A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their...
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable em...
There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four...
At GSX 2018 on booth # 2951, Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence solutions, will demonstrate how true unification enables organizations to deploy a single platform that enhances situational awareness, streamlines and simplifies the operator experience, and reduces total cost of ownership. Specifically, Genetec will showcase the latest version of Security Center -- the company’s unified platfo...
HID Global, global provider of trusted identity solutions, announced that it has won the 2018 RFID Journal Live! Best New Product award for its new Mini Tamper-Evident Beacon, the industry’s first Bluetooth beacon to provide anti-theft protection for IoT-based location services and conditioning monitoring applications. “The latest addition to our IoT services for asset management addresses the escalating need to protect sensitive assets and equipment in more connected and inte...
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”
A half-day Secure Schools Roundtable was held on Capitol Hill as part of the Security Industry Association (SIA) GovSummit 2018. Legislators, academics, emergency services experts and more discussed the need for enhanced school security in the wake of tragedies in schools across the United States, including the February 2018 shooting at Marjory Stoneman Douglas High School in Parkland, Florida. Student Jake Glacer, a survivor of the Parkland shooting, and his father, Noel Glacer, discussed Jake’s experiences on the day of the shooting and the school’s lack of a standard operating procedure for dealing with an active shooter incident. “We used to live in the Parkland bubble, and now we live under the Parkland cloud,” said Noel. Jake and Noel emphasized the need for better school security solutions, training and drills School Security Solutions Jake and Noel emphasized the need for better school security solutions, training and drills and encouraged people interested in contributing to Parkland’s school security to visit sosparkland.org. “I’m trying to take a bad situation and do good out of it,” said Jake. “If I could save one life by talking about this, it’s worth it.” Reps. Rick Larsen (D-Wash.) and Susan Brooks (R-Ind.) – co-chairs of the Congressional School Safety Caucus – also spoke at the roundtable, highlighting the importance of legislation like the STOP School Violence Act and efforts like research on the causes of gun violence to address this important issue. “Kids should be worried about learning, not whether their schools will be the next to fall victim to tragedy,” said Larsen. Secure Schools Roundtable: Opening Remarks Speakers: Tim Eckersley, Senior Vice President and President of the Americas, Allegion Rick Larsen (D-Wash.), Co-Chair, Congressional School Safety Caucus Susan Brooks (R-Ind.), Co-Chair, Congressional School Safety Caucus Quotes: “Kids not only need tools to learn – they need an environment that allows them to thrive. If kids are worried about the safety in their schools and surviving in school, there’s no way they can succeed.” – Tim Eckersley “It’s our moral obligation as an industry to address this issue.” – Tim Eckersley “While no one law can stop school violence, the STOP School Violence Act has steps Congress can take to save lives and make schools safer.” – Rick Larsen The session highlighted standards and best practices for school security, including research conducted by the Police FoundatBest Practices For School Security Secure Schools Roundtable: Development of Standards and Best Practices for School Security Speakers: Erroll Southers, Professor of the Practice of Governance, University of Southern California Ben Gorban, Policy Analyst, Police Foundation John Montes, Emergency Services Specialist, National Fire Protection Association (NFPA) Mark Williams, Steering Committee Director, Partner Alliance for Safer Schools (PASS) School Facility Security Standards Summary: This session highlighted standards and best practices for school security, including research conducted by the Police Foundation on state school facility security standards, requirements and guidelines, the NFPA 3000 standard for active shooter incidents and PASS’ work to help schools implement effective school security technologies. Quotes: “I never thought we’d reach a time where I’d be called to respond to school shooting incidents because they exceed homegrown terrorism.” – Dr. Erroll Southers “It shouldn’t take an incident – but when it does, policies like tax reform go out the window and school safety becomes #1. We shouldn’t wait until an incident occurs.” – Ben Gorban “[The impact of a school shooting] doesn’t end when it stops being reported on CNN – it goes on forever.” – John Montes
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Leaders in the security industry, government and technology gathered on June 27-28 in Washington, D.C., as the Security Industry Association (SIA) hosted its 2018 GovSummit. Each year, SIA GovSummit offers top-quality information sharing and education on security topics affecting federal, state and local agencies. This year’s summit tackled key security and policy issues like moving security services to the cloud, the use of artificial intelligence and machine learning for surveillance and the path forward for government and private security regarding the commercial use of aerial drones. Additionally, the event featured a half-day, expanded version of SIA’s popular Secure Schools Roundtable, SIA member visits on Capitol Hill, a networking breakfast at the Capitol Hill Club and presentation of the 2018 Legislator of the Year and Statesman Awards. DHS works to protect federal networks and facilities and critical infrastructure Protecting Federal Networks & Facilities Providing keynote remarks at the 2018 GovSummit were Chris Krebs, undersecretary of the National Program and Programs Directorate (NPPD) at the U.S. Department of Homeland Security (DHS), and Soraya Correa, DHS’ chief procurement officer. Krebs highlighted DHS’ work to protect federal networks and facilities and critical infrastructure, the threat of nation-state attacks on American democracy through targeting election equipment and spreading false information on social media to sow division and discord and NPPD’s focus on blending physical security and cybersecurity in a holistic, top-down risk management approach. “Government’s role is to assist in raising the security baseline,” said Krebs. Correa spoke about DHS’ procurement efforts in support of the department’s strategic vision and interest in inviting creativity and innovation in its contracts with organizations. “When we understand each other’s business processes, we can do better business together,” Correa said. “We work with industry, associations and more – we want you to do business with us.” Cybersecurity And Identity Policy In a panel discussion of the Office of Management and Budget’s new cybersecurity and identity policy, Jeff Nigriny highlighted the Interagency Security Committee’s new instructions to federal chief security officers on physical access control systems implementations being fully compliant with federal security standards. “2018 is the year we fix the policy,” Nigriny said. In another session, a panel of experts considered the path forward for government and private security when it comes to unmanned aerial system (UAS) and counter-UAS policy. As drones have become more widely used, national security agencies have raised drone security as an important policy issue. “We could call this time the years of drone security,” said Lisa Ellman, partner at Hogan Lovells LLP and Company and co-executive director of the Commercial Drone Alliance. Rob Reiter was recognized for his leadership on issues related to protective and architectural bollards to address the need for greater perimeter security Public Safety And Security During the summit’s Policy Leadership Awards Dinner, SIA also presented its 2018 Legislator of the Year and Statesman Awards. The SIA Legislator of the Year Award is presented annually to members of Congress and other elected officials who have demonstrated extraordinary leadership in advancing legislation and policies that encourage the effective use of technology solutions to enhance public safety and security and protect critical infrastructure. This year, SIA honored Sen. Orrin Hatch (R-Utah) and Rep. John Rutherford (R-Fla.) for their work on the STOP School Violence Act, Sen. John Thune (R-S.D.) for authoring the Investment in New Ventures and Economic Success Today (INVEST) Act, Sen. Gary Peters (D-Mich.) for authoring the Secure Airport Spaces Act and Rep. Dan Donovan (R-N.Y.) for authoring the Shielding Public Spaces From Vehicular Terrorism Act. The Statesman Award is presented each year to SIA member volunteers who have made extraordinary contributions of professional time, leadership and resources to position SIA to address the public policy challenges impacting the security industry. This year’s recipient was Rob Reiter, co-founder of the Storefront Safety Council and chief security consultant at Calpipe Industries, recognized for his leadership on issues related to protective and architectural bollards to address the need for greater perimeter security. SIA 2018 Partners & Sponsors This event was made possible through Washington sponsor United Technologies (Lenel and Interlogix); Lincoln sponsor HID Global; Jefferson sponsor Johnson Controls; dinner and reception sponsor Allegion; event sponsors AMAG Technology, American Fuel & Petrochemical Manufacturers, Ameristar Perimeter Security, ASIS International, Axis Communications, BCDVideo, Calpipe Security Bollards, Chenega Security, Christie Digital Systems, Defense Forensics and Biometrics Agency, Gallagher, GSA Schedules, Inc., Hanwha Techwin America, DHS Science & Technology, Identiv, Louroe Electronics, Marshalls, Milestone, Nasatka Security, Panasonic, the Partner Alliance for Safer Schools, Renova Technology and the Secure Schools Alliance; media sponsors Campus Safety and DomesticPreparedness.com; and industry partner ISC Security Events.
Genetec Inc., global technology provider of unified security, public safety, operations, and business intelligence solutions, announced that its unified platform, Security Center has been integrated with Secure Store, a profit protection and exception reporting solution developed by Appriss Retail. With this integration, retailers can now immediately disprove or validate suspicious transactions by accessing the security video evidence associated with suspected fraudulent activity. Security Center And Store Integration Secure Store enables retailers to significantly mitigate losses related to fraud, theft, and operational/systemic breakdowns. Using artificial intelligence and machine learning, Secure Store performs advanced exception modeling from multiple data sources and enables immediate corrective action. US-based retailer, DICK’s Sporting Goods, is using the Security Center platform to monitor over 18,000 cameras across 720 stores and manage 230 cameras and 130 doors at its headquarters. The organization is now using the joint Genetec/Appriss Retail solution to provide immediate insight, reduce shrink, improve profitability and achieve rapid ROI, as Jacob Gillette, Director of Loss Prevention and Operations, DICK’s Sporting Goods explains: Genetec/Appriss Retail Solution The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations" “The Genetec system, combined with the Appriss Retail Secure Store application gives us capabilities that help speed up our investigations, which has been hugely beneficial to our organization. Our investigation team can now easily retrieve video from Security Center to validate suspicious transactions that are flagged by the Appriss Retail exception reporting system.” Thanks to the integration of Security Center and Secure Store, retailers can now simply click on the video icon within the Secure Store interface to immediately identify and review the security video related to individual transactions. This allows them to evaluate detailed evidence related to all refunds, transaction items, discrepancies between what is being scanned and what is on the bill, and quickly determine if there was indeed a problem. Importance Of Video Evidence In Fraud Cases The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users" “When you investigate fraud, you need to be able to validate questionable behavior. This is why video evidence is so critical. Thanks to our partnership with Genetec, we are now able to provide our customers with immediate insights that allow them to make informed decisions and build defensible cases based on hard evidence,” said Corey Adams Vice President of Global Client Services for Appriss Retail. “We’re pleased to be able to assist retailers with integrations that help make their teams more productive and significantly reduce loss. The open architecture of Security Center allows us to work with partners like Appriss to provide comprehensive solutions that benefit our joint end users,” said Scott Thomas, Director of Retail Market Development at Genetec.
Located one hour outside of London, the borough of Runnymede is a local government district with over 80,000 residents in the county of Surrey. It is one of the most prosperous parts of the London commuter belt and home to some of the UK’s most expensive real estate. In order to enhance public safety, the borough council contracted service provider Safer Runnymede. Working with Nottinghamshire-based systems integrator Central Security Systems, the experts installed a platform combining public safety technology with personal safety services such as care solutions for the elderly. Bosch Video Security System Today, Safer Runnymede coordinates all connected solutions in a Control Room in the town of Addlestone, where a staff of three operators monitor security feeds from over 500 security cameras deployed around various boroughs within Surrey. Next to public streets in the area, the flexible system also monitors schools, hospitals and other public buildings around the clock. Every year, the team responds to 20,000 incidents from cameras, and the video security system has proven an asset in monitoring traffic, preventing crime, as well as providing evidence and following suspects after incidents. But achieving this level of integration was a challenge. Connecting the solutions via the BVMS allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure Initially, the video security system consisted of hardware from several different manufacturers including Bosch – making updates or replacements a time-consuming process – that was networked on a Bosch Video Recording Management (VRM) solution. Looking for a future-proof and scalable system built on an integrated software platform, the officials in Runnymede tasked Bosch to design a fully IP-based security camera architecture. IP Video Surveillance System Since the Safer Runnymede system already included a Bosch monitor wall plus encoders, cameras, VRM and storage devices, system integrators could leverage the initial investment into a full suite of Bosch solutions. The system now combines new high-resolution AUTODOME IP 4000, AUTODOME IP 7000, MIC IP 7000 moving cameras, and FLEXIDOME IP 7000 fixed cameras, plus older Bosch and third-party analog cameras paired with encoders, decoders, and DIVAR IP 3000, 5000, 6000, and 7000 recorders. Connecting these solutions via the Bosch Video Management System (BVMS) allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure. The flexible system design and management has provided an integrated approach to our business delivery" As a result, Safer Runnymede has benefitted from superior image quality delivered by the added network video security cameras, without the need of replacing the complete existing analog video security infrastructure; all in a resilient, easily expandable system at a reduced total cost of ownership (TCO). What’s more, the customer has used the flexibility of Bosch solutions in a deployable video surveillance camera at remote locations. Installed in a custom-built enclosure provided by Central Security Systems, it streams video data from an AUTODOME IP 4000 camera via 4G and sends alerts via SMS to the Control Room upon detecting activity such as illegal waste dumping. Bosch Video Management System Migrating from a fragmented, analog system to an integrated IP network managed via BVMS (Bosch Video Management System) has proven a forward-facing decision. “The flexible system design and management has provided an integrated approach to our business delivery, allowing us to make better operational decisions and become more dynamic and competitive in the video surveillance marketplace, “says Les Bygrave at Safer Runnymede.
One of Fortaleza's largest hotels, the Gran Marquise Hotel, which hosts thousands of people each year and holds hundreds of events, has reinvented itself and converted analog technology to IP surveillance. Upon project completion, it is expected that the Gran Marquise will have 250 VIVOTEK network cameras installed, integrated and linked with all other hotel devices under Genetec’s cloud-based video-surveillance-as-a-service (VSaaS) solution, Stratocast. About Gran Marquise The Gran Marquise is a five-star hotel of 18 thousand square meters located on the seafront of Fortaleza (Ceará). With a 23 year history, the hotel has a large infrastructure of 230 apartments ranging in size from 29 to 131 square meters, two presidential suites and 21 floors in total, of which 14 are dedicated to guest rooms 7 are retained for events, recreation and administration. The Gran Marquise realised that its security system needed to be renewed It is one of the most in-demand destinations among national and international authorities, artists and athletes, such as Bill Clinton, former president of the United States, Vladimir Putin, current president of Russia, singer Paul McCartney, rapper Snoop Dogg, as well as the fighters of the Ultimate Fighting Championship. In addition, the Gran Marquise was the first hotel in Brazil to achieve the ISO 22000, certificate that ensures adherence to extremely high standards of food quality and safety. Unified Security And Operations The Gran Marquise realised that its security system needed to be renewed. The hotel had 500 analog cameras and 22 digital video recorders installed – an extensive system, but one which only provided low-quality images and demanded heavy workload when it was necessary to locate and retrieve footage of a recorded event. "We looked at the hotel and realised that we had good internet, excellent rooms, perfect service, but if a customer asked for footage from security cameras, the only thing we could offer were noisy images," said Jussieudo Gomes, Security and Information Technology Division chief of the Hotel Grand Marquise Fortaleza. To solve this dilemma and improve the management and security of the hotel, a plan was formulated to develop a pilot project with VIVOTEK – a global provider of network cameras, PoE switches, and network video recorders, and Genetec, a global provider of IP surveillance software, access control and license plate recognition solutions. Installing VIVOTEK Network Cameras Divided into four stages, the goal of the project was to enable the total unification of management, security, marketing and commercial operations Divided into four stages, the goal of the project was to enable the total unification of management, security, marketing and commercial operations. In the first phase, 250 analogue cameras were replaced by a mere 48 VIVOTEK network cameras. Also installed was the Genetec Stratocast software, a cloud-based video recorder tool that eliminates the need for any local server, making it possible to monitor and share images with fully encrypted data. Two models of network cameras were installed throughout the hotel: one is the IB8369A, a 2-megapixel camera capable of capturing high quality video, with IR illuminators effective up to 30 meters for superior image quality throughout the day and night. The camera also features Smart Stream II technology, which optimises image quality for the most important regions in any scene; in doing so it can reduce network bandwidth consumption and storage requirements by up to 50%. The other camera installed was the small-scale, but big-featured FD8166, an ultra-mini fixed dome network camera with a tiny diameter of only 90mm. Genetec Security Center Solution "Because of the ‘L’ shaped layout of the hotel, we previously had five analog cameras installed on each floor: two in the corridor, because the distance from one side to the other was too long to be monitored by a single analog camera; one in front of the elevator; another covering the 'L' and one more covering the maid’s service area. "Now, each floor has only three cameras: one camera that serves the 'L' and the elevator; another that serves the corridor and one more observing the service area. At the reception area, the same thing happens, we put a different camera on the ceiling, and with just that solution we managed to cover the lobby, the bar, a part of the reception and the stairs of the restaurant, "explained Gomes. The Genetec Security Center solution was implemented for the internal parts of the hotel In the second phase, the Genetec Security Center solution was implemented for the internal parts of the hotel. With this platform, Gran Marquise can unify operations by combining all IP surveillance systems into one interface. Now all access control and video surveillance are connected to, and accessible through, the cloud. Unified Access Control And Fire Security The third and fourth stages are still in progress. The goal is to install 250 network cameras in total and unify the security system with access controls and the fire alarm system. In addition, the KiwiVision analytical software was also installed, a system which counts people automatically through cameras and 3D sensors and detects objects added or removed from a scene. This way it is possible to automatically detect if a dangerous object has left behind or if something has been stolen from a particular area. "The new security system has come to improve the image quality of surveillance, the layout of the hotel and the promptness of response to the customer. In the past, if we needed an image we had to expend great effort in searching whole files and spend hours watching videos to be able to select and retrieve the relevant event - not to mention the impact power failures, and malfunctions issues in power supplies, recorders and hard disk drives. ", said Gomes. Video Security Integration The new IP surveillance infrastructure has already proven effective during a wedding held at the hotel The new IP surveillance infrastructure has already proven effective during a wedding held at the hotel. The bride had been in the spa area enjoying the luxurious Day of the Bride service. However, when she went to dress up for the ceremony, she did not find the jewelry she had prepared for the wedding. Security staffs were triggered to investigate the occurrence. “Through descriptions of the bag that carried the jewelry and the time when the bride last saw it, we were able to locate the footage though the synergy of VIVOTEK’s camera and the Genetec system, and then proceed to point of precise relevance in the video. We noticed that the bride carried the purse into the car, but on exiting the car she was no longer carrying it. When we showed her the pictures, she went to the car and the purse was there. If it wasn’t for the new IP surveillance solution, we would not have been able to ascertain what had happened, the bride would remember and find the jewelry only after the ceremony, and her day would have been ruined. This entire investigation process, finding the images and resolve the case, took only 15 minutes, but saved a very important day" said the security chief. Genetec Public-Private Partnership The Hotel Gran Marquise’s new security system is part of Genetec's private-public sharing initiative The Hotel Gran Marquise’s new security system is part of Genetec's private-public sharing initiative, which enables the sharing of certain cloud-recorded images with police forces. The Military Police, the Ceará State Government and the ABIH (Brazilian Hotels Industry Association in Ceará) are partners in this project along with the hotel. The purpose of this private-public partnership is that, with the monitoring carried out by private companies, the public sector can achieve a more effective action, speedily curbing the action of criminals in monitored places. The private-public partnership is founded on the belief that such sharing of private company surveillance with the public sector will enable a more expedient and effective curbing of criminal activity in such monitored areas. In this way, it is possible to expand monitored areas and reduce crime without direct public sector investment. Recorded images are transmitted in real time to the police, and a two-way relationship benefits both sectors. "The goal of projects with public-private partnerships is prevention. It is possible to increase public safety with little investment from the private sector," explained Country Manager of Genetec Brazil, Denis André Côté. With such initiatives, we are beginning to see the benefits of advances in total surveillance systems expand beyond those companies who take the initiative to invest in them and begin to serve the broader public.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behavior, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favor traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six meters tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defense Center, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilizing wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's Property Security Solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behavior and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
With a number of terrorist attacks having taken place around the world in the past days, city surveillance has become a crucial issue with top priority for the local and central governments. Surveon city solutions provide product lines including high reliability cameras with excellent image quality, feature-rich VMS with video analytics function, and RAID NVR with large storage capacity for 365+ days non-stopping recording. These comprehensive solutions help governments to build good foundations to improve social order, crack down on crimes, and protect citizens from horrible attacks. High Reliability Cameras Generally speaking, the governments might encounter some major challenges when designing a suitable surveillance system, such as heat, humidity, and temperature changes in outdoor environment. Under such circumstances, Surveon provides cameras with excellent image quality and lowest RMA rate to handle all kinds of outdoor condition. "Surveon’s industrial designed and 100% own manufactured cameras have made us feel confident about this project. The cameras are now being used for a few years with an average failure rate of less than 0.03% which is really impressive." said Chan, the surveillance project manager of Kaohsiung. Surveon NVRs provide large capacities for 365+ days non-stopping recording, extended IP storage, and RAID function for zero video loss RAID NVRs The data retention of recorded video is particularly important to the planning and acceptance of city projects. Surveon NVRs provide large capacities for 365+ days non-stopping recording, extended IP storage, and RAID function for zero video loss. Enterprise VMS In addition, Surveon intuitive VMS offers features such as video analytics, offering police units powerful yet easy to use solutions for city surveillance. By paired with Surveon enterprise VMS, the solutions provide robust prevention, preparedness, detection, and quick response measures. Surveon city solutions have been successfully applied in some major cities in Taiwan and Mongolia. “With Surveon’s E2E solutions, from 3-megapixel IP66 cameras, hardware RAID NVR, clustered storage, to enterprise VMS, we are now better equipped to monitor the entire district and protect the community against illegal activities.” said the Sükhbaatar district police officer in Mongolia.
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components has announced that The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world, recently completed installation of the Vicon Valerus video management system to secure the Cathedral and surrounding 11.3-acre complex in Manhattan, New York City. As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, The Most Reverend Desmond Tutu and President Bill Clinton. The new Valerus system combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers Vicon Valerus VMS The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras include models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Cameras also provide coverage of the Cathedral’s’ exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Vicon High-resolution IP Cameras Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally ill and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen" Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine, says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-to-end Vicon solution, including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile of installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.