Construction security systems
Eagle Eye Networks, a global company in cloud video surveillance announced an official partnership with Co-Liv, a non-profit association of coliving professionals. As the global co-living movement continues to gain momentum, technology companies such as Eagle Eye Networks for video surveillance and Salto for Access Control will be crucial in providing tech solutions that allow coliving operators to scale faster and more efficiently than they would on their own. Advantages of cloud survei...
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
Securitas UK has been officially recognized as a Top Employer by the Top Employers Institute for its commitment to delivering exceptional people management and HR strategies. The Top Employers Institute program certifies organizations based on the participation and results of their HR best practices survey. This survey covers six HR domains consisting of 20 topics such as People Strategy, Work Environment, Talent Acquisition, Learning, Wellbeing and Diversity & Inclusion, and more. Promoti...
Following the release of FLIR United Video Management System 9.0 (United VMS) in August 2020, FLIR announced the global availability of United VMS 9.0.1 with new advanced features. The latest platform update offers further streamlined access to system status and alarms around the clock for security teams to react to threat activities faster while enjoying improved reporting and cybersecurity functionality. Included advancements The advancements include updates to the FLIR Latitude VMS Softwar...
This year has witnessed an array of unprecedented crises that disrupted people's lives around the world. Nevertheless, despite challenges and difficulties, people and organizations around the world are pulling together to help those in need. It could be a donation of clothing and food, or just a simple word of encouragement and support. Regardless of nationality, race, ethnicity and other differences the world has, every person stands together. As a front runner of video-centric smart IoT solut...
Security personnel must be able to quickly detect unauthorized vehicles and individuals at critical infrastructure sites. Without intrusion detection, entities like electrical substations can be subject to physical attacks. 88 percent of substations experience at least one break-in every year and 10 percent see more than 20 intrusions in the same time frame, according to CIGRE, a global electricity industry organization. To safeguard remote substations from external threats, electric utilities...
PAC has produced an integration guide to Dahua’s Thermal Monitoring Access Control Terminal (TMAC) to allow easy checking of a person’s temperature as well as confirmation a face mask is being worn when entering a building or any area secured by PAC access control. This integration guide is for use in Europe, UK and APAC. Enhance the safety of occupants As businesses adapt to current COVID-19 measures, building managers need technology to help them continue to enhance the safety of their occupants. In conjunction with other measures and procedures, and as part of an overall strategy, thermal monitoring and automated face mask detection present an additional method to control security and adherence to safety measures by visitors to the building. Integration PAC’s long-standing tradition of security integration with Time and Attendance, CCTV monitoring, and other building and occupancy control services is now extended to the Dahua Temperature Monitoring Terminal, which has the functionality to check a person’s temperature and determine if a face mask is being worn when entering a building or area. This integration with Dahua’s TMAC allows access rights for individuals to be dynamically managed. So, by taking the output from the Dahua TMAC into the PAC access control system, access rights can be withdrawn for anyone that does not meet the safety standards required to gain entrance. Set-up and management Multifactor authentication supports the Dahua temperature and masks checking functionality Integrators will find set-up simple, with only some basic wiring and a few configuration settings within the Dahua TMAC required in order for the system to be ready and active. For users, access control list set-up and management are also easy and provide a single access control system for the management of all secured areas and entrances. Multifactor authentication & single keyholder database Multifactor authentication supports the Dahua temperature and masks checking functionality before being able to use the PAC access control ID Device to unlock the secured entrance. A single keyholder database enables clear demarcation of building controls as the PAC access control system is used for all access control and the Dahua Thermal Monitoring Terminal is effectively used as an added check for temperature and mask-wearing.
Videonetics, an AI & DL powered Unified Video Computing Platform (UVCP™) development company, proudly launches its third generation of Intelligent VMS that delivers unified, next-generation user interface, military-grade security, rugged with unprecedented levels of high availability and a future-ready solution, for any size of deployment across various industry verticals such as smart & safe cities, critical infrastructure, industrial, mass transit, education, healthcare, and retail to name a few. Building on more than a decade of R&D in the domain of video computing, computer vision, artificial intelligence, and machine learning-based technologies, Videonetics released its Intelligent VMS 3.0 encompasses multiple video computing services in a unified, homogenous software architecture platform and goes beyond mere capture-record-display generation of Video Management. Key differentiators Videonetics has been ranked #1 Video Management Software provider in India, and among the top 5 in Asia (IHS/Informa Tech Research). Some of the key differentiators of Videonetics Intelligent VMS 3.0 are as follows: Next-Generation User Interface The Intelligent VMS 3.0 offers a modernized user experience with an intuitive, responsive, adaptive, and friendly interface. The interface supports user-specific camera layouts, hierarchical camera groups to enable the user to multi-task and improve operational efficiency. Intelligent VMS supports all standard web browsers and provides mobile apps for both iOS and Android platforms. Highly Secured The Intelligent VMS 3.0 is cyber security-hardened to meet today’s evolving threat landscape, by ensuring data safety and accessibility only to the authorized personnel with security protection. It offers various security measures such as multi-factor authentication, SHA 256, RSA & AES encryptions, video watermarking, distributed storage management for critical data, and secured channel communication to name a few. Business Continuity DC-DR framework of Intelligent VMS 3.0 handles the challenges through a practical, flexible, and service-oriented architectureThe DC-DR (Data Center – Disaster Recovery) architecture of Intelligent VMS 3.0 is built considering the complexities of vast amounts of video data generated from a large number of cameras in the field, protecting the same from loss or corruption and transferring data to another location. The DC-DR framework addresses the challenges through practical, flexible, and service-oriented architecture. It ensures business continuity with minimum or no service disruption. Collaborative Vigilance The Intelligent VMS 3.0 features a collaborative surveillance platform for the operators to exchange messages and share observations. It offers features such as sharing camera views, importing operator screens, and a chat room for discussions. Geo-Fence Based Situational Awareness The Intelligent VMS 3.0 goes beyond conventional map-based viewing to geo-fence based situational awareness possibilities. Users can easily draw a virtual fence with geo coordinates or simply using the mouse to see relevant cameras within the fence with all the events of interest. The Intelligent VMS 3.0 also comes with a unique feature of neighborhood view in which a camera can be defined as a master camera which in turn can be associated with the nearby camera to provide a complete neighborhood view in case of any event of interest. It has ready integrations with map services such as Google Map, OpenStreetMap, etc. to provide drag-and-drop of the cameras for alerts, archived, and live video feeds. The in-built pencil tool helps in associating the cameras on the map for a quick geo-situational awareness. Scalable The scalability of Intelligent VMS 3.0 is unlimited by the design of the architecture. The computing nodes can be provisioned as and when required, and they auto-register themselves to the system with minimum configuration which makes it extremely easy to deploy. Cloud-Ready Intelligent VMS 3.0 comes with built-in readiness for deploying it on any cloud of customer’s choice Many of the large enterprises and in fact, even government organizations are now adopting the Cloud First policy and most of their business processes are already utilizing the benefits of Cloud these days. Intelligent VMS 3.0 comes with built-in readiness for deploying it over the cloud be it a public, private, or a hybrid cloud. It has been built on a cloud-agnostic stack to ensure that it can be deployed on any cloud of customer’s choice to ensure full flexibility, openness, and therefore the lowest cost of ownership. It comes with its own server resource orchestration technology, streaming service engine, and intelligent storage technology to help the customer take full advantage of the cloud setup. Intelligent VMS 3.0 also comes with ready integrations with popular cloud service providers. AI-Powered In the series of another first Intelligent VMS 3.0 comes with pre-integrated artificial intelligence and deep learning framework called DeeperLook™ – an indigenously designed highly efficient AI framework which ensures quick and easy deployment of AI-based video analytics use cases for various verticals. The framework offers over 100+ such as AI-based Video Analytics use cases for different industry segments. Authority statement On the launch, Dr. Tinku Acharya, Fellow IEEE, Founder & MD of Videonetics Technology Pvt Ltd expressed, “We are honored to introduce the third generation of Intelligent VMS, the future of Video Management, commits to addressing everyday challenges of users by handling cyberattack threats with multi-pronged security, 24x7 business continuity, unprecedented friendly experience, collaborative vigilance and much more.” “Video management software has always been the backbone of the effective security system of any installation, and the Intelligent VMS 3.0 brings a whole new level of user experience and support security professionals to manage safety, improve efficiency while reducing TCO." "Intelligent VMS 3.0 is a solution that you can invest in today and be confident it will be your solution for the future.”
A new England-wide study by IP video integrator NW Security completed in September, found that 97 percent of medium and large-sized businesses wanted to make significant improvements to their existing CCTV systems. Over a third (36 percent) of firms captured in this study wanted their CCTV systems to be integrated better with other security-related systems such as access control, fire, and intruder alarm systems. Faster access to key CCTV data Nearly one in five medium and large-sized firms (19 percent), wanted their CCTV systems to find and retrieve footage of incidents easier and quicker. This group expressed dissatisfaction that it was taking too long to find video following known security incidents. Battle to reduce false positives Almost one in ten firms (8 percent) wanted to dramatically reduce the number of false positives that their CCTV systems were flagging - admitting that false alarms were consuming too much of their time. False event triggers used to be a much bigger problem than it is today. NW Security thinks its good news that 92 percent of CCTV system managers are happy with the accuracy of event triggers as a result of analytics improvements and better configuration of systems. Frank Crouwel, Managing Director of NW Security explained, “False positives used to be a massive problem in first-generation video analytics software, but it should be possible now to deploy and tune next-generation video analytics tools to reduce false positives dramatically.” Upgrade to intelligent video analytics Connected with this comment, a further 8 percent of firms captured by NW Security’s market study wanted their CCTV systems to be upgraded to add intelligent video analytics to better support post-event decision-making. GDPR compliance demand 5 percent felt their video systems need to have GDPR compliance and over one in 10 (12 percent) want to improve resilience and back-up systems 5 percent were concerned that their video systems needed to have GDPR compliance baked into it, to ensure compliance in the way video surveillance data is collected, stored, accessed and processed. And over one in 10 (12 percent) wanted to improve resilience and back-up systems around surveillance recordings. Real operational requirements NW Security queried why so many firms wanted full system-level integration between intruder and fire alarm systems with CCTV. It believes some of this demand tends to come without considering the real relevance for an individual company’s security needs. Businesses must work out the real operational requirements (ORs) of each and every camera they have installed. Then they must base modifications and integrations on what is really needed in security terms. Unsynchronized software and firmware updates Frank Crouwel at NW Security explained, “Integration should be driven by a genuine Operational Requirement, not just by the desire to integrate cutting edge technologies for the sake of it. If you’re not careful, you can end up with a system which is over-specified and underperforming.” “The other factor at work here is vendor hype. Marketing materials from vendors endlessly promote the twin mantras of innovation and integration.” “However, the reality on the ground is that getting systems to work well together is still difficult work. It can still be challenging to maintain systems over the long term due to often unsynchronised software and firmware updates.” User training requirement Highlighting the importance of user training when new video management systems (VMS) are deployedNW Security attributes the fact that one in every five firms were struggling to access relevant video recordings following incidents, to the need for more comprehensive user training. NW Security highlights the importance of user training when new video management systems (VMS) are being deployed or when new staff is joining. Configuration change “VMSs search capabilities today are generally very good at helping the user locate relevant video sequences today. But operatives need to know how to use the on-screen tools to the fullest.” “It’s also worth looking at how much ‘empty data’ you are collecting. It’s easy enough to set up a recording on relevant event triggers using detection analytics for example, so that only relevant activity is collected. This configuration change alone often reduces the amount of data captured by over 50 percent,” Frank Crouwel added. Optimizing CCTV systems Frank Crouwel of NW Security, summarized, “Although the expectation of systems is rising rapidly, our findings show the need to get back to basics: investing in user training so that all your security team can put VMS’ increased functionality to work, and configuring cameras in line with defined Operational Requirements, both remain important but often neglected areas for optimizing CCTV systems.”
Interphone has published a security system and building technology whitepaper to help developers, contractors, installers, and managing agents better understand their responsibilities regarding the General Data Protection Regulation (GDPR). The in-depth report, titled A guide to GDPR compliance for the commercial residential marketplace, has been produced jointly with legal training specialist Woolven and Brown to provide an industry-specific look at the data protection and privacy law. GDPR and Data Protection Act 2018 “Security systems and building technologies now hold personal data in many hidden places, so organizations within the commercial residential marketplace need to know what they can and cannot do in relation to holding this information based on the laws that are in place,” explains Charlotte Woolven-Brown, Managing Director of Woolven and Brown Ltd. “The exact requirements can often be confusing, so this guide is designed to help property professionals understand what the GDPR and the Data Protection Act 2018 are and how they apply to their property businesses.” Product-specific policy requirements The white paper provides an introduction to the GDPR, outlining the main considerations for commercial residential property organizations and the impact it may have on them. The guide also covers product-specific policy requirements for those security systems and building technologies that either hold a lot of data or share data with a third party. This includes CCTV, automatic number plate recognition (ANPR), biometrics, voice recognition, door entry, and access control. Process and manage data “The GDPR and the Data Protection Act 2018 have changed the manner in which we process and manage data. Failure to comply could be extremely damaging in terms of potential fines and the threat of civil action, while adverse publicity risks significant damage to the reputation of an organization.” “The advice to property businesses is clear, understand your responsibilities and get it right from the start,” concludes Woolven-Brown. Seeking clarification Julian Synett, CEO of Interphone Limited commented, “Since the introduction of the GDPR, we have had developers, contractors, installers, and managing agents seeking clarification on their compliance requirements for the security systems and building technology we develop, install and maintain.” “This suggests there is still a lack of clarity about what is needed, so we have created this white paper to help answer many of the GDPR questions that property businesses currently have.”
A new study of CCTV system managers, commissioned by security technology company NW Security, found that nearly half (46 percent) of medium and large-sized businesses across England, plan to use their CCTV systems to support remote management of processes and people in the workplace. The study also uncovered the fact that the primary reason for investing in CCTV systems in the workplace is to keep staff safe while working. Remote management One clear finding was that CCTV systems are increasingly being used for a new purpose during the pandemic: remote management. Many businesses from manufacturers to distribution centers have physical operations that need ongoing visual monitoring from wherever managers are based during the pandemic. Frank Crouwel, managing director of NW Security explained, “CCTV systems can provide the eyes and ears for managers working from home or elsewhere. CCTV can help them to make sure systems and processes are running smoothly, ensuring staff are working safely and with sufficient support.” Survey on medium and large-sized firms 52% felt CCTV provides another method of identification and 50% felt CCTV systems manage and enforce social distancing NW Security’s survey also asked medium and large-sized firms whether they expect their existing surveillance systems to be able to support a safe return to the workplace for most employees, in the light of COVID control measures. Over half (52 percent) of businesses felt CCTV could be used to provide another method of identification in support of some workplaces’ drive for contactless access to work premises and buildings. And half (50 percent) felt CCTV systems ought to be able to help manage and enforce social distancing in the workplace. In addition, just under half (48 percent) thought CCTV ought to be used to trace all people's movements in and around the office to ensure that staff was following directional arrows around buildings and wearing face masks for example. COVID control measures Frank Crouwel, Managing Director of NW Security, added, “Our study uncovers key areas where CCTV systems are being used to help businesses manage through the pandemic.” “Video surveillance systems are now supporting observance of COVID control measures associated with ‘back to the office’ pushes after lockdowns for example. CCTV is also enabling more effective remote management during full lockdowns when most of us need to be operating from home and minimizing travel.” Video technologies Frank continues “It seems that there is a new realization of the role of video in managing businesses. The increase in the use of CCTV as a remote management tool has been running in parallel with the exponential rise of video conferencing during the last seven months.” “The pandemic has forced us all to use these existing video technologies, and it has simultaneously accelerated the demands placed on CCTV systems by managers right across businesses.”
Radio Physics is pleased to announce the global launch of Optracon, a stand-off threat detection solution. Optracon is a fully automated multi-sensor fusion solution for detecting concealed mass casualty threats at distances of up to 30m. Harvesting data from state-of-the-art radar, video analytics, LiDAR, machine learning algorithms, and artificial intelligence to produce the world’s leading concealed threat detection solution. Following more than 18 months of development, greatly aided with the support of European Commission funding from a Horizon 2020 SME instrument grant. Performance trials The product has completed successful final trials, held recently at a sports stadium in Warsaw, Poland. Radio Physics is pleased to announce the performance of the technology greatly exceeded expectations and that of previous generation products, and Optracon™ has been released to the general market. Tracking people in crowds Optracon tracks people in crowds by merging modern 3D video analytics and LiDAR technologiesOptracon tracks people in crowds by fusing modern 3D video analytics and LiDAR technologies to provide an intelligent multi-sensor digital understanding of groups and flows of people – as a collation of 3D objects with previous and forecast coordinate paths. Threat detection radar This contextual view provides both a human and machine-based view of people that can/should be, or already have been, scanned by Radio Physics mm-wave MiRTLE OM30 threat detection radar sensors. Each radar has its own boresight camera that uses the same video analytic software as the context setting overhead camera(s) to focus on relevant body areas for mm-wave scanning as well as post-scan tagging. If necessary, a direct drive gimbal moves the radar unit through either small or large angular rotations at speed to target and scan individuals within a region of interest. Authority statements Mark Pritchard, CCO said, “We are delighted with the launch of Optracon, it is exciting times at Radio Physics, and are looking forward to working with our partners in the coming months on the many already identified opportunities across Europe and globally.” Gary King, CEO added, “We extend our sincere thanks to the European Commission and to our hosts and partners in Poland, without whose financial and logistical support this initiative would not have been possible”.
Construction site theft can cause project delays, property damage and loss of profit for companies in the construction sector. It is imperative to deter thieves from targeting construction sites with the help of construction site security. Here, we look into the various security options and how they can help protect your firm from the threat of a break-in. Construction theft has soared during the COVID-19 Pandemic Construction site theft is an ever-increasing problem in the UK, costing the industry an estimated £800 million ($1,040 million) per year. Unfortunately, this type of crime has accelerated further throughout lockdown by an estimated 50% due to the abandonment of construction sites across the UK. With many uncertainties around a potential second wave in the UK, it is time for construction firms to enhance their security strategies to help prevent thieves from becoming opportunists on construction sites. Why are construction sites ‘easy’ targets? Construction sites can easily be targeted, as they typically lack adequate security loss prevention practices. The most popular security-related issues that are leading causes of construction site theft are: Poor overall site security Multiple pieces of equipment sharing the same keys Easy access to open cabs Unsecured sites, particularly at night and over weekends Lack of product identification systems If you do not want your site becoming a costly statistic, you might want to try implementing some or all of these preventive measures. Strengthen your perimeter Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the site. To stop opportunist thieves in their tracks, you will need to go one step further by erecting robust fencing and concrete blocks along with signage warning intruders about the consequences of trespassing. Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the siteIf potential trespassers can see that it would be too challenging to attempt a break-in, then they will look elsewhere to find another construction site which is not as well secured. Lock away valuable tools When considering the vulnerabilities in your construction site, it pays to think about this from the perspective of a criminal. What is it exactly that they are looking for? What can a thief steal easily to make money if they were to remove something from your site? Unfortunately, many construction firms do not lock away their tools, materials or vehicles properly, which makes them an easy target. Ensure valuable tools and materials are locked away and are not left unsecured or lying around. Criminals are mostly interested in scaffolding, bowsers and other valuables that are quick to sell on, so it is important to have a strategy in place to keep these locked away, safe and securely. Put tracking devices in your equipment If you are unable to securely lock away valuable tools, then modern technology makes securing equipment easier than ever before. Tracking devices can be installed onto vehicles and equipment; if any thief is unwise enough to steal from the site, site owners will be able to provide the location to the police who will be able to follow this up. Site owners should also engrave company identification numbers on valuable tools, equipment and vehicles so that it can easily be identified and will serve as proof who it rightly belongs to. Invest in CCTV Closed Circuit Television, otherwise known as CCTV, is renowned for being one of the most effective deterrents for thieves, especially when it comes to construction and building sites.The items that criminals steal from sites are notoriously hard to trace The items that criminals steal from sites are notoriously hard to trace, but if you have CCTV, there is a chance that you can capture clear footage to help bring criminals to justice, such as footage of the vehicle used and the car licence plate. CCTV cameras can help to oversee every inch of a construction site, and can even be hidden out of sight where required. Step up with regular site patrols With a wide range of security monitoring methods available, stepping up on regular site patrols can help to keep track and respond to any criminal activity taking place on your site. Traditional site patrols can be carried out on a schedule by professional SIA-approved security agents. With the presence of guards patrolling a construction site, any criminals in the area will be deterred to force entry onto the site. Schedule supply deliveries on an as-needed basis To prevent an excess of supplies ‘sitting around’ on the site, construction site managers should instead order what is needed at the time, so that valuable materials are not left around waiting to be stolen for weeks at a time. Good planning and excellent communication between the team will be required so that projects are not delayed, but planning accordingly will help to reduce the chances of theft on a construction site. Drone surveillance As technology becomes more and more advance, drone surveillance may soon be a security option that many construction sites could benefit from.Many construction firms in the UK are using drone services to provide aerial images, and are seeing huge cost savings by either purchasing and operating their own drones or by hiring out the work to a company equipped to provide imaging.As technology becomes more and more advanced, drone surveillance may soon be a security option With surveillance drones already handling tasks like mapping and surveying of construction sites, one day they may be able to patrol construction sites at night, equipped with motion sensors and infrared or night vision cameras; They could be automatically deployed from a charging station and fly along a pre-programmed route at regular intervals. One to keep an eye on for the near future! Construction site security to help protect your site If you are ready to tighten security on your own construction site, then your starting point will be to identify your main vulnerabilities and get in touch with a reputable security specialist.
The COVID-19 pandemic has presented an unprecedented challenge to businesses. From retail stores to office buildings to warehouses and construction sites, a big question looms: how can landlords, executives, and employers ensure their facilities don’t contribute to the spread of the virus? A low-tech solution - the face mask - has become a leading preventative measure. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Layers of security They can also be integrated into access control systems or woven into other preventative measures that create overlapping layers of security. These cameras are an ideal solution for low-traffic, remote sites, or areas that are only accessible to employees that need to monitor mask compliance but at which hiring a manned guard is just too expensive. Cameras with mask detection capabilities are especially useful when the technology piggybacks on existing autonomous devices, such as mobile security drones. The premise is simple. When a person without a mask is detected by the autonomous robotic security device, the system can generate, depending on customer preferences, audible and visible alerts to remind people to mask up. It also feeds alerts to a cloud-based data storage system so that security executives can analyze data for trends or quickly locate video of important incidents. Why masks? One study published in the Proceedings of the Royal Society A highlights the benefits of mask usage. If just 50 percent of people use masks, the rate of COVID-19 transmission will slowly decline. If 80 percent of people use them, the rate will plummet. Bu,t people don’t love wearing them. They’re hot. They make eyeglasses foggy. It’s hard to make yourself heard when talking to others. We’re all familiar with industries that wear masks of some type or other, on a regular basis - health care, construction, and heavy industry to name a few. But for the general public, wearing a mask for long periods of time is not a regular habit. For the general public, wearing a mask for long periods of time is not a regular habit We also know that other measures site managers have used to limit the spread of coronavirus are ineffective. For example, at least three meatpacking plants rank among the top 50 locations for coronavirus clusters. One factor driving that spread: many employees, to avoid missing a day’s pay, masked their mild fevers with ibuprofen to fool the infrared temperature scanners that employers used to protect against the outbreak. The paradox of masks, however, isn’t that they protect the wearer from infection. It’s the other way around: when an infected person wearing a mask sneezes, coughs, or breathes, they don’t spread the virus as far, and thus masks slow the spread of the virus from infected people, including those that are not showing symptoms. Prove it One of the very reasons why county and state governments have instituted mask orders is simple: it’s an easily verifiable sign that an organization is taking steps to limit the spread of coronavirus. Mask detection cameras, coupled with autonomous security systems, can provide the documentation employers need to ensure mask compliance. Imagine, for example, a warehouse full of manual laborers. The county orders everyone to wear a mask any time they leave home. A disgruntled employee, recently terminated, files an anonymous complaint to local health officials stating that the warehouse isn’t enforcing mask compliance - or worse, preventing employees from wearing masks to prevent theft. The county sends an inspector. Mask detection cameras provide site managers with the documentation they need to disprove these allegations. The autonomous systems developed by RAD will feed video footage into a cloud database, documenting not only the instances of non-compliance, but also the instances of compliance - with the mask clearly highlighted. Any inspector that arrives on a job site can see hours and hours of footage, without having to pour through hours of video. Reducing confrontation We’ve all seen the videos in which angry shoppers confront retail clerks and security guards over mask usage. In some cases, these confrontations have turned violent, resulting in injury or death. For every one of these videos, there may well be hundreds of others. While most of the videos featuring mask confrontations focus on retail settings, manned guards also face challenges in enforcement. Confrontations over mask usage have the potential to drive up workman’s compensation claims higher when guards are injured. Because autonomous security units generate alerts automatically, the chance of confrontation is minimised. It’s easy to imagine a couple of scenarios in which autonomous units can be beneficial. In health care settings, where emotions run high, autonomous devices can serve as a force multiplier for patrolling guards in parking areas. For example, roving units can identify people that are not wearing masks, and remind them to do so before they enter the building. These can also be placed in entryways that generate alerts as visitors approach doors. In many buildings, mask detection systems can be integrated into access control systems Autonomous security units can be deployed for a fraction of the cost of manned security. In healthcare, autonomous units can be used to re-allocate security spending, placing less emphasis on low intensity guards whose primary function is to observe and report - particularly those that patrol parking garages - and more emphasis on trained professionals capable of defusing confrontations inside the hospital. In other words, autonomous units outside allow facilities to hire better quality inside, where confrontations are most likely to take place. In many buildings, mask detection systems can be integrated into access control systems, which might be especially useful at entrances that are not manned by security, but accessible via key card. Changing behaviors There was a time when smoking in public was not seen as particularly anti-social. Almost everyone will stop at a stop sign, even when we can see for miles in every direction, and we know that the risk of an accident is zero. We do these things because we have been trained to. These behaviors make us safer, but we didn’t adopt them overnight. Many of us forget, but the fight over banning smoking in bars and restaurants was filled with confrontation. So, too, will it be with mask compliance. But time is short, and we all need to do everything we can to encourage good behavior. Mask detection technology can do that, and these solutions are very cost effective. In some cases, the cost may be just 5 percent of using a manned guard. They’re effective too. Autonomous systems enforce mask policies consistently and drive accountability. That can make us all safer.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organized at a grand scale at Nashik, Haridwar, Ujjain, and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms, and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralized Monitoring Software (CMS)
Traffic continues to grow in every major city. But how do people beat congestion in these restricted urban spaces? In China’s ancient-walled city of Xi’an, they’re adopting an intelligent traffic management system based on Hikvision technology - and boosting traffic flow while reducing journey time. The Chinese city of Xi'an, known as Chang'an in ancient times, was the center of ancient oriental civilization. Thirteen dynasties spanning Chinese history have chosen Xi'an as their capital. Today, Xi'an is not simply a part of history: it’s a high-tech hub, renowned across China for its scientific research and education, manufacturing, technology, and transportation. In spite of being a modern hub, Xi’an still retains its ‘checkerboard’ layout from the Tang Dynasty, complete with its border of tall and ancient walls. Urban Traffic Administration Nevertheless, while economic growth has enabled the city to develop, the walls place great restrictions on the city’s daily movement - especially to its burgeoning traffic. Vehicles can only enter and exit through the city gates, but with some three million vehicles in the city, the limited number of entrances was beginning to cause serious congestion. What’s more, there are also many ancient ruins in the city, which were further limiting the development of the urban area. Managing a growing city while protecting its history presented a serious challenge to Xi’an Plus, as of 2018, the city was home to over 10 million people, while the number of construction projects was steadily increasing. Managing a growing city while protecting its history presented a serious challenge to Xi’an. So, to address this, Xi’an Urban Traffic Administration turned to Hikvision and its intelligent cameras. Traffic sensing system “Xi’an’s city walls make it impossible to increase the size of the urban area. So, it was only through technology that we could allow the modern city to grow and develop,” says Lihu Ma, the Project Manager from Hikvision. “A core part of the Hikvision solution involves our AI-powered video technology.” The Xi'an traffic police worked with experts from Hikvision, as well as urban planning experts, internet service providers and other technology companies, to design and implement an intelligent traffic management system. The construction of this system fully utilizes Hikvision's core advantages in urban transportation intelligence, employing AI-powered video to create a powerful traffic sensing system. Physical urban transportation network The latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas “Effectively, we are building a bridge between an intelligent digital world and the physical urban transportation network in Xi’an,” explains Lihu. The intelligent traffic management system analyzes comprehensive and detailed data about the movement of traffic through the urban Xi’an area, and uses the insight gathered to make the flow of traffic more smoothly in three key ways. Comprehensive road traffic violation monitoring Xi'an traffic police have installed Hikvision’s Checkpoint Capture Cameras and Intersection Violation Capture Units as part of a monitoring system that can detect illegal vehicle behavior at intersections. These full view ultra-high zoom cameras record vehicles making illegal maneuvers - such as running red lights, making banned turns and illegal lane changes - in real time. What’s more, the latest sonar monitoring equipment is being used to detect illegal use of car horns in banned areas. Intelligent cellphone applications Visual integrated command and dispatching platform Using real-time video streams from Hikvision Traffic Flow Capture Cameras, a number of road condition perception technologies, plus intelligent cellphone applications, Xi'an traffic police has created a visual command and control center, coupled with an intelligent police dispatch system. All data is aggregated and dynamically displayed on a large screen in the command and control center. In the event of a traffic incident, the system generates dispatch recommendations intelligently, according to the location and distribution of traffic police officers throughout the city. Those closest to an incident receive an automated message to their cellphone terminals, enabling them to arrive at the scene quickly. Intelligent traffic management system The Xi’an traffic management team also employs congestion management practices More importantly, the intelligent traffic management system uses advanced machine learning capabilities to gain insight into typical congestion patterns, in order to actively identify potential traffic events before they happen. By analyzing large volumes of road condition data and information from Hikvision’s intelligent video cameras, the system can predict which intersections are most prone to congestion and when, enabling traffic police to put evasive measures in place before serious issues arise. Improved vehicle flow capacity with intelligent signal control The Xi’an traffic management team also employs congestion management practices to ease the flow of traffic, largely through the optimization of signal timing. Using Hikvision intelligent video cameras coupled with augmented reality (AR) technology, the intelligent traffic management system analyzes traffic flow data and dynamically alters the timing of signal lights accordingly. Adjusting signal timing It will monitor traffic flow, line length and average driving speed in all directions of intersections in real-time, automatically adjusting signal timing to optimize the flow of vehicles. The Xi'an traffic management system has now been trained with a wealth of traffic data, including Hikvision video, enabling it to build multiple intelligent algorithms for managing congestion in the city. Driver behavior is improving, and drivers are becoming more compliant with the rules of the road First of all, map-based congestion reports suggest that Xi'an's congestion rankings have improved significantly. In fact, compared with the test results of pilot roads before the system went live, intelligent signal control alone has increased the throughput of traffic by 10%, while the average vehicle journey time is reduced by about 12%. What’s more, driver behavior is improving, and drivers are becoming more compliant with the rules of the road. Traffic incident warning function Traffic law enforcement data reveals that traffic offences are generally decreasing, with traffic violations dropping by some 30% in one short-term observation. Additionally, thanks to the proactive traffic incident warning function, the incident detection rate has also increased by more than 30% compared to the traditional model. With the continuous optimization of the system algorithm, plus ongoing installation of monitoring equipment, the accuracy of this identification will only improve. In the process of urbanization, tackling congestion is not only about improving the flow of the transportation network: it’s also basic governance for building a smart city.
Multiple Construction sites in the Albuquerque area are managed by Shumate Constructors, Inc., an Albuquerque, New Mexico-based construction contractor, that is also renowned for building educational facilities. In addition to building schools from the ground up, Shumate Constructors completes school additions and remodels. Construction site thefts Three years ago, the company began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts - from copper pipes and wire to hand tools to heavy-duty machinery. The loss of machinery, such as front-end loaders, would cost hundreds-of-thousands of dollars. Sometimes workers will arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. Enhancing construction site security The sites also presented a challenge due to changing construction conditions The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor has to cover the cost of replacing materials, file an insurance claim for each theft and complete additional administrative paperwork that they weren’t planning to invest time in. The sites also presented a challenge due to changing construction conditions. Equipment or storage containers are delivered and removed, the sites are graded/re-graded and as sections of build were completed, tools, materials and supplies were moved to different areas. Flexible, reliable wireless solution At a contractor trade show a few years ago, Mark Shumate, President of Shumate Constructors met Dave Meurer, President of Albuquerque’s Armed Response Team. Meurer introduced Shumate to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. “Mark [Shumate] was fed up with theft at his construction sites so we started to discuss some prevention ideas,” said Meurer, adding “I knew this was a great fit for the combined Inovonics transmitter and Optex sensor solution.” Optex sensors installed He further said, “At the Armed Response Team, we refer to this solution as the never sleeping, non-blinking eye. Shumate was not aware of any reliable solutions that could provide this type of theft prevention, but we explained that we were very confident in this application and he was definitely interested.” To install each combined sensor, the Armed Response Team attached the Optex sensors to a freestanding steel post with a base plate on it and deployed them throughout the site. This allowed the flexibility to be easily moved to accommodate site changes. Once installed, a signal was easily achieved. iSeries Optex/Inovonics sensors The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary The sensors in the combined solution often need to communicate as far as an entire city block and the perimeters can be several thousands of feet. The iSeries Inovonics/Optex solution was able to easily accomplish this feat. The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary. For some sites, it can be as few as a dozen, and others it can be as many as 30 or more. “Together, the products offer a great solution,” noted Meurer, adding “The Optex sensors can handle varying weather conditions and Inovonics’ wireless connectivity offers less signal drop and more consistent reporting signal than any of the other transmitters we’ve tried.” Efficient perimeter security solution “Between the perimeter technology by Inovonics and Optex, and the Armed Response Team’s follow-up, we have seen zero thefts for all projects since installation. With the integrated wireless solution, the construction sites are monitored on a real-time basis and immediately notify the Armed Response Team upon unauthorized access,” said Mark Shumate, President of Shumate Constructors. He adds, “We look at the perimeter security solution as a great investment. Annually, the cost of manpower, replacement of lost or stolen items and damage repairs could easily cost three times more than we spend on Armed Response Teams’ services with the Optex and Inovonics solution.”
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
Welch Sand & Gravel, a family-owned operation serving the Cincinnati, Ohio region of the US. Welch harvests gravel and sand from the water and transports all the material via hundreds of feet of conveyor to be processed and delivered to all its construction customers. The 500 plus feet of conveyor is riddled with an array of copper and metal wiring that yields big dollars on the market, making it quite vulnerable. The surrounding rural area is extremely challenging to protect, as it includes multiple acres and many access points, including the water. Optex photoelectric beams installed Sonitrol of Butler County was brought in to provide a solution to Welsh's security needs. With the assistance of Optex, Sonitrol designed an outdoor security system that was comprised of hardwired and wireless Optex photoelectric beams to secure the property. All of the Optex Beams were connected to various pan-tilt-zoom (PTZ) cameras on the property Optex’s 200 ft. battery-powered, wireless photoelectric beams were strategically placed to provide perimeter detection along the property line and not allow access to the desired wiring on the conveyer belt. In addition, interior traps were placed to provide back-up protection to Welch Sand & Gravel. All of the Optex Beams were connected to various pan-tilt-zoom (PTZ) cameras on the property, and Sonitrol of Butler County now provides 24-hour monitoring of all the cameras. Optex - Sonitrol monitored solution The moment an Optex beam detects movement, the PTZ cameras are activated and the Sonitrol Central Station immediately views the activity on site. The operator can quickly assess the situation and dispatch the proper authority if necessary. The Optex security/Sonitrol monitored solution has saved the customer thousands of dollars in loss and hundreds of dollars a month in guard service costs. Since the system was installed, no additional loss has been experienced on the site.
From simple thefts of copper wire from rooftop HVAC systems, to substantial damage and revenue loss at electrical substations, copper continues to be stolen from everywhere that it is readily available. Due to the high price of copper, a large electric power holding company in the Mid-West United States faced the growing issue of theft and damage at multiple sites. The few hundred dollars of copper that was being ripped out was causing hundreds of thousands of dollars in damage, repairs, and down time, while creating unsafe grounding conditions for the electrical equipment. Electrical substations Changing site conditions, large perimeters and the inability to trench, and remote locations were all challenges that needed to be addressed when deciding on a solution. An integrator was selected who then teamed up with OPTEX to create a reliable, effective security solution. The team decided on protecting the existing perimeter fence and automatic gate systems using pairs of the SL-350QFRi housed in photoelectric beam towers. This offered a battery-powered, wireless 350ft. point-to-point perimeter solution and allowed the integrator to set up the units without running power to them, eliminating the need to trench or run cables. When a site plan is provided, OPTEX offers to custom build the towers and pre-install the photoelectric beams in them based on the job site specifications, all at no charge. Also, it will be shipped directly to the job site, labeled for position and ready to be installed. Rooftop and HVAC units When a high school in DeKalb County, Georgia began feeling the effects of copper theft, The DeKalb County School District turned to OPTEX to help protect their HVAC systems, rooftops and yards. Because of labor and cost associated with wiring, along with the difficulty bringing power to the rooftops, the Regional Sales Director for OPTEX recommended the iSeries battery-powered, wireless PIRs. The iSeries detectors offered spot protection for the HVAC units while covering all access points on the rooftop. Relocation of detectors Thefts have been eliminated and the end user can respond quickly before any damage is done The wireless feature also allows the integrator to relocate and easily adjust the detectors based on future security needs. With the system in place, copper and other related thefts have been eliminated and the end user can respond quickly before any damage is done. All of the battery-powered, wireless detectors from OPTEX come with an empty backbox and work with most manufacturers wireless transmitters. When one selects the iSeries version, OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter. One less time consuming step to do for the installer! Construction sites A New Mexico based construction contractor began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts from copper pipes and wire to hand tools to heavy-duty machinery. Set-up was able to accommodate the frequently changing conditions of a construction site Sometimes workers would arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor had to cover the cost of replacing materials. An Albuquerque based integrator introduced the construction contractor to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. OPTEX iSeries photo beams and PIR detectors A combination of OPTEX iSeries photo beams and PIR detectors were attached to freestanding steel posts with base plates and deployed throughout the job sites. This set-up was able to accommodate the frequently changing conditions of a construction site. For some sites, the integrator used as few as a dozen detectors, while others required as many as 30 or more. With the PIR and Photo beam solution specific to each site, the end user has seen zero thefts since installation.
Round table discussion
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
For many years, generally speaking, the use of video surveillance has been seen as an extension of an end user customer’s security system. However, recently, we have also heard about how video can help customers more generally, providing benefits that extend beyond security and encompass better operations and management. Easier economic justification is one important aspect of looking more broadly at the benefits of video surveillance to the enterprise as a whole. Better return on investment (ROI) means more sales. We asked our Expert Panelists to share their observations about which non-security uses of video are catching on. Their responses suggest an extremely broad range of possibilities.
Protecting Your Data Against Physical ThreatsDownload
Six Things To Look For When Adding AI Cameras To Your OperationDownload
Best Practices Guide: Analog Video To CloudDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload