recorders Unrivalled storage capability is assured by four powerful 64-channel network video recorders Unison also installed 55 full-HD IR vandal-resistant dome cameras to secure entrances and internal areas, and 40 IR bullet cameras to give HD coverage of key external areas. All the new cameras incorporate IDIS Smart Failover technology, which ensures automatic protection against video data loss, eliminating the risk of gaps in recordings in the event of power failure or network instability. Unrivalled storage capability is assured by four powerful 64-channel network video recorders with built-in failover and RAID 1, 5 and 10 support, plus a further three 32-channel recorders with IDIS Intelligent Codec to deliver storage efficiency. easily monitor live Security officers can now easily monitor live internal and external areas, and quickly search and retrieve recorded footage to find events of interest. Palin concluded: “Unison got the entire job done in three weeks – with swift stock delivery from IDIS – working around us to deliver our new system exactly as promised. We will definitely stick with IDIS technology as we expand our estate.”
ExcelRedstone is implementing an ambitious integration project, using Maxxess eFusion technology, at the first high-rise residential and hospitality development in the City of London for many years. Currently under construction, the £300m 43-story One Bishopsgate Plaza development will see security and building management technology operating seamlessly together in a setting that includes both new-build and listed conservation area structures. As well as having 160 new private apartments, when completed the development will include a 237-bed five star Pan Pacific Hotel, a public plaza and a Pacific Ballroom, promoted as the Square Mile’s first dedicated banqueting venue. ExcelRedstone selected eFusion for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. Umbrella management system “The customer wanted a seamless, single interface that allows front of house guest services to be linked to back of house functions and give the highest operator efficiency and enhanced customer experience,” says Matt Salter, Director, ExcelRedstone. eFusion provides an umbrella management system for an expanding choice of preferred technologies With its modular, building block approach, eFusion provides an umbrella management system for an expanding choice of preferred technologies for commercial, hospitality and mixed-use settings, including guest check-in, reservation & visitor management, access control, surveillance, and building systems. In use, eFusion drives efficiency and eliminates gaps in security by removing the need for operators to continually switch between systems. Video management system Two of the most important technologies being integrated by eFusion at One Bishopsgate Plaza are the full-featured, Oracle Hospitality Opera property management & guest service system, and a 266 door ASSA ABLOY wireless electronic locking solution. ExcelRedstone is also using eFusion to integrate Zenitel IP intercoms, a KONE elevator system, and the building management (BMS) system using the BACnet protocol, which will enable estate managers to optimize energy efficiency based on usage and occupancy. The eFusion integration also allows a more flexible approach with the surveillance system - for example, making it easy to use a choice of Axis cameras, with specialist mounts, in the listed conservation areas of the site, integrating them with over 350 Mobotix fixed lens and panoramic cameras through the highly-secure Wavestore video management system (VMS). Networking and AV systems ExcelRedstone is also responsible for networking and AV systems at the development The surveillance and other security systems will be monitored live from two separate control rooms, one for the hotel and one for the wider estate. As well as integrating these and fitting out the control rooms, ExcelRedstone is also responsible for networking and AV systems at the development. “Our engineers are pre-staging the entire system off-site,” explains Salter. “This is allowing us to test everything in advance and to reduce packaging waste and environmental impact on site. It also lets us work more efficiently, in step with the ongoing construction schedule, floor by floor.” Providing secure solutions One Bishopsgate is the latest of a growing number of mixed-use developments - including hotels, retail, office and residential complexes - to use eFusion to streamline security, safety and facilities management. “We are seeing a growing trend towards automation and centralized management, and the solutions being deployed at these locations are increasingly sophisticated – but that doesn’t mean they have to be complex,” says Lee Copland, Managing Director EMEA, Maxxess. “Quite the opposite in fact. By keeping things simple and integrating off-the-shelf with the widest choice of technologies, Maxxess is providing secure solutions that are easier to install and to use than traditional alternatives.”
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
High-quality products are the building blocks of successful physical security systems. How they are packaged may sometimes be seen as an unimportant detail or an afterthought. But should it be? Effective packaging can serve many functions, from creating a favorable customer impression to ensuring the product isn’t damaged in transit. Packaging can also contribute to ease of installation. On the negative side, excess packaging can be an environmental concern, especially for customers who are sensitive to green factors or to minimizing waste. We asked this week’s Expert Panel Roundtable: Is packaging of products important in the commercial security market? Why or why not?
Higher pixel count is better. It’s a basic tenet of the video surveillance market, or at least it is the implication as manufacturers continue to tout their latest products offering ever-higher pixel counts. But the reality is more nuanced, as our Expert Panel Roundtable panellists explain this week. Pixel count shouldn’t be seen as an end unto itself, but rather as a factor in determining what camera is applicable to which application. Pixel count is just one factor of several to consider, and the needs of the application must rule all decisions. We asked this week’s panel: How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense?
Commercial security system: Manufacturers & Suppliers
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload