Canadian-based video surveillance and business intelligence front-runner March Networks® announced the completion of its acquisition by Delta, a global pioneer in power and thermal management solutions. Through its subsidiary Delta International Holding Limited B.V., Delta acquired 100% of the shares in Infinova (Canada) Ltd., owner of March Networks, from Infinova International Ltd. About March Networks Headquartered in Ottawa, Ontario, Canada, March Networks is a global pioneer in enter...
ACRE, a global pioneer providing state-of-the-art security systems, announced the strategic acquisitions of Feenics and Matrix Systems. Cloud and integrated security The acquisition of Feenics brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio,...
Irisity AB (publ), an AI video analytics provider, continues its international expansion with the appointment of Marc Sanders as Sales Director for GCC, based in Abu-Dhabi, UAE. It continues its international expansion, opening a new sales office in the United Arab Emirates. The office, based in Abu-Dhabi, will be headed by Marc Sanders who will be responsible for managing the company’s sales activities in the Gulf Cooperation Council (GCC) countries – Bahrain, Kuwait, Oman, Qatar,...
More and more business security practices are going digital. Mechanical keys are still the backbone of most corporate security plans, and it can be very expensive for companies to switch to electronic access control on a large scale. Therefore, enterprises need to choose the most suitable access control system. What is key management? Key management is the process of protecting, tracking, and scheduling mechanical keys. Why is this important? Because the key carries access to sensitive locatio...
Following a decision of its Board, Euralarm has welcomed its newest member Sitasys, the Swiss pioneer in alarm management, best-in-class finger-print identification, and secure communication. The company will join the services section of Euralarm. Sitasys will benefit from Euralarm’s services in terms of representation towards European institutions and standardization organizations. This includes the monitoring of legislative and standardization issues relevant to the industry. Sitasys w...
For security professionals who thought analog systems were a thing of the past, a new approach by Mythic Inc. demonstrates that everything old is new again. Using older technology in a new way, the Mythic M1076 Analog Matrix Processor leverages analog computer chips from a previous generation to drive new levels of artificial intelligence (AI) performance with lower power requirements. Low power and high speed Mythic provides power-efficient AI at the edge, including inside video...
It is possible to visualize sound and the user doesn’t have to be an acoustic engineer to make sense of it either: the FLIR Si124 industrial acoustic imaging camera produces a precise acoustic image that is overlaid in real-time on top of a digital camera picture. The blended visual and sound image is presented live on screen, visually displaying ultrasonic information and allowing the user to accurately pinpoint the source of the sound. Acoustic imaging is used for two primary purposes: air leak detection, and locating partial discharge from high-voltage systems. Using sound imaging from 124 built-in microphones, the FLIR Si124 can help professionals identify leaks and partial discharge up to 10 times faster than with traditional methods. Compressed air leak detection Compressed air is the single most expensive energy source across all factory types, yet up to one-third of that compressed air gets lost to leaks and inefficiencies. The human ear can sometimes hear an air leak in a quiet environment, but in a typical industrial environment, it’s impossible to hear even bigger leaks due to loud background noise. Fortunately, the Si124 filters out the industrial noise, allowing professionals to “visualize” sound even in noisy environments. With Si124, professionals can safely detect problems from up to 100 meters away and analyze discharge patterns Partial discharge in high-voltage systems In electrical systems, partial discharge can lead to equipment failures and unplanned downtime. With the Si124, professionals can safely detect problems from up to 100 meters away and analyze discharge patterns. The camera classifies three partial discharge types, including surface discharge, floating discharge, and discharge into the air. Knowing the type and severity of the discharge enables the facility to schedule maintenance to minimize failures and downtime. Acoustic camera viewer cloud service What sets the Si124 further apart from other acoustic imaging cameras is the FLIR Acoustic Camera Viewer cloud service. Image captures are quickly uploaded over Wi-Fi to the cloud service and then immediately analyzed, providing the user in-depth information such as the size and energy cost of a compressed air leak, or the partial discharge classification and pattern of an electric fault. In addition, users get 8 GBs of storage and wireless data transfer capabilities, making sharing photos and data simple and efficient. The Si124 requires minimal training and can be used one-handed. Through a regular maintenance routine, professionals can identify issues fast helping utilities keep the power flowing and manufacturing operations going.
Azena is announcing that it will host ESCON 2021, a free to all ecosystem conference for smart security stakeholders, on 2 December from 3-6 pm CET. Broadcast live from the BMW Welt, Munich’s iconic landmark, ESCON will bring together leaders in the AI video analytics space to discuss the future of Artificial Intelligence and IoT technologies in the security and safety industry. Actionable operational intelligence “The potential of AI, IoT and video analytics and the influence on the security and safety industries has never been higher and will continue to shape how end users can leverage the data, generated by these technologies, to improve their business,” said Hartmut Schaper, chief executive officer of Azena. “We are most excited to hear from the participating industry visionaries and experts, as we explore the future ways of our open platform to deliver actionable operational intelligence.” About ESCON 2021 Key members of Azena's teams will provide updates on upcoming ecosystem and platform developments Two breakout sessions will provide discussions geared toward project planning and implementation for end-users and integrators as well as for app developers looking for insights into creative methods for application development and sales. The winners of the 2021 App Challenge, which resulted in new solutions for transportation, stadiums, and infrastructure, will be recognized and key members of the Azena product and business development teams will provide updates on upcoming ecosystem and platform developments. Guest speaker highlights include: Oliver Philippou, Research Manager - Physical Security, OMDIA, on the current state and future of video surveillance analytics, with insights into a shifting market and the trends shaping it for customers and suppliers. Josh Woodhouse, Lead Analyst, and Founder, Novaira, on what role software-defined video surveillance will play in the evolution of the video surveillance market and the associated systems integration business. José Daniel Garcia Espinel, Global Innovation Director, Prosegur, on how to build a world-class security offering by using AI and IoT solutions to increase security operators’ efficiency and provide best in class security. Steve Ma, VP, Open Platform Business Division, VIVOTEK, and VP and Chairman of Strategy Committee, OSSA, on capitalizing on the video revolution and combining best of breed hardware with an open platform approach to maximize value for customers. Lucas Adt, Business Development Manager, Sensormatic, on how AI video analytics supports retailers in improving both store performance and shopper experience. Werner Braun, Head of Portfolio Management, Siemens Keven Marier, Vice President Technology Partners, Milestone
With its major global Innovation Splash in November, MOBOTIX AG is placing 18 new hardware and software solutions on the market at once. New products The first hemispherical camera that combines infrared and LED white light in a single system is a major highlight. In addition, there is a new convenient dome camera, hemispherical modules, and Thermal CIF modules specially designed for perimeter protection for the MOBOTIX7 cameras with up to 105° wide angle of view (FoV). A fiber optic extension system now makes it possible to place the lenses of a single camera (S74) up to 60 meters apart. New intelligent apps and software developments expand the application possibilities of the MOBOTIX7 HighEnd video systems. And last but not least, three new cameras from the MOBOTIX entry-level MOVE series have been added to the portfolio, which for the first time feature a water-repellent nano-coating for the best view even in the rain. Video technology MOBOTIX can solve every conceivable video technology project worldwide in the future- and cyber-proof manner" "This comprehensive launch is visible proof of our strategy, which we have been stringently pursuing since the introduction of the open MOBOTIX 7 platform. MOBOTIX is now able to solve every conceivable video technology project worldwide in the future- and cyber-proof manner - regardless of size, the number of locations, requirements, or industry," explained Thomas Lausten, CEO of MOBOTIX AG. "The launch of the MOBOTIX HUB video management system (VMS) in May 2021 was already an important building block. We can now offer both the hardware - i.e., the camera itself - and the software and applications, including VMS for all project sizes from a single source and at our extremely high MOBOTIX security level, as a convincing all-around solution provider." Variety of innovations ensures a new launch format Whether hardware or software, all innovations will be presented to partners and customers on a central launch website. From there, visitors have the opportunity to delve into the versatile in-depth information in detail. "Ultimately, all these individual components of this product release combine with the existing portfolio to create customized solutions for our customers. Through the individual and effective combination of this vast potential, we can meet almost every need of our customers," explains Hartmut Sprave, MOBOTIX CTO." MOBOTIX - Once again, a pioneer in hemispheric technology Germany's video security experts are combining infrared and LED white light in a 360 omnidirectional camera MOBOTIX introduced hemispheric technology to the video security market back in 2008. Now, Germany's video security experts are again playing a pioneering role in the market by combining infrared and LED white light in a 360 omnidirectional camera for the first time. This makes it possible to create color recordings even at night, allowing, for example, the reliable detection of the color of clothing or vehicles. The second, new IoT video system, a classic dome camera, also impresses with its innovations. For example, the manual adjustability has been extended by the third level for more convenience and accuracy. Of course, both video security systems are integrated into the MOBOTIX7 platform, which allows the use of the individual camera-integrated analysis software (apps). High flexible tools: new apps & updates The MOBOTIX7 platform continues to grow. The current Innovation Splash includes four new apps, some from new software partners. This creates more and more innovative solutions for individual requirements. New intelligent apps and updates to existing apps make video analysis ever more flexible, precise and powerful. By the way, all available Certified camera apps can be used free of charge for 30 days for testing at MOBOTIX. If a customer can`t serve an application with the existing app portfolio, MOBOTIX will work with them to develop the perfect application for their particular requirements. MOBOTIX move breaks up raindrops Several new models, some with integrated video analysis, were also released in the MOBOTIX MOVE camera series, an attractively priced entry-level solution for smaller systems and selective additions to more complex projects. One highlight stands out: The new, groundbreaking MOBOTIX EverClear coating uses a special nano-technology that transforms water drops into an ultra-thin water film immediately upon impact. This ensures the best image quality, even in the rain. Flexibility and cybersecurity as core values MOBOTIX7 video system can face challenges, and the installation of suitable apps, without having to install new cameras" "We see more and more confirmation of our overall strategy. Companies or authorities are always facing new challenges to protect people, machines, or areas and in the course of process optimization. An existing MOBOTIX7 video system can flexibly cover these tasks, and the installation of suitable apps, without necessarily having to install new cameras," sums up Lausten. “This is a flexible, highly intelligent, future-proof, and sustainable solution at the same time. And last but not least, it is highly cyber-secure." This is also evidenced, among other things, by the certification of the leading institute for penetration tests in Germany from June 2021, which once again confirmed the best possible cyber security of MOBOTIX products and solutions. Pure security was once - video technology can do much more Security remains a core competence of video technology. Supported by Deep Learning and Artificial Intelligence, MOBOTIX cameras can now do much more than that. They support and improve production processes in the industry. Cameras relieve personnel in healthcare. They increase service effectiveness in public institutions and improve security in schools. Retailers improve the shopping experience for their customers and increase their sales potential in the process. And last but not least, camera technology in transportation - keyword "smart city" - offers the best opportunities for safe, relaxed, and sustainable travel. "Video technology has the potential to make our lives safer and, above all, easier in the long term," concludes Thomas Lausten.
SALTO Systems (SALTO) has introduced the XS4 Original+, the next generation of the world’s most flexible and reliable smart locking solution that features a beautiful design, with a sleek flat reader in two new colors. SALTO XS4 Original+ The new SALTO XS4 Original+ takes the trusted and proven flagship XS4 Original electronic lock product family and incorporates the latest technology, to accommodate access control needs of both today and tomorrow. Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful" “Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful, capable, and redefined to elevate any door’s security, and management,” said Marc Handels, SALTO Systems’ Chief Technology Officer (CTO). Marc Handels adds, “When you have an excellent product like the SALTO XS4 Original electronic lock that has withstood both the test of time and technology, it makes sense to improve upon what is already working very well.” Embedded with BLUEnet functionality The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability, which enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. The SALTO XS4 Original+ is compatible with the array of SALTO platform solutions, including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE, and NFC technology functionality. “By incorporating the latest in technology into the XS4 Original+ locking range, SALTO has delivered a product that extends up-to-date and comprehensive electronic access control to any door,” said Handels. Engine of XS4 Original+ XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture" The XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture, and the same electronic functionalities, which is based on BLUEnet connectivity, and better power efficiency. The feature rich new security architecture, which is protected against internal and external attacks, makes everything more fluid, transforming the way users’ access, operators manage, and installers’ set-up the electronic lock. Catering to a range of access and customer needs There is an XS4 Original+ model for every type of access and customer need. The existing XS4 Original models are fully available in the XS4 Original+ product range, from the key override option to mechanical or electronic privacy models. Just as with the original version, the SALTO XS4 Original+ is suitable for a wide range of customer applications, including interior doors in educational or commercial buildings or tailored solutions for other specific building requirements. Easy to install and retrofit Easy to install and retrofit, the SALTO XS4 Original+ works with ANSI, Euro, DIN, and Scandinavian door industry standards. Universally compatible, it can replace the existing door hardware and fits any door with unlimited model options. XS4 Original+ wide reader models are slightly wider and the reader is now flatter. “SALTO has long sought feedback from our end-users and partners on what they desire in an upgrade and, taking their input into account, we have developed the XS4 Original+ which delivers everything needed for current and future smart lock solutions,” said Aznar Sethna, SALTO Systems’ Chief Sales & Marketing Officer (CSMO). Aznar Sethna adds, “With restyle designs, industry-leading performance and advanced access control features, with impressive communication capabilities, all with incredible durability, the XS4 Original+ ensures customers get secure and safe access, when they need it.” Redefined and stylish design The XS4 Original+ works with existing XS4 Original door hardware. A broad range of different models and functions make smart access to any door possible, in order to cover all needs of any type of building. Visually, the XS4 Original+ differs from the conventional XS4 Original only in a few details, with improved reader aesthetics. Thanks to a sleek design update, the XS4 Original+ looks better than ever Thanks to a sleek design update, the XS4 Original+ looks better than ever. The reader is now flatter and available in black and white color options, for a simplified, modernized front. The ANSI, Euro Wide, and Scandinavian Wide standard reader models are a little wider, thereby creating a more harmonious version. The XS4 Original+ can be tailored to varying building and door needs, with a wide variety of colors and finishes, including the new Dark Bronze finish, and black or white reader options. These can be visualized on a wide range of door styles, by using the SALTO MyLock Configuration tool. Environment friendly access control solution The XS4 Original+ is designed to minimize its impact on the environment. Today, SALTO Systems is carbon neutral for corporate factory operations and is committed to having net-zero climate impact, across the entire business, which includes manufacturing supply chains and all product life cycles. The XS4 Original+ is the latest model from SALTO to be delivered to customers as a net CO2-neutral access control solution. This concept involves offsetting the CO2 emissions generated during the manufacturing process and the logistics until it is delivered to the customer.
Video surveillance is by no means a new addition to the security market, and in fact, is one of the few solutions that almost every vertical requires. However, because so many VMS systems deployed today are outdated and utilize older technology, most businesses are not experiencing the full scope of security across their organization as they could. Containerized VMS v/s traditional VMS Containerized VMS systems have all the prerequisites pre-configured and installed for functionality and do not need any additional frameworks or database software, meaning they are ready to implement instantly. Because these systems do not have separate networks or recording servers, deployments are hassle-free and built with complex global situations in mind. “Containerised systems serve as a true enterprise solution that can scale regardless of an organization’s unique requirements and are capable of fitting into any sized environment. From a small business with one camera stream to a multi-site deployment with thousands of IP camera systems globally, containerized VMS systems create a scalable, simple to use, and robust solution that can be tailored exactly to fit the organization’s needs,” John Rezzonico, CEO, Edge360 & Surveill.
Herta launches a new version of its marketing solution that now displays a control panel with relevant information about the behavior of visitors in a business. The new version of BioMarketing has a Dashboard that shows real-time information on the performance of a business and allows users to view online data on the number of visitors and their recurrence, the average dwell time, or the level of occupancy. ROI on analysis The information of the new product allows to have a deeper description of the different visitor profiles, as well as to be able to identify the ideal buyer in certain areas of interest. In addition, thanks to its statistics filter by dates, it also allows the user to measure the impact of the seasonal campaigns carried out in each center, thus helping to maximize the return on investment with a detailed analysis even by the hour. Herta is currently in the most innovative stage in its history. With more than ten years of experience in the market and clients around the world, adapting both to the post-pandemic world and the new needs of its ecosystem of partners and users strengthens the company to continue leading the field of facial recognition and artificial intelligence.
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialized equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair color, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimizing operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilizing data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behavior. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customization while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximize convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organizations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimize the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Vehicle barriers first rose to the forefront of public attention after 9/11. The focus from 2001 to 2010 was on anti-terrorism, and vehicle barriers appeared at military and government facilities around the world. The U.S. Capitol breach on Jan. 6, 2021, brought heightened attention to the risks in a society that is increasingly fractured and volatile. Various protest events in recent months have made customers more aware of possible threats and prompted many to proactively install vehicle barriers and other systems to protect their premises. Shifting market focus Since 2010, and with the anti-terrorism market mostly saturated, the market focus for vehicle barriers shifted to public safety applications such as stadiums, schools, universities, large tech companies, and data centers. It’s an example of deploying technology developed in “wartime” to the broader public good, says Keith Bobrosky, the new president of vehicle barrier company Delta Scientific Corporation. Withstanding the pandemic The only remaining hurdle for Delta Scientific is to deal with continuing uncertainty going forward Like many in the security market, Delta Scientific has withstood a tumultuous two years during the duration of the novel coronavirus pandemic. They have “come through with flying colors,” says Bobrosky. The company never closed down, and its vaccination rate is high. The only remaining hurdle is to deal with continuing uncertainty going forward. Delta Scientific’s commitment Bobrosky began working in sales at Delta Scientific in 2007. Along the way, he has expanded into management, production, and engineering management. Through it all, he has seen a company that provides employees the autonomy to do their jobs and who have a strong commitment to customers, he says. The privately-owned company is nimble; decisions can be made quickly to respond to market changes, adds Bobrosky. Addressing needs during a pandemic The company was concerned about lower demand when the economy shut down, says Bobrosky, but they did not see an impact. The business was steady as a result of government entities and other organizations taking advantage of being closed to evaluate and address security needs. “We saw a decent flow of government business because of the shutdown,” says Bobrosky. Delta Scientific focuses on the domestic U.S. market but also has a presence selling to partners in the Middle East and Europe, where the equipment is known for its ability to take multiple hits. Even after withstanding an impact according to ASTM standards, their barrier is still operational. Increased steel purchased Delta Scientific ramped up its purchasing power, staving off any shortages and striving to keep lead times short As material shortages have spread through the industry, Delta Scientific has ramped up its purchasing power, staving off any shortages and striving to keep lead times short. Steel is their major component – literally, 98% of the weight of the products is steel, and there are 5,000 pounds of steel per barrier. The price of steel has gone up and there have been shortages. The company has maintained supply by leveraging its reputation and purchasing power. Most of their components are made in the USA, which has helped them dodge the recent challenges of the global supply chain. Application of barriers and bollards Automotive dealerships are another market for Delta Scientific; their bollards and barriers are used as anti-theft devices to keep vehicles from being stolen from a sales lot. Delta Scientific’s products can foil car thieves who might otherwise use a large vehicle to plow through a barrier and then enable a parade of accomplices to drive away in additional vehicles. Auto resellers buy anti-terrorism products to protect their inventories. DSC550 Open Frame vehicle barrier Delta Scientific’s products have evolved from push buttons and relay to touch screens and microprocessors New efficient product designs enable Delta Scientific to use less steel while keeping prices competitive and maintaining crash ratings. The products are more innovative, says Bobrosky. New barriers include the DSC550 Open Frame vehicle barrier, which does not block the view as solid barriers do. During the last decade control systems for Delta Scientific’s products have evolved from push buttons and relays to touch screens and microprocessors, although some customers still prefer the simplicity of the older approach. Portable crash barriers The equipment can also be controlled remotely and integrated with PSIM-type systems. Although the systems are stand-alone, some clients have been toying with the idea of controlling them through the internet, emphasizing the importance of appropriate cybersecurity. A separate line of portable crash barriers can be towed into place in 15 minutes by a vehicle or even a golf cart. They are used for events such as the Democratic and Republican National Conventions, the Oscars, music festivals, etc. There are hundreds of units in the field, available as needed for various events and rented out to event management companies and other organizers. Improving customer relations As the president of Delta Scientific, Bobrosky says his biggest opportunity is to continue improving customer relations – a never-ending goal. He will also strive to increase communication. Looking ahead, additional crash tests are scheduled for 2022, and the company will continue to look for ways to “do more with less.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualization and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralized data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralized data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A cellphone app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Following a change in employment practices, created by the COVID-19 pandemic, many office-based employees now follow a hybrid schedule, working where they are needed or find convenient. The fast-growing use of flexible offices and co-working spaces is a testament to this emerging trend. With employees coming and going as they please, a change in how security and access control are managed is an urgent, but overlooked aspect that many firms are just waking up to now. Clockwise, renowned office space provider Clockwise is the UK and European provider of flexible office space for entrepreneurs and established businesses. The company’s expanding offering includes contemporary offices, meeting rooms, and shared workspaces, across multiple cities. Any business, which relies on flexibility, places high demands on door security and access control. Clockwise needs a broad choice of electronic devices to secure meeting rooms, private offices, communal spaces, and main entrances, which may not all require the same lock type. Access management should adapt to changing needs Access management must be able to adapt and change, as fast as Clockwise clients’ needs The office space demands of a start-up, freelance co-worker, or growing SMB can change at any time, so Clockwise offer a range of membership levels and packages. Access management must be able to adapt and change, as fast as Clockwise clients’ needs. Because tenants come and go frequently, Clockwise facility managers need tailoring of user access rights, to be as easy as possible. Clockwise’s own spaces and a portfolio may also evolve, so any access system must be able to scale instantly up or down. How flexibly Clockwise can deliver for their clients is essential to growing in such a competitive market. Incedo Business offers versatile access control The range of Incedo-enabled devices and door hardware, managed by simple cloud-based software, convinced Clockwise to choose ASSA ABLOY Opening Solutions’ Incedo Business, for all their premises. This platform-based access solution connects security software and hardware within a single, future-proofed ecosystem. The diversity of Incedo-enabled devices enables Clockwise to select the ideal electronic lock for every opening in their properties. Internal private office doors, ‘Zoom rooms’ and meeting rooms, as well as communal area doors, and entrance/exits, are now secured with wireless access control devices from the Incedo Business range. Flexible system management options Incedo’s flexible system management options help Clockwise to operate access control with maximum efficiency. Administrators quickly create groups with tailored access for specific doors. Access permissions may also be time-limited, which is perfect for meeting room bookings or for facilitating access hours for different membership options. Private desk members get 24/7 admission, whereas hot-desk membership is only allowed entry during office hours. According to Clockwise, the flexibility to create groups and the ability to remotely update cards, both work really well for their business.
Abloy UK has been awarded a three-year contract with Thames Water, valued at an estimated ∼750k, to upgrade existing locking systems between now and June 2024. Thames Water is the UK’s largest water and wastewater company, serving 15 million customers across London and the Thames Valley. Cylinders and padlocks Products specified for the project include padlocks and a range of cylinders, which will be used to secure a variety of areas and assets. These include treatment plants and pumping stations on applications such as hatches, doors, and gates. They'll be used at over 22 sites in North and East London including Coppermills and Abbey Mills. Abloy cylinders combine flexibility with security, to provide unbeatable performance and meet the BS EN 1303 standard for Cylinder Locks. Abloy padlocks use a unique rotating disc principle and are renowned for their endurance and maximum resistance against physical attack, offering durability in even the severest of climatic conditions. Access control and keyless solution There is also the future potential to implement a PROTEC2 CLIQ access control system and BEAT keyless solution that combines a digital key, mobile application, and a heavy-duty, Bluetooth padlock, all managed with the visual Abloy OS user interface. Simon Jeff, Market Developer for Critical Infrastructure at Abloy UK, said, “We are delighted to have secured a contract of this size with such a prominent and well-respected company such as Thames Water, and look forward to successfully implementing the new locking systems over the next three years.”
In the beautiful marina in the Danish city of Vejle, Vanderbilt’s ACT365, a cloud-based access control and video management system, was recently installed. The brief The marina wanted an access control system that could integrate with their booking system, Harba. Solutions provided There are 750 members with boats in the Vejle marina, and through the Harba booking system, they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. This is done by simply typing their PIN into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Why choose Vanderbilt? Vanderbilt’s ACT365 readers are made of robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has: A modern and user-friendly design A limitless number of users The possibility for short-term access Both RFID tags and smartphone access availability. Main takeaway For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
Nestled on the Western shore of Lake Como, the Grand Hotel Victoria in Menaggio is one of the latest 5-star luxury properties in the Larian landscape. The magnificent resort in Art Nouveau style, which encompasses a late 19th-century palace and a former monastery, has been completely renovated to host 81 rooms, lush gardens with pool, more than 2,000 m2 spa, 2 restaurants, and 90 car places in the underground parking. End-to-end security solutions The Grand Hotel Victoria in Menaggio, wedged between the lakeside and the heights of the Lepontine Alps, promises its guests a unique experience. To make this happen, it is essential to improve the security level. Dahua Technology is a world-pioneering video-centric smart IoT solution and service provider. Based on technological innovations, it has offered end-to-end security solutions, systems, and services to create value and solve problems for clients. This is why the hotel management entrusted Dahua and MD Impianti – its system integrator partner – the realization of the perimeter and indoor surveillance system. AI-based cameras and deep learning With deep learning, Dahua Perimeter Protection technology can recognize humans and vehicles accurately In the solution provided by Dahua Technology, 15 units of IPC-HFW5241E-ZE 2MP bullet cameras with 2.7~13.5 mm motorized varifocal lens of Dahua WizMind series – equipped with various AI functions such as perimeter protection and people counting – were installed to guard the outside of the building providing clear images even in the low-light environment due to IR LEDs (range up to 50 m), WDR (120 dB) and Starlight technology (till 0.0002 Lux before switching to B/W). With the deep learning algorithm, Dahua Perimeter Protection technology can recognize humans and vehicles accurately. In the restricted areas (such as pedestrian areas and vehicle areas), the false alarms are largely reduced. Dahua Lite series network camera After crossing the main entrance surmounted by a balcony that rests on four Doric columns, no less than 110 units of IPC-HDW2431T-AS-S2 4MP eyeball network cameras – featuring IR LEDs and Starlight themselves - discretely watch over the premises of the historical and new wings. With upgraded H.265 encoding technology, the Dahua Lite series network camera has efficient video encoding capacity, which saves bandwidth and storage space. This camera adopts the latest Starlight technology and displays better color images in the condition of low illumination. Enterprise-level NVR NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage Two 128-channel NVR608R-128-4KS2 network video recorders with 8 hard disks and redundant power manage all streams, while the networking was implemented with ePoE, PoE, and aggregation switches, connected by CAT6 cables and optical fiber. For applications where details are critical for identification, this enterprise-level NVR provides a powerful Intel processor with up to 4K resolution. Additionally, the NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage, and backup storage. Remote monitoring All images collected by the whole system can be visualized both in the concierge and remotely. The latter is a feature that allows great flexibility to meet the needs of the end-user, who is already evaluating the integration of DSS centralization software and a video wall. The system protecting the prestigious Gran Hotel Victoria in Menaggio demonstrates once again how Dahua Technology, along with its partners and supply chain, is capable of providing high-profile and tailor-made integrated security solutions, suitable for any scenario and compliant with current legislation.
Salient Systems, a pioneer in open architecture video management systems, has announced that its CompleteView VMS, an open platform video management system has been selected by Maine-based Brigid Farm for a multi-state video upgrade project for the company’s cannabis facilities. With headquarters in Saco, Maine, Brigid Farm is a vertically integrated cannabis firm that has been providing cannabis products for more than a decade. The company has recently expanded its operations to include multiple grow fields, an edible manufacturing facility, and two retail stores – a total of eight locations in Maine and one in Massachusetts. Remote and centralized monitoring As each location poses its security challenges, Brigid Farm chose the robust, open platform CompleteView VMS to enable remote access to and centralized management of video from all the company’s locations, including its retail operations, The Farm Stand, and The House of Hash. We were looking for a robust VMS that could help us easily monitor all of our operations from anywhere" “Given the heightened security concerns in the cannabis industry, and the unique security needs for our different locations, we were looking for a robust VMS that could help us easily monitor all of our operations from anywhere,” said Brett Messer, owner, and general manager of Brigid Farm. “It was vital for us to have an open system that can accommodate our future technology needs and expand as our company grows.” Integration software and LPR Brigid Farm also selected CompleteView for its ability to integrate with several other key operational technologies, including license plate recognition (LPR) to monitor daily incoming and outgoing deliveries, point of sale software for retail transactions, and the cannabis industry seed-to-sale tracking software, which cannabis businesses use for regulatory compliance. “Our CompleteView VMS is widely used in the cannabis market as it is uniquely positioned to solve pain points for cannabis operators,” said Sanjay Challa, chief product officer, Salient Systems. “We’re excited to work with Brigid Farm to fulfill their integrated video management needs and provide them with operational visibility across their enterprise.”
Dahua Technology is a globally renowned video-centric smart IoT solutions and services provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services, in order to create value for city operations, corporate management, and consumers. Dahua Technology has designed a video surveillance and control solution for a popular Panamanian Food Company - Empresa Panamena de Alimentos (EPA). Dahua’s Security solution Empresa Panamena de Alimentos is a renowned company in the processed food industry in Panama, Central America. It was founded in 2012 and owns production plants and warehouses in the capital city, as well as agencies around the country. EPA’s products, including all kinds of cookies, coffee, and pasta, are already important parts of consumers’ day-to-day life. With the prevailing COVID-19 pandemic risks, EPA needed a system to sustain efficient management and operation, over their staff and facilities. Implementing multiple access controls in the facilities As a food company, the operations of the company need to be under caution, especially during the pandemic As a food company, the operations of the company need to be under caution, especially during the pandemic. It was necessary to implement multiple access controls in the facilities. With multiple plants located around the nation and accelerated growth, a centralized monitoring system for all equipment, alert management and user reports was needed. The solution, applied at EPA’s facilities, integrates various electronic security systems under a single platform and was evaluated based on the company’s needs. ANPR, AI-based cameras and access control systems “Currently, 480 Dahua devices have been arranged. Among them are different models of cameras, access control systems, and automatic number plate recognition products. AI-based cameras enhance the level of personnel protection. Everything is monitored by a DSS Express server in the main plant,” said Luis Araujo, the Manager of Infrastructure and Telecommunications of the Secutec Panama. Every day, more than 800 employees enter EPA facilities nationwide, the access control system allows a faster and safer automated entry of the staff and their cars. access controllers and Pro Network Video Recorders Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted Apart from automatic number plate recognition (ANPR) devices, more than 20 access controllers (ASI7213X-T1) were installed in main offices for temperature monitoring and attendance management. Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted. With a powerful processor, they have the capability of 4K resolution processing and high definition recording quality. Perimeter protection and access control In Dahua Technology’s security solution, perimeter protection and access control are both realized. “We have had Dahua equipment for 7 years. It is a brand that has been of great help to our safety. It has contributed to continuous and steady operations throughout the COVID-19 pandemic,” said Guillermo Figueroa, EPA’s Safety and Control Manager. Javier Rodríguez, Secutec Panama’s Operations Manager, valued the quality and technology of Dahua’s solution, which has been ‘key’ for the development of their projects, the support and accompaniment to the brands that are planned to be developed. Trust in Dahua Technology’s solution “We are very proud that our teams are here for EPA and that companies, like EPA and Secutec, trust Dahua Technology. We continue to innovate to offer solutions that help companies to work in a safer and smarter way,” said Fermín Osorio, an Engineer at Dahua Technology Ltd.
Round table discussion
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?
14 Success Stories About How Video Technology Is Improving City LifeDownload
Empowering Cameras With AIDownload
The Rise of Ethical Facial RecognitionDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download