Alarm.com has introduced Ambient Insights for alarm response, a new solution that recognizes activity around a property and delivers contextual information to monitoring stations in the event of an alarm. Monitoring stations can use this real-time data to prioritize alarms and dispatch police, fire, or emergency medical services to properties faster. Ambient Insights also allows for responses to a wider range of emergencies and reduces dispatches for false alarms. Prioritizing and assessing al...
ISC West 2021, in collaboration with premier sponsor, Security Industry Association (SIA), took place last week from July 19-21, 2021, at the Sands Expo & Convention Center, in Las Vegas, serving to accelerate market recovery and re-define the roadmap ahead for the security & public safety industry, after a year-plus hiatus of large scale, in-person events. ISC West 2021 Noting the buzz of positive energy, enthusiasm and excitement throughout the three-day event, ISC West customers tes...
Large companies and condominiums with an intense flow of vehicles need to keep strict control of energy bills, by checking if there are sources of waste or excessive spending. To help this public, PPA has developed a new line of gate operators that significantly reduce energy consumption. Responsible for the patented JetFlex technology, which achieved a worldwide reputation for its speed and performance, PPA currently exports its products to more than 30 countries and is a leader in the gate an...
Hanwha Techwin has further strengthened its keenly priced Wisenet Q series with the introduction of 4 new PTZ cameras. The new indoor and outdoor 2-megapixel PTZs are equipped with a host of innovative, practical features including the Focus Save function, which can be applied to 32 pre-defined areas and ensures that the cameras can rapidly come into focus when they are moved to a specific position. Indoor and outdoor PTZs Precise PTZ control is achievable with the assistance of ‘click...
Securitas, an intelligent protective services partner, has agreed to acquire Protection One, the German company specializing in remote technology-driven security solutions and electronic security. The acquisition will enhance Securitas’ protective services capabilities in Germany and is in line with the Group’s strategy of doubling its security solutions and electronic security sales by 2023. The purchase price is approximately MEUR 72 (MSEK 735) on a debt-free basis. Remote...
Have you ever stopped to consider the volume of new data created daily on social media? It’s staggering. Take Twitter, for instance. Approximately 500 million tweets are published every day, adding up to more than 200 billion posts per year. On Facebook, users upload an additional 350 million photos per day, and on YouTube, nearly 720,000 hours of new video content is added every 24 hours. While this overwhelming volume of information may be of no concern to your average social media user...
The Security Leadership Research Institute (SLRI) has released the results of its 2021 corporate security organizational structures, cost of services, and staffing benchmark. Highlights 41% of respondents operated at the Director level The average security budget reported was $13,254,850 On average, respondents reported one security employee for every 93 employees Security leaders have used the budget, title, and reporting data provided by this benchmark to avoid budget reductions and secure job title changes to better reflect their level of responsibility. The 2021 results include a more detailed data breakdown and more comparison data than previous versions of the benchmark. The full report includes: Report-to level by organization revenue Domains managed compared to security budget Report-to function vs. reporting level Budget by square footage Budget as a percentage of revenue Budget by sites covered Budget per employee Uniformed security vs organizational employees Personnel cost as a percentage of the budget Reliability and accuracy The report also details security’s responsibility and accountability by the program (e.g., supply chain security, IT forensic investigation, business continuity, asset protection), broken down by revenue, number of employees, budget, and more. The SLRI carefully vets responses and respondents to ensure a high level of confidence in the reliability and accuracy of benchmark data. No other organization focuses exclusively on quality, meaningful research specific to the corporate security function.
International Security Expo is returning to Olympia London, in London, United Kingdom, in September 2021, with a range of pavilions and zones, each dedicated to a particular field of security, in order to help visitors navigate the show with ease. One of the zones, the Disaster & Resilience Zone, will combine the latest innovations in crisis management with a comprehensive education program. International Security Expo 2021 Attendees will be able to network face-to-face with the zone’s exhibitors and discover their globally renowned products Attendees will be able to network face-to-face with the zone’s exhibitors and discover their globally renowned products, in order to help businesses remain resilient, during a crisis, as well as the solutions to recover and the tools to rebuild. This will be complemented by the Disaster and Resilience Conference, sponsored by Everbridge, where a series of sessions hosted by industry leaders will cover the full disaster management process. Disaster & Resilience Zone Within the Disaster & Resilience Zone, a range of exhibitors will showcase their innovative products, such as HIPPO Multipower, which manufactures amphibious all-terrain vehicles for military, fire, rescue and disaster relief operations. Global provider of solutions for hospital, first response, and emergency medicine personnel, PerSys Medical, will also be present. Visitors will be able to learn more about its products, some of which focus on hemorrhage control, intraosseous and vascular access, hypothermia treatment, and airway management. While Equivital will showcase its protective solutions for those in the military, first responders, and industrial occupations, such as its eqWave device that helps ensure social distancing is adhered to in the workplace. End-to-end disaster response and resilience solutions Everbridge, a globally renowned company in critical event management (CEM) solutions will showcase its end-to-end disaster response and resilience solutions, on the show floor and in the Product Innovation Theater. Everbridge is also known for its CEM solutions for both government entities, as well as a private enterprise, including Risk Center for monitoring threats and analyzing and responding to risk, Public Warning for country-wide or geo-located population alerting, and Control Center for physical security information management (PSIM). Best practise guidelines and international standards For over a year, the COVID-19 pandemic has tested resilience planning and operations to the full Additionally, SafeHaven Trauma Center, which specializes in crisis, disaster and trauma-responsive mental health care, will also be present at the event, in order to help organizations meet best practise guidelines and international standards, so as to ensure the psychological well-being of its personnel. For over a year, the COVID-19 pandemic has tested resilience planning and operations to the full, but other crises, such as climate change and natural disasters, continue to remain a threat. The Disaster & Resilience Conference will see international experts tackle market-nominated topics, across 14 different sessions, over two days. Responding to physical, cyber, or public safety threats The conference sponsor, Everbridge, will be present on both days, beginning with an expert panel on day one, which will be hosted by Everbridge’s Chief Security Officer, Tracy Reinhold. Tracy Reinhold will be joined by Kevin Knappett, who is from the Department for Digital, Culture, Media & Sport (DCMS), to talk about UK Alerts (the first national public warning system), plus a panel of industry security experts, who will share best practise examples for responding to physical, cyber, or public safety threats, and other major incidents. “This past year has proved the need for an integrated approach to disaster response and resilience,” said Javier Colado, Senior Vice President, International at Everbridge, adding “Everbridge has been keeping people safe and businesses running around the world for almost 20 years. This is our fourth year supporting the International Security Expo and we look forward to sharing our expertise and experience as sponsors of the Disaster and Resilience Conference.” Integrated technology use in manage security risks Visitors will also get the opportunity to hear industry expert speakers, such as Hugh Farquhar, the Chief Executive Officer (CEO) of Watchkeeper International, who will talk about the increase in frequency and severity of natural disasters and violent incidents, and how to use integrated technology to manage these security risks. Other important sessions that should not be missed, include ‘Delivering enhanced security and resilience through green projects - the UK MoD approach’ set to be delivered by Richard Nugee, the Climate Change and Sustainability Strategy Lead at UK’s Ministry of Defence (MoD). Security, sustainability and environmental protection link Attendees can also join the likes of Peter Shergold, Director of Operations at Public Health England The session will dissect the link between security, sustainability and environmental protection, and explain the UK Ministry of Defence's first strategy linked to the UK Government's COP26 (26th UN Climate Change Conference of the Parties) priorities. Attendees can also join the likes of Peter Shergold, Director of Operations at Public Health England, as well as Totti Karpela, Director at Peace of Mind Limited and Joani Green, Senior Incident Response Consultant and Team Lead at F-Secure. Each expert will dive into preparation, resilient capabilities, and responding to their respective topics. Focus on Disaster & Resilience on a global scale International Security Expo, Event Director, Rachael Shattock said, “The COVID-19 (coronavirus) pandemic has demonstrated that a focus on Disaster & Resilience on a global scale is more relevant than ever. Rachael Shattock adds, “Consequently, we are likely to witness increased investment in solutions that mitigate the impact of unprecedented events in the future, such as new pandemics. International Security Expo aims to help the industry to move forward and stay one step ahead by allowing organizations to learn about the latest solutions in disaster and crisis security through an impressive exhibitor line-up and conference program.”
SureCloud, a provider of IT governance, risk, and compliance (IT GRC) cloud-based solutions, has launched an innovative go-to-market approach for its customers to help simplify and de-risk their investment in IT GRC. The new approach has been devised as a response to typical industry pain points, such as failed implementations and additional, unforeseen services costs, that make investments in GRC technology risk for customers who find it almost impossible to ‘futureproof’ their solution of choice. Ongoing configuration changes SureCloud, which has served the IT GRC market since 2014, has opted to completely remove the heavy up-front costs usually associated with GRC software implementation and ongoing configuration changes. Instead, customers will have the freedom to focus on what they want their solution to do rather than worry about how many professional service days to purchase. Typically, a GRC software provider will charge an annual license fee and layer implementation and ongoing configuration services on top as an additional cost, often partnering with a third party to implement their solutions. This approach can put pressure on customers to get the implementation right ‘first time’, leading to a tendency to overload the initial project with functionality that ‘might’ be needed in the future. This can result in overcomplicated designs, which can have a high risk of failure in an operational environment. Changing business environment GRC solutions often need adapting over time to meet the changing business environment Moreover, GRC solutions often need adapting over time to meet the changing business environment, and the requirement for ongoing configuration changes after the initial implementation can present unexpected and unbudgeted costs to the customer. Recognizing these challenges, SureCloud, which has its own in-house team of implementation experts, has opted to no longer charge customers for its implementation and ongoing configuration services. Over the course of their subscription, customers benefit from a fully configurable solution without having to secure budget increases or be blindsided by unexpected costs. And they get a fully aligned GRC technology partner incentivized to ensure a smooth and successful implementation. Making right decisions “Feedback from customers reveals that our new approach gives them the certainty of running costs, enabling them to demonstrate what a continual run rate looks like without unpredictable spikes in additional services,” says Nick Rafferty, SureCloud’s COO and Co-Founder. “And by not charging for implementation services, customers can be driven by timescales that are closely aligned with the delivery of outcomes, rather than resource costs and a tendency to over-scope the initial implementation. This means that they can focus on the end game and make the right decisions for their business.”
ONVIF, the global standardization initiative for IP-based physical security products, has announced that it will end its support for Profile Q early next year since it contains certain specifications that are no longer consistent with current cyber security best practices. Profile Q Profile Q was developed to provide an easy setup of a conformant device on an IP network. It requires a Profile Q conformant device to allow anonymous access to all ONVIF commands, during the setup process in the factory default state. This does not follow current cyber security best practices, which recommend, among other things, that a network device require users to set passwords and other access rights before the device can be used. Since the specifications of a profile cannot be changed as it would impact interoperability between products that conform to a specific profile, Profile Q will be deprecated on March 31, 2022. ONVIF conformant products ONVIF conformant products are used in a wide variety of industries and geographies" “ONVIF conformant products are used in a wide variety of industries and geographies, with different requirements when it comes to cyber security policies or best practices,” said Leo Levit, Chairman of the ONVIF Steering Committee. Leo adds, “As these cyber threats evolve quickly, it’s important that users are aware of these best practices to ensure they are implementing cyber security measures that are appropriate for their organization.” ONVIF Network Interface Specifications ONVIF recommends following industry best practices and local regulations, and staying informed about technology changes from the market. The ONVIF Network Interface Specifications have defined network protocols that include security elements, such as TLS (Transport Layer Security), which allows ONVIF devices with that feature to communicate with clients across a network, in a way that protects against eavesdropping and tampering. ONVIF Default Access Policy ONVIF specifications also cover the ONVIF Default Access Policy, which specifies that there should be different access classes to services based on different user roles. Manufacturers can implement these ONVIF specifications regardless of whether the specifications are included in a profile or not. Founded in 2008, ONVIF is a well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system, and access control companies, and more than 20,000 profile conformant products. IP interoperability solutions expansion ONVIF offers Profile S for streaming video, Profile G for video recording and storage, Profile C for physical access control, Profile A for broader access control configuration, Profile T for advanced video streaming, Profile M for metadata and events for analytics applications, and Profile D for access control peripherals. ONVIF continues to work with its members to expand the number of IP interoperability solutions that ONVIF conformant products can provide.
Comelit Group, as a founder partner to The Security Event, is excited to return to exhibit with the launch of the latest integrated solutions, comprising an array of smart security and fire safety systems for residential and commercial premises. On stand 3a/B10, Comelit will be presenting its new Logifire addressable panel, which has been designed to offer a simple to install, fire safety solution that is compliant with to latest standards. It is complemented with a new range of detectors, offered with award-winning designs to ensure systems blend with their surroundings. Alarm management and home automation Exclusively previewed at The Security Event is Comelit’s latest alarm management software, Horus, which presents an innovative platform that integrates intruder alarm, fire detection, video surveillance, and door entry into a single software capable of targeting alarm management. Comelit will be showcasing its latest updated home automation systems, including Maxi Manager with Android, alongside smart integration with Amazon Alexa, Google Home, and Echo Show. Smart security systems Says Francesca Boeris, Managing Director Comelit Group UK, “While we have been under enormous pressure as a result of the global pandemic, behind the scenes at Comelit, we have been working on some really exciting integration products and services that really go to the heart of fire safety and smart security design.” “We are thrilled with the live opportunity at The Security Event to present our latest solutions. This is not only in their capability to seamlessly operate for the benefit of homeowners and business property owners, but also with due consideration to installers looking for simple ways to offer this smart technology. When combined with our cellphone-first possibilities, we believe we have the perfect solution.” Wireless intruder alarm system Secur Hub operates a high-performance two-way radio link between the control panel and the sensors Visitors to the stand will have the opportunity to see live demonstrations of Comelit’s latest wireless intruder alarm system, Secur Hub, which is designed to seamlessly operate with its inclusive app technology. Natively connected to the Comelit Cloud, which includes both WiFi and LAN connectivity, Secur Hub operates a high-performance two-way radio link between the control panel and the sensors. Door access solutions Also on show will be Comelit’s renowned door entry systems, including its newest modular stylish panel, Ultra, alongside mini handsfree WIFI monitor, Icona, Switch, and 316 sense and touch entrance panels together with iconic interconnection systems VIP and Simplebus. Comelit representatives will be on hand to demonstrate how each system can operate through Comelit’s new ‘My Comelit’ APP, allowing installers easier control over their installations. Showcasing smart upgrades Francesca concluded, “The Security Event is a perfect, long-awaited, platform for Comelit to not only present its all-encompassing product portfolio with integration capability but also demonstrate to visitors the ease of installation and smart cellphone-first upgrade opportunities. This is all completed to the highest of industry standards and without compromising on the style and aesthetics that is synonymous with the Comelit brand.” For more information on Comelit Group or its product range, please visit stand BA/310 at The Security Event, taking place between 7 – 9 September 2021 at The NEC Birmingham.
Integrated security manufacturer TDSi announces its forthcoming appearance at The Security Event, the major UK commercial, enterprise, and domestic security event which takes place from 7th-9th September at the NEC Birmingham. As one of the first major UK security sector events since the pandemic, TDSi will be showcasing its latest products - including the newly enhanced TDSi GARDiS range of hardware and software systems. Benefits of GARDiS range Looking ahead to The Security Event, Zara Taylor, Marketing Manager at TDSi commented, “With the disruptions of 2020, we are particularly excited to be appearing at this year’s event. The key theme on our stand for 2021 is the TDSi GARDiS range, and our expert team will be on hand to demonstrate the various components, integration possibilities, and to discuss the security and practical benefits they deliver.” Stand: 3a/D40 will be comprised of several ‘pods’ showcasing the new GARDiS range including the GARDiS Web Embedded Controller, GARDiS Software, and GARDiS Bluetooth Low Energy Reader. Attendance software GARDiS has integration with RotaOne Time & Attendance platform, providing an overview of movements and the security of facilities TDSi recently unveiled the new Version 2.2 of its powerful GARDiS software, which added a Cause-and-Effect engine to the PRO version, while all versions have gained additional bespoke user records fields for greater detail and flexibility in applications. Additionally, GARDiS has full integration with Thinking Software’s market-leading RotaOne Time & Attendance platform, providing a complete overview of staff movements and the security of facilities, something which is particularly useful in a rapidly changing and evolving world. Showcasing new technology Zara added, “We are debuting a new stand at The Security Event this year which perfectly reflects the exciting new technology that TDSi will be showing. It has been a long time since we have been able to physically meet and interact with visitors at a large UK event, but the NEC is the perfect venue to do this.” “Geographically central for many parts of the UK (and beyond) in terms of travel, it presents a friendly and well-organized venue for visitors to make the most of what will be on show, with the peace of mind that all safety precautions will be taken to ensure any risks are kept to a minimum. The TDSi team and I are very much looking forward to welcoming you to Stand: 3a/D40 from 7th-9th September!”
The UK Government has set out an ambitious ten-point plan, known as the green industrial revolution, with an aim “to forge ahead with eradicating its contribution to climate change by 2050.” This makes our government the first major economy to embrace such a legal obligation. Green recovery Acknowledging climate change and meeting net-zero is a demanding challenge especially for those affected by the pandemic. But the UK Government, with the launch of its aspiring strategy, is investing everything in its power to promote a ‘green recovery.’ Here, Reece Paprotny, Commercial Manager and Sustainability Champion at Amthal, highlights how the fire and security industry has an opportunity to use the current recovery period to explore its own sustainable journey and embrace the significance of environment, economic and social collaboration, transparency, and accountability. Employing sustainable technologies Pressure is mounting on construction to find ways to reduce emissions and help meet net-zero targets The perception is that COVID-19 presents a once-in-a-lifetime opportunity to re-write the existing rulebook. This is riding on the significance of changing public support for more environmentally friendly living opportunities, with associated cost savings, efficiencies, and cleaner industries. Innovative sustainable technologies are the key to kickstart this route to success. Nowhere can this be seen more than in the built environment, which currently contributes to 40% of the UK's carbon footprint. Pressure is mounting on construction to find ways to reduce emissions and help meet net-zero targets. This is through the entire life cycle of a building, to reduce their impact on the environment from planning stages, through build and demolition. Building the right environment By creating the right policy environment, incentives for innovation and infrastructure, the Government can encourage companies to seize the sustainable opportunities of new technologies and value chains linked to green sectors. They can accelerate the shift of current carbon-intensive economic and industrial structures onto greener trajectories, enabling the UK to meet global climate and development goals under the Paris Agreement on climate change and the 2030 Agenda for Sustainable Development. Transparent working practices Each industry sector is expected to engage and pledge its support to achieve the significant deadlines. Every company can make a difference, even with small steps towards a sustainable future. So while elements such as safety and security represent just one component of building the right sustainable environment, it paves the way to opening up our sector to greater efficiencies, transparent working practices, and encourages collaborative use of resources. Sustainability in security The security sector has a significant opportunity to incorporate ‘going green’ into its practices In fact, the security sector has a significant opportunity to incorporate ‘going green’ into their processes, and practices. This is right from product lifecycles to more environmentally friendly work practices when it comes to maintenance and monitoring services. When integrating environmentally friendly practices, starts with the manufacturing and production of the wide variety of systems in operation for the security sector. And some certifications and guidelines can be achieved, such as the ISO 14000 which looks into eliminating hazardous materials being used which in turn will reduce carbon footprint. Upgrading supply chain process Observing the complete supply chain and working with partners to reduce unnecessary travel, shipments, and transportation of products, can all contribute and create sustainable processes. In the maintenance and monitoring of products, it is essential installers and security specialists consider their own environmental impacts. Simple changes such as switching company vehicles to electric options for site visits can make a significant difference to climate change and improving air quality. Presenting sustainable ways of disposing of products at the end of their natural lifecycle is key to change in our sector. This is especially in the security industry where many customers will need a complete overhaul of outdated solutions or need systems upgrading due to changing threat levels. Sustainable evolution Progress is being made, specifically in the fire and security industry, in its sustainable evolution. Businesses are trying to develop a reputation for “sustainability” or “good corporate citizenship.” And it has gone well beyond the theory to the practical, where companies recognize activities have an impact on the environment and are also reviewing the social and economic influences. Three pillars of sustainability In a recent interview, Inge Huijbrechts, the Global Senior Vice President for safety and security and Responsible Business at Radisson Hotel Groups sees her vision to combine safety, security, and sustainability. Inge focuses on three pillars, namely, Think People, Think Community, and Think Planet. Think People means that we “always care for the people in our hotels and our supply chain.” So, in outwards communications, safety and security were always part of the Think People focus area. Think Community is caring and contributing in a meaningful way to communities where we operate. Finally, Think Planet makes sure that “our footprint on the environment is as light as it can be in terms of energy, water, waste, and carbon, and making sure that we incorporate sustainability into our value proposition.” Moving forward Apprenticeship schemes are integral to ‘think people’ and have a role to play in the social impact on the security industry There are immediate actions that can be taken by companies in the security industry to support sustainable development, working right from within a company to supporting industry-wide initiatives. From a social perspective, at a foundation level, “Think People’ can see the Living Wage Foundation as an example of a commitment to a team. This is for businesses that choose to go further and pay a real Living wage based on the cost of living, not just the Government minimum. Apprenticeship schemes are also integral to ‘think people’ and have a pivotal role to play on the social impact on the security industry. It addresses the sector-wide issue of finding employees with the right mix of skills to collaborate and meet discerning consumer demands for increasingly smart security solutions for homes and businesses. Impact of the full lifecycle of products From an environmental view, or ‘think planet,’ we need to collectively look at all elements of our industry, with a desire to analyze the impact of ingredients used, supply chain, or manufacturing alone, and also consider the full lifecycle of our selected products from creation to end of life. As Jamie Allam, CEO Amthal summarises, “This is a long-term, sustainable investment in our people, our products, and our business based on our values.” “When put together, a social team which feels empowers and operates in environmental optimum working conditions is in a position to provide a great experience to our customers, creating an economic positive difference. It forms the basis of a sustainable sector vision for the security industry-wide to adopt.” Taking action Amthal is taking action based on the ready-made universally agreed UN 17 Sustainable Development Goals. Also known as Global Goals, these are at the heart of the 2030 Agenda for Sustainable Development, adopted by all United Nations Member states. This agenda is a plan of action for people, the planet, and prosperity. By being an early adopter, we believe we can engage with customers, partners, and suppliers on these issues and generate opportunities to innovate for mutual and industry sector benefit. Together, we can contribute to building a more sustainable security sector and future, and contribute to the UK Government’s green industrial revolution.
Prices and delivery times for essential components in video surveillance systems are being driven up as demand soars from other industries. Secure Logiq’s Robin Hughes explains the current state of the market. Challenges Component shortages and supply chain challenges are a hot topic in just about every industry based on semi-conductors and silicon chips right now, and security is no exception. It’s common knowledge that the global Covid lockdown caused a shutdown in the mining of silicon and spherites as large industries such as motor manufacturing canceled or postponed their chip orders – this has caused a supply gap that every industry is feeling. However, there is a second challenge that is hitting the security sector particularly hard, and it may not be one you are expecting – cryptocurrencies. Cryptocurrencies and security When people discuss cryptocurrencies and security, thoughts often turn to cybersecurity and ransomware payment tracking. But the issue for the majority of the security industry comes from crypto mining. When it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining GPUs (Graphics Processing Units) are a key component in video surveillance, they decode images and display them onto screens. With the increase of video analytics, these have also become key to running the complicated algorithms required for creating the metadata and presenting it in a meaningful way for end-users. However, when it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining. Demand for GPUs When Bitcoin prices were relatively low, it was hard to justify the cost of a GPU and the associated power consumption for Bitcoin mining applications. But as the price of Bitcoin has increased exponentially, demand for GPUs to do the number-crunching has grown dramatically causing a major shortage and huge price hikes. This rise in prices is not correlated with an increase in technological performance on the new GPUs, it is entirely a case of demand outstripping supply and a resulting bidding war. To put this in context, cards are currently going new for around twice the original price and manufacturers simply cannot keep up with the demand. Chia On top of this, there is a new cryptocurrency creating a new threat to a different part of the video surveillance industry. A new ‘environmental’ cryptocurrency called Chia has dispensed with the processing power and electricity demands of traditional GPU mining, instead of utilizing the spare storage space on hard drives (HDD) to verify blockchain transactions (‘proof of space’). The demand for this particular cryptocurrency has to date called on 30 Exabytes of storage since May this year – that’s 30 Billion Gigabytes of data, and it’s not just HDDs, high-capacity SSDs are also in demand. This is causing massive hard drive supply issues globally, thus rocketing prices for those that are available. HDD consumption The security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days to 6 months Of course, this has a particularly large knock-on for the video surveillance market. There is nothing more data-intensive than video, other than multiple streams of HD video. With this in mind, the security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days typically up to 6 months and longer in some regions/applications, the video surveillance market consumes more HDDs than many other markets. Growth of data centers While you would think that this would make security an important area for HDD manufacturers, our market is a relatively small player. IT vendors will always focus on their core customers, and the rise of the gaming market, as well as the growth of data centers due to remote working in the pandemic, has created a more important sector to serve – and these customers will always come first. Imagine the daily storage space required if 5 Billion people uploaded just one image a day to ‘the cloud’! Component manufacturers These factors combined with the lack of raw materials leading to longer lead times for component manufacturers mean that the prices for hard drives and GPUs are likely to remain inflated well into 2022 while factories play catch up on the backlog. The market for IT hardware is currently strong enough to continue even with the increase in component prices and the extended lead times for products. If you can get your hands on any HDDs, the delivery times from most distributors are around 6-8 weeks. Increased delivery times All of this has had a serious impact on the security industry. Video surveillance projects are now facing the combined issue of increased delivery times and higher costs. Many manufacturers, integrators, and distributors are doing their best to absorb the price increases where they can, but this is unsustainable over the long term. So what can be done? Second-hand applications Some people are getting more creative by purchasing from the second-hand market Some people are getting more creative by purchasing from the second-hand market. However, it is unlikely that commercial applications will be willing to risk potential downtime or data losses by using second-hand components that have been pushed hard for months on end mining cryptocurrencies. Making early purchases While I can’t comment on what other manufacturers have done, at Secure Logiq we have been watching this market trend closely. We always try to keep a close eye on anything that has the potential to significantly impact our manufacturing capabilities and try to offset any potential challenges with early purchases before the impact is fully felt. As such, we have been able to secure enough products to continue manufacturing as normal for more than six months. Increased demand as a challenge While we have this existing stock to meet current and anticipated orders, we continue to scour the market for any available stock to make sure we are at the top of the list when any fresh products come on the market. This has meant that throughout our 10-year history we have never failed to deliver a customer order within 7-10 working days. The delays with component manufacture and the ongoing increased demand will continue to present a huge challenge to the video surveillance and wider security industry. However, good planning and intelligent design will allow projects to remain on track. Security technology manufacturers are not alone in this challenge, but the dual-threat is perhaps unique. It will take a while for this threat to be overcome, but with robust planning and by paying close attention to the market forward-thinking video surveillance manufacturers can still deliver projects for their clients.
Steven Kenny, Axis Communications, looks at the benefits of physical access control systems within smart environments, and how knowledge gaps and dated methods can inhibit adoption. Physical security is becoming more dynamic and more interconnected, as it evolves. Today’s modern access control solutions are about so much more than simply opening doors, with digitalization bringing multiple business benefits, which would simply not be possible using traditional models. Digital transformation While the digital transformation of processes and systems was already well underway, across many industries and sectors, it is the transformation of physical security from a standalone, isolated circuit, to a network-enabled, intelligent security solution that brings many benefits to the smart environment. Yet, with more organizations now looking to bring their physical security provision up to date, there are many considerations that must be addressed to maximize the potential of access control and video surveillance. Not least of which is that connecting physical security devices to a network presents risk, so it is increasingly important for IT teams to play a role in helping to facilitate the secure integration of physical and network technologies, as these two worlds increasingly converge. Improved access control in smart environments These urban constructs are capable of reducing waste, driving efficiencies and optimising resources The smart city offers significant benefits, reflected in the US$ 189 billion that is anticipated to be spent on smart city initiatives globally by 2023. These urban constructs are capable of reducing waste, driving efficiencies, optimizing resources and increasing citizen engagement. Technology, which is increasingly being incorporated to protect access points within the smart environment, can take many forms. These range from simple card readers to two factor authentication systems, using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. Frictionless access control During the COVID-19 pandemic, frictionless access control has provided an effective ‘hands free’ means of accessing premises, using methods such as QR code readers and facial recognition as credentials to prove identity. Frictionless access control brings health and safety into the equation, as well as the security of entrances and exits, minimizing the risk of infection, by removing the need to touch shared surfaces. Such systems can be customized and scaled to meet precise requirements. Yet, an increasing integration with open technologies and platforms requires collaboration between the worlds of physical security and IT, in order to be successful. Barriers to adoption Traditional suppliers and installers of physical security systems have built up a strong business model around their expertise, service and knowledge. Network connectivity and the IoT (Internet of Things) present a constantly shifting landscape, requiring the traditional physical security vendor to learn the language of IT, of open platforms, IP connectivity and software integration, in order to adapt to market changes and remain relevant. Many are now beginning to realize that connected network-enabled solutions are here to stay Those who cannot adapt, and are simply not ready for this changing market, risk being left behind, as the physical security landscape continues to shift and demand continues to increase. With end users and buyers looking for smarter, more integrated and business-focused solutions from their suppliers, it is clear that only those who are prepared will succeed in this space. Time will not stand still, and many are now beginning to realize that connected network-enabled solutions are here to stay, particularly within smart constructs which rely on such technology by their very nature. The importance of cyber hygiene Connecting any device to a network has a degree of risk, and it is, therefore, imperative that any provider not only understands modern connected technologies, but also the steps necessary to protect corporate networks. Cameras, access control systems and IP audio devices, which have been left unprotected, can potentially become backdoors into a network and used as access points by hackers. These vulnerabilities can be further compromised by the proliferation of connected devices within the Internet of Things (IoT). While the connection of devices to a network brings many advantages, there is greater potential for these devices to be used against the very business or industry they have been employed to protect when vulnerabilities are exploited. Cyber security considerations Cyber security considerations should, therefore, be a key factor in the development and deployment of new security systems. Access control technologies should be manufactured according to recognized cyber security principles, incident reporting and best practices. It is important to acknowledge that the cyber integrity of a system is only as strong as its weakest link and that any potential source of cyber exposure will ultimately impact negatively on a device’s ability to provide the necessary high levels of physical security. The future of access control There is a natural dispensation towards purchasing low-cost solutions There is a natural dispensation towards purchasing low-cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions, in an attempt to unlock the required benefits, while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organizations by their association. The future of access control, and of physical security as a whole, will, therefore, be dependent on the willingness of suppliers to implement new designs and new ways of thinking, based around high-quality products, and to influence the installers and others in their supply chains to embrace this new world. Cyber security key to keeping businesses safe In addition, cyber security considerations are absolutely vital for keeping businesses safe. The integration of cyber secure technologies from trusted providers will provide peace of mind around the safety or corporate networks, and integrity of the deployed technologies. As we move forward, access control systems will become data collection points and door controllers will become intelligent I/O devices. QR codes for visitor management and biometric face recognition for frictionless access control will increasingly be managed at the edge, as analytics in a camera or sensor. The future of access control presents an exciting and challenging time for those ready to accept it, to secure it and to help shape it, offering a true opportunity to innovate for a smarter, safer world.
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalization in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialog over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritization to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customized accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualization and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralized data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralized data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A cellphone app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
Collins Aerospace has completed deployment of its ARINC SelfPassTM biometrics solution at Haneda Airport, one of the busiest airports in Asia, streamlining passenger processing through reduced physical interactions and bottlenecks at multiple passenger touchpoints. Collins Aerospace is a Raytheon Technologies business. “Our ‘Face Express’ system will allow passengers to efficiently proceed through procedures at the airport (baggage drop, security checkpoint entrance, boarding gate) utilizing facial recognition, eliminating the hassle of showing their passport and boarding pass,” said Shoichi Ohashi, Tokyo International Air Terminal Corporation’s senior manager for the Facility Department. “We worked closely with Collins Aerospace to achieve this and enhance passenger convenience at Tokyo Haneda airport.” SelfPass biometrics solution Rakan Khaled, vice president, Airport Systems for Collins said, “Our ARINC SelfPass biometrics solution at Tokyo Haneda Airport streamlines passenger processing while improving airport efficiency and security. Despite the challenging pandemic environment, we were able to manage staffing and suppliers to ensure smooth delivery of the solution.” This project includes the installation of 98 Self-Service Check-In Kiosks, 30 biometric enrollment kiosks, 104 biometric devices for Self-Bag Drop, 17 biometric Automated Security Gates, and 42 biometric Automated Self-Boarding Gates.
Custom Consoles announces the completion of a six-bay security control room desk from its SteelBase range for one of the most prestigious museums in the Middle East. The project also includes a large MediaWall multiscreen video display mounting system and Ergotron desk-mounted monitor arms. “SteelBase and MediaWall continue to be a popular choice for security and process control applications in Europe and around the world,” says Custom Consoles’ sales manager Gary Fuller. “The desk we have provided in this case is a 4.25 meter wide rectangular unit configured for use by two or three operators.” MediaWall Each of its six bays holds computers and related devices which can be reached easily via front or rear access doors" “It faces straight on to the MediaWall with sufficient space between the two to allow access for routine maintenance of installed equipment. Each of its six bays holds computers and related devices which can be reached easily via front or rear access doors. The installed MediaWall supports eight large display screens in a four wide by two high configuration.” “It is augmented by Ergotron monitor support arms mounted to the rear of bays one, two, five, and six. Each arm is capable of holding a flat panel display of typically 24 inches diagonal screen size. These can be used to view the output from the remote cameras.” “The desk surface above bays three and four is left clear to accommodate additional equipment. Worktop facilities along the desk include camera controllers plus communications panels.” Efficient monitoring "SteelBase was developed to withstand round-the-clock use, every day of the year,” adds Custom Consoles’ managing director Neil Reed. “It also offers high ergonomic efficiency, meaning it is comfortable to use during long duty sessions. When installed alongside MediaWall, it allows efficient monitoring of activity across a very wide area, including multiple rooms and multiple sites. The combination has proved a popular and effective choice for security, defense and process control applications in many countries.” Custom Consoles’ SteelBase is a high-strength desking system to withstand the demands of heavy-industry Custom Consoles’ SteelBase is a high-strength desking system developed to withstand the demands of heavy-industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Cable management Each bay includes a sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables, and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. Cables can be routed laterally across and between bays as well as vertically to floor level. Internal 19-inch racking is available as a standard feature. Desktop equipment pods can be specified if required. Careful attention has also been paid to styling with a choice of front, side, and desktop finishes. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. Continuous horizontal display Individual or multiple frames can be used in fully self-supporting configurations or coupled directly to a wall Developed for use in technical control rooms, Custom Consoles’ MediaWall allows flat-screen monitor displays of practically any size to be constructed from standard horizontal and vertical support elements. Individual or multiple frames can be used in fully self-supporting configurations or coupled directly to a wall. Screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths. All Custom Consoles desks can optionally be fitted with Ergotron monitor arms. The LX Arm is available in single-monitor, vertically stacked dual-monitor, and side-by-side dual monitor versions. The lateral and tilt angle of all Ergotron arms can be separately adjusted to match each operator’s preference. A proprietary support mechanism allows the mounted display to be lifted, tilted, or horizontally swung. All LX arms are supplied with clamp and through-fixing options. Each arm is constructed from durable polished aluminum. Longevity is a key feature, typically 10 times the expected life-cycle of competing brands.
Hanwha Techwin a global supplier of IP and analog video surveillance solutions announced that We-Ko-Pa Casino Resort has selected Hanwha cameras for its new state-of-the-art video surveillance system. First established as a bingo-hall style building by the Fort McDowell Yavapai Nation in the early 1990s, the facility received approval to be revamped into a fully-fledged gaming facility in 2017. To ensure the safety of staff and visitors, this also included a new video surveillance system. Quality cameras When it came time to build the new facility, the Tribal Regulatory Agency, having learned from its earlier attempts, knew they had to find a vendor that wouldn’t let them down. Explains Lee Brown, Lead Surveillance Technician for the Fort McDowell Tribal Regulatory Agency, “We were looking for a manufacturer that had a variety of camera offerings to give us what we wanted and that also had a good reputation for quality.” They found what they were looking for with Hanwha Techwin. Camera coverage The cameras available from Hanwha Techwin enabled them to choose the right camera for every situation The number of cameras available from Hanwha Techwin was a key differentiator for the We-Ko-Pa Resort as it enabled them to choose the right camera for every situation. The range of options was especially important when it came time to design camera coverage for the slot floor in the new facility. This area proved to be challenging in part because it was designed to be flexible and modular. The new design allows the Casino to be dynamic in terms of where they place machines. The challenge then was how to ensure coverage of every machine even as they move around daily. Flexible 4k cameras They initially considered attaching cameras to the ‘cloud’ ceiling so that they could be moved as the configuration changed. But, because it floats below a concrete ceiling, this was not possible. The Casino decided instead to use the higher resolution P series 4K cameras and place them strategically throughout the space. Says Brown, “We had to give very careful consideration to where we placed our cameras. We wanted high quality and flexibility to avoid having to reconfigure and reinstall cameras all the time. The image quality with the Hanwha Techwin cameras gave us the edge we needed to work within our ceiling constraints.” WDR technology The new Casino has over 800 Hanwha Techwin cameras, including the XNV-8080R, PNV-9080R, and PNF-9010R models The new Casino has over 800 Hanwha Techwin cameras, including the XNV-8080R, PNV-9080R, and PNF-9010R models. According to Brown, their favorite feature is the quality they deliver at low bitrates. He says, “The majority of our cameras face intense and volatile lighting changes against a backdrop of complex scenery with many moving objects. Hanwha Techwin cameras and their advanced WDR (Wide Dynamic Range) technology can easily be configured to accommodate these conditions without sacrificing quality or producing obnoxious data streams.” Wisenet wave VMS While part of the interest in Hanwha Techwin was based on the build and image quality of the cameras and variety of the offerings, the Casino was also drawn to the Wisenet WAVE VMS (Video Management System). Says Brown, “We were attracted to the WAVE VMS because our virtualized server and client operating systems are 100% Linux based, and the WAVE client and server applications are well supported on Linux. It works exceptionally well with the Hanwha Techwin cameras and other devices, like HDMI encoders and third-party cameras.” Live central monitoring WAVE also helps operators with live monitoring. As part of their daily routines, operators at the Casino have to actively watch a variety of events and occurrences, including deliveries and vendors on site. Says Brown, “The layout system in WAVE makes it easy for us to organize our cameras into groups. So, when an operator follows someone through the Casino, rather than thinking in terms of which camera covers which machine or specific area, they think more in terms of the geography of the location.” Motion detection To reduce the storage requirements for video surveillance footage, they use motion-based high/low recording Every casino must comply with strict retention requirements in part because forensic examination and maintaining a clear chain of custody are extremely important. At the We-Ko-Pa Resort, they have a one-week minimum retention rate with some cameras keeping video for 30 days. Currently, We-Ko-Pa has 500 terabytes (TB) of redundant ZFS-based network storage. To reduce the storage requirements for video surveillance footage, they use motion-based high/low recording. Explains Brown, “We use motion detection to save on storage. If no motion is detected in a frame, the camera is set up to record at very low quality and low frame rate. If the camera detects motion, then the recording automatically shifts to high-quality mode.” Video surveillance system Moving forward, the Casino is excited about future possibilities for their system, including people counting and using their WAVE VMS to make data-driven decisions. The Casino and Tribal Regulatory Agency aren’t the only ones who recognize the outstanding features and functionality of their new Hanwha Techwin system. The Arizona Department of Gaming, which provides specific mandates for gaming operators in the state, is also impressed. According to Brown, “We have even received compliments for our video surveillance system from the state inspector who was quite impressed with the image quality and the smoothness of the recordings.”
Exeter Science Park is a business park developed by the Exeter Science Park Company, a partnership between Devon County Council, the University of Exeter, the Exeter City Council, and the East Devon District Council. It is a 26-hectare site located on the outskirts of the city of Exeter next to junction 29 of the M5 freeway. Sustainable solution The site has 2 entry lanes and 3 exit lanes. A vehicle access control solution was required to resolve problems at these entry and exit points. It was necessary to reduce staff involvement in barrier control, relieve congestion at the barriers, and improve reporting data using a sustainable solution that has low maintenance costs. Long-range tag reader Upon approach to the entry barrier, the uPass reader senses the RFID tag Each entry and exit lane has been fitted with a barrier, an HD ANPR camera, and an uPass long-range tag reader. The tag reader is used as the primary method of access control. Staff members will attach their RFID tags to their windscreens. Upon approach to the entry barrier, the uPass reader senses the RFID tag. The uPass Reader passes the information the barrier control, which opens the barrier. The whole process takes approximately 3 seconds. The same procedure is used on the exit barriers. HD ANPR cameras For staff that don’t have RFID tags and visitors, a secondary system using HD ANPR cameras provides access control. This removes the need for any ticket issue/chip coin at entry, avoiding human involvement and resulting in a faster throughput on entry and exit. Further staff and tenants can be added to a limitless categorized white list using the vehicle license plate as the ID. The white list can be used to allow automatic entry of visitors without the driver having to press the intercom button. Benefits Cost-effective and reliable hands-free access control Windshield tags are read at up to 5 meters Prevents unauthorized vehicle access Allows vehicles to be tracked “The uPass long-range tag reader has allowed a quicker throughput through the barrier while improving security on vehicle access. We are extremely happy with the positive impact the product has had on our client,” said Mustafe Omar, Business Development Manager, Newpark Solutions.
HID Global, a pioneer in trusted identity solutions announced that the Arcos Bosques Torre 1 (Tower 1) has deployed its access control solutions to heighten security and better manage visitor entry. Located in the Bosques de las Lomas neighborhood of Mexico City, the center is comprised of six buildings. The complex includes two skyscrapers and is home to high-profile law firms, industrial, mining, media, and technology companies, and one of the city’s most recognized shopping centers. HID readers and smart card technologies With the help of system integrator Logen, Arcos Bosques Corporate Center chose HID Mobile Access® solutions as well as HID readers and smart card technologies for tenants and visitors to securely pass through its 16 turnstiles and use the 32 elevators that lead to their offices. The HID solutions also give tenants the choice of using their mobiledevices or physical smart cards for entry. Touchless and safe entry HID’s mobile access solution enables administrators to remotely manage credentials by cloud-based infrastructure “Accessing the building by simply presenting a mobile phone makes a lot of sense as we look for ways to eliminate touching things during the global pandemic,” said Santiago Morett, Project Manager at Servicon, facilities manager for Arcos Bosques. “HID Mobile Access has given us touchless entry and safer building security, which is more important than ever for our tenants.” Mobile access solution HID’s mobile access solution also enables administrators to remotely create, issue, manage and revoke credentials through the cloud-based infrastructure. Servicon, the facility management company for Arcos Bosques, now has continuous building access visibility through a unified, up-to-the-minute database of the tower’s tenant names, affiliated companies, and work locations. "Building security today extends not only to who has access but also to how individuals are able to enter a facility,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. “HID’s access control solutions provide the foundation for optimal oversight and control while also keeping people healthy and safe.”
Euromac, a global company in the design and manufacture of punching and bending machines, is benefitting from NSK ball screws, linear guides, and bearings in two high-profile recent projects. In fact, Euromac has been taking advantage of NSK motion control technology since 1995 as part of a long-standing and highly successful partnership. Produces advanced and competitive products From its headquarters in Italy, Euromac tailors’ machines to meet demanding customer requirements; the combination of state-of-the-art technologies and unique concepts assures users of advanced, productive, and competitive products at all times. Continuous improvement and innovation is a core company ethos and represents the reason why Euromac has been able to expand its worldwide presence and achieve impressive growth since its formation in 1986. Major Supplier Among the latest Euromac machines to benefit from NSK motion control technologies is the FX Bend 2550 new-generation electric press brake with 50 or 60-tonne press force, 2550 mm bend length, and six-axis back-gauge; and the new-generation XT punching machine (hydraulic, hybrid, or electric) with 1500 x 3000 mm capacity and a newly reinforced frame. In both applications, NSK is the main supplier of ball screws, linear guides, and bearings. Euromac XT Euromac XT sets the bar in the punching machine arena by being available in hydraulic, hybrid, and electric variants The Euromac XT sets the bar for innovation in the punching machine arena by being available in hydraulic, hybrid, and electric variants. In each type, Euromac uses a different way of moving the main punching axis. In the electric version, for example, the technology holds its own patent. Here, acceleration of 90 m/s2 and stroke of sometimes less than 10 mm, means that impact load is a constant issue. High-performance and robust products With this thought in mind, there is a clear need for high-performance, robust, and reliable linear motion products. For the main punching axis on the electric Euromac XT, NSK, therefore, proposed its HTF SRD series ball screw with S1 ball spacers featuring grease-retaining attributes. These ball screws also make use of a special material named Tough Steel. Providing the perfect complement to the HTF SRD ball screw is the RA series linear guide with high acceleration capability. Ensures high productivity HTF SRD ball screws take advantage of an innovative end deflector recirculation system to achieve ultra-high speeds of up to 3 m/s, offering shorter cycle times and higher productivity to end-users. Importantly, this high-load ball screw ensures good rotational balance, with no run-out of recirculation components, while the optimized (smooth) ball circulation methodology reduces noise by half compared with conventional systems. Accuracy and uniformity The carefully matched spacing and restraint technology of the roller bodies produce a very high uniformity NSK’s RA series of low-friction, high-load capacity roller guides provide high rigidity to deliver the traverse and repeat accuracy necessary in machine tools such as the Euromac XT. This capability results from, among other things, special restraining and deflecting components, as well as the use of rollers with the largest possible diameter and a slightly crowned surface to minimize vibration during rotation. The carefully matched spacing and restraint technology of the roller bodies also produce a very high uniformity of the displacement forces that occur. After a year of comprehensive and successful testing, Euromac recently commenced volume production of its XT punching machines, exemplifying how the performance and quality of NSK linear motion products, together with proven technical support, can benefit innovative machine tool builders. Products The new Euromac XT punching machine uses high-performance, robust, and reliable linear motion solutions from The Euromac FX Bend 2550 new-generation electric press brake also benefits from NSK motion control NSK HTF SRD ball screws take advantage of an innovative end deflector recirculation system to achieve ultra-high NSK’s RA series of low-friction, high-load capacity roller guides provide the high rigidity necessary in machine tools such as the Euromac
Round table discussion
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
Adoption of General Data Protection Regulation (GDPR) by the European Union in 2016 set a new standard for data privacy. But adherence to GDPR is only one element, among many privacy concerns sweeping the global security community and leaving almost no product category untouched, from access control to video to biometrics. Because privacy concerns are more prevalent than ever, we asked this week’s Expert Panel Roundtable: What is the impact on the physical security market?
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerized systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?
Smart And Reliable Rail And Metro OperationsDownload
5 Ways RFID Readers Can Secure Your WorkplaceDownload
Simplified Security for Utilities & Critical InfrastructureDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload