Axis Communications announces the upcoming launch of AXIS Object Analytics. This intelligent video analytics application offers detection and classification of humans and vehicles tailored to the surveillance need. Ideal for various installations including public buildings, warehouses, and parking lots, it will be offered pre installed on compatible Axis network cameras, adding value at no extra cost. Designed with a straightforward interface, tailored scenarios are easily set up with only a few...
Current security and hygiene-protocols require special measures for access to buildings and rooms. This can lead to bottlenecks especially when there are large numbers of people and poses special challenges for many companies. Protecting the health of employees, visitors, and customers have a top priority. The risk of production downtime in the event of a quarantine measure is very high. Hygiene concepts reduce the risk of infection, but also tie up valuable human resources. Vital tasks of IR...
CP Communications, a pioneer in innovative solutions and services for live event productions, has acquired the assets of SportsCam, the groundbreaking innovator and creator of a wide range of wireless and robotic camera products for live sports production. The acquisition expands CP Communications’ range of wired, wireless and cellular content acquisition and streaming systems for its Red House Streaming brand, while also opening the door for new business opportunities in security and pub...
ASIS International and the Security Industry Association (SIA), the membership associations for the security industry, announce a partnership to produce an event designed to help security organizations and businesses around the world develop and implement diversity, equity, and inclusion (DE&I) strategies. The free virtual event, titled Global DE&I Strategy: Policy and Practices that Produce Positive Business Outcomes, will be held 10 December 2020, 11 a.m. – 12:30 p.m. ET. Gener...
Sectigo®, a provider of automated digital identity management, embedded security, and web security solutions, and Green Hills Software, the pioneer in high-assurance operating systems, have announced a global reseller agreement. The agreement enables Green Hills Software to offer Sectigo's Icon LabsTM Embedded Firewall, integrated and optimized for use with Green Hills Software’s INTEGRITY® real-time operating system (RTOS) and its embedded high-performance TCP/IP v4/v6 host and r...
Grappling with risks prompted by COVID-19 and escalating violence, Americans prefer modern, touchless security screening systems over legacy metal detectors. They expect their schools, workplaces and ticketed venues to ensure social distancing and would abandon their plans rather than enter a facility with crowded security lines. These and other insights were released by Evolv Technology based on a new survey conducted by The Harris Poll. The survey was conducted online with more than 1,500 Ame...
ExtraHop, a provider of cloud-native network detection and response, announced survey results of “The Total Economic Impact of ExtraHop Reveal(x).” The commissioned survey conducted by Forrester Consulting on behalf of ExtraHop reveals that ExtraHop customers benefit from “an 84 percent decrease in time to threat resolution, $700,000 annual savings in tools consolidation, and 165 percent return on investment.” According to the study, ExtraHop provides measurable benefits for businesses including significant reductions in unplanned downtime, time spent troubleshooting, and time spent detecting and resolving security threats. Forrester’s analysis of the benefits concluded that ExtraHop customers receive “a 50 percent decrease in time to threat detection, and a 99.6 percent reduction in time to troubleshoot applications.” Threat detection and resolution Findings from the study include: Improved time to threat detection and resolution: ExtraHop Reveal(x) decreased time to threat detection by 50 percent, and time to threat resolution by 84 percent. Improved efficiency responding to unplanned network outages: After implementing Reveal(x), unexpected network outages decreased by 90 percent and the time to solve any unplanned network outages decreased 92 percent. Improved time to troubleshoot applications: Reveal(x) decreased time to troubleshoot applications by 99.6 percent, from 40 hours to a matter of minutes for each application failure. Reduced cost of third-party security solutions: A subset of customers reported the ability to consolidate tools and decommission legacy security solutions, saving as much as $700,000 annually. Additional revenue and productivity from improved uptime: Interviewees reported that the additional network and application uptime from Reveal(x) resulted in increases to both revenue and employee productivity. Endpoint detection and response Forrester interviewed five ExtraHop customers across industries with experience using Reveal(x) For the purposes of this study, Forrester interviewed five ExtraHop customers across industries with experience using Reveal(x) and aggregated the experiences into a single composite organization. Prior to using Reveal(x), the customers were using a combination of packet capture tools, endpoint detection and response (EDR) products, and security information and event management (SIEM) solutions. “We had SIEM, but there were always holes in that information. We added EDR, and there were still certain bits of information missing,” said the SVP of Global Infrastructure in the Financial Services Sector. “We didn’t get the full picture until investing in ExtraHop Reveal(x).” Detect anomalies In a crowded cyber security market, the survey notes ExtraHop’s customers reported “significantly enhanced network visibility” and the “clarity needed not only to detect and respond to security threats at a much faster rate”, but also to “analyze end-user behavior and detect anomalies that could pose a threat”, and to “monitor and troubleshoot both application and network performance.” To Learn more about the Forrester TEI study, one may join a webinar featuring Forrester analyst, David Holmes on Tuesday, October 20, 2020 at 8 am PT (available on demand after) titled: Improving Incident Response Time by 84%: A Forrester TEI Survey.
ADI Global Distribution, a wholesale distributor of security, AV and low-voltage products, announces the availability of its 2020-2021 Pro AV & Smart Home Solutions catalog. This dedicated reference guide brings together top selling products from the pioneer brands to help dealers build complete, integrated solutions. Available in print and digital, dealers can get a copy of the Pro AV & Smart Home Solutions catalog at their local ADI branch, or can view it online. The ADI Pro AV & Smart Home Solutions catalog offers more than 130 pages of detailed product information from over 40 suppliers. Smart home market This specialty catalog highlights the value-added services available at ADI including Systems Design, Project Registration, IP Programming and more. "As the AV and smart home product categories continue to grow at a rapid pace, ADI is committed to ensuring our dealers have access to the right products to capitalize on these growth opportunities," said Marco Cardazzi, vice president of global marketing at ADI Global Distribution. ADI offers additional resources to help dealers stay ahead in the AV and smart home market "The Pro AV & Smart Home Solutions catalog showcases our offering, and was designed to help dealers sell, design and deliver a connected experience." ADI offers additional resources to help dealers stay ahead in the AV and smart home market. With 108 branch locations and nine distribution centers across North America, ADI offers the largest in-stock inventory, competitive pricing, delivery options, flexible terms, monthly sales promotions, training events and more. Connected home experience In addition, ADI recently launched a redesign of its Digital Branch to make browsing and purchasing online at ADI easy. Dealers can shop for AV and smart home products through the Digital Branch, and a dedicated interactive smart home landing page provides a room-by-room product tour to help them design the ultimate connected home experience. Along with the Pro AV & Smart Home Solutions catalog, ADI produces the Ultimate Product Guide - a quarterly catalog in the U.S. with more than 400 pages of product information, and a semi-annual catalog in Canada with over 300 pages of product information.
BCD International releases Harmonize Conductor VMware plug-in, exclusively available on the REVOLV portfolio of hybrid hyper converged infrastructure (hHCI) products. REVOLV is an innovative hHCI solution that reduces or even eliminates inefficiencies often presented by infrastructure in the video surveillance space: large hardware footprint, high power and cooling costs, multiple OS, and software systems, and limited resources dedicated to each server. BCD’s REVOLV application offers an IT-ready solution for security integrators who need to scale to large volumes and want the ability to do so without reliance on infrastructure expertise. Virtual machine management The Harmonize Conductor for VMware is a full Genetec plug-in that displays the entire vSphere environment from within Security Center. Built on the Genetec SDK platform, the BCD Harmonize Conductor leverages many advantages found with Security Center such as creating entities, event-to-actions, and role fail-over. The BCD-developed application enhances the user experience by introducing Virtual Machine (VM) management while staying true to the Genetec platform. Conductor utilizes the VMware APIs to integrate VMware services into Security Center Developed on a .NET 4.8 Technology Stack and vCentre API, version 6.7, Conductor utilizes the VMware APIs to integrate VMware services into Security Center. The plug-in creates virtual machines from templates, manages virtual machine properties, and displays virtual machine telemetry. Administrators can define custom entities within the Config tool as well as health thresholds as deemed necessary. Real-Time analytics Conductor utilizes custom events as communication between client and server applications and hooks for operators to use within SC, or through other management options such as Genetec Mission Control. The benefits to the system administrator include a ‘single pane of glass’ system management. Administrators will have access to real-time vSphere analytics to monitor their system from anywhere, real-time vSphere events to keep the system synced and perform actions when needed, and the ability to create ad hoc virtual machines. The Harmonize Conductor VMware plug-in comes standard on all REVOLV systems, which are available to the security integrator directly through BCD. All systems include on-site installation through BCD’s Professional Services program.
Honeywell is adding to its video series line with the launch of the 30 Series Embedded Network Video Recorders (eNVR), the latest affordable and fully featured NVRs that offer 4K HD (UHD) video resolution. The Honeywell 30 Series eNVRs are designed for use as part of video systems which comply with the John S. McCain National Defense Authorization Act 2019 (NDAA), Section 889. They are also PCI-DSS compliant and include enhanced cybersecurity with a built-in FIPS chip set Users will also benefit from encrypted streaming between 30/60 Series cameras to 30 Series NVR and all the way to Honeywell Video Management Viewer (HVMV) and mobile apps. The 30 Series eNVR gives users the option to choose between 8 or 16 channels NVRs, with multiple hard drive options and up to 20 TB of internal storage. Key benefits and features Easy to use - Features plug and play installation with the Honeywell 30 and 60 Series cameras to make set up fast and easy to help reduce storage, installation, and configuration costs. Create safety & security efficiency - Integrates the 30 Series IP camera motion, intrusion and advanced people detection analytics for improved effectiveness while using 265 HEVC Smart codec to reduce storage space. Superior user experience - Includes simple remote configuration through HVMV, with a Global P2P Service with reliable connection anytime, anywhere through mobile access for both Apple® and Android™ devices. With a user-friendly interface, HVMV can be deployed for device management and configuration, video live view and playback, smart search, event management, pan-tilt-zoom (PTZ) control, Fisheye camera de-warping and E-map. HVMV also features multiple monitor support, multiple display layouts, customized views and tours and global P2P remote connection for efficient monitoring and operation. HVMV can support up to 2,048 cameras and multiple NVRs which is ideal for small to medium or multi-site video systems. With HTTPS & TLS 1.2 encrypted streaming and communication between the 30 and 60 Series cameras, the 30 Series eNVR and HVMV, customers will benefit from an end-to-end encrypted and secure video surveillance solution.
Ping Identity, the Intelligent Identity solution for the enterprise, announces the finalists for the fourth annual Identity Excellence Awards, honouring the best-in-class identity programs from global organizations. Winners will be announced during IDENTIFY 2020 Virtual on October 7. For the past four years, Ping Identity has recognized customers for their adaptability and innovation in the identity industry. From organizations helping businesses stay secure during the transition to remote work, to those creating seamless and secure customer experiences, these companies are hand-selected by Ping’s leadership for their unique and forward-looking approaches to identity security. Industry-Shaping ways The categories and finalists within each are as follows: Identity Innovation Champion - These are the companies pushing the limits of identity and embracing the digital future. They adopt new technologies and pave the path for a future built on identity. The finalists are WaFd Bank and Healthcare of Ontario Pension Plan (HOOPP). Identity Security Champion - This group secures the enterprise in industry-shaping ways. Their unique security approaches change the way the enterprise is secured. The finalists are Amadeus SAS, Jefferies and DB Schenker. Customer Experience Champion - These companies put customers first and drive loyalty with secure and seamless interactions. The finalists are the Province of New Brunswick, Tesco Bank and University of Hull. Cloud Identity Champion - This group embraces the potential of the cloud, combining top-notch security with highly accessible services in an agile environment. The finalists are Mazars, Porsche AG and Capital One. Modern Identity Champion - These organizations connect powerful new IAM capabilities to existing investments, leading the charge on modernizing legacy systems. The finalists are the City of Boston, Freddie Mac and Gates. Better Identity Together - This award recognizes Ping Identity customers and partners that are working together to embrace identity security in unique and meaningful ways. The finalists are Westpac & Versent, CSL Behring & Identropy, and WaFd Bank & HiQuest Group. Champion of Change - As global events introduced an all-digital reality, this group took the reins on using identity to keep people safe, keep business going and steer all in a new direction. The finalists are the Province of New Brunswick and Vertafore. CEO’s Choice Award - These nominations recognize companies that generally challenge the industry and push Ping products to new levels. The finalists are Refinitiv and Ticketmaster. Truly transformational ways “We put our customers first year round, but are proud to take this moment today to provide some much-deserved recognition to those that are leading the industry in truly transformational ways,” said Andre Durand, CEO, Ping Identity. “We believe that identity management is the key to unlocking true digital transformation, and IDENTIFY 2020 Virtual provides the opportunity to celebrate organizations from a variety of industries around the world who are blazing the identity trail.”
The threat landscape we operate in today is changing all the time. Around the world, pressures on law enforcement bodies remain incredibly high as they face the challenge of rising international threat levels and a backdrop of intense political, social and economic uncertainty. It is a challenge that demands a considered, proactive and dynamic response. It’s clear that new technologies, such as Artificial Intelligence (AI), can dramatically improve the effectiveness of today’s physical and cyber security systems and help us to better defend against a wide-spectrum of threats. Finding the balance Specifically speaking, for physical security systems to be effective, they must have the full support of the public. Airport-style environments where security checkpoint processes are implemented are both time consuming and obstructive, and feels, at times, they are in no one’s best interest. Oppressive, fortress-like environments are likely to quickly lose the backing of the public, who want to be able to go about their daily lives without being delayed or obstructed by cumbersome security checkpoints and procedures. For physical security systems to be effective, they must have the full support of the public However, after a large-scale security threat or attack occurs, it is often these more overt systems that we gravitate towards, often fueled by a proven track record of both deterrence and detection. It’s the antithesis of ‘out of site, out of mind’ security. Having these large, bulky overt security systems offer reassurance to people and create a greater sense of security. But what if we could instill this sense of security without monstrous overt systems? What if today’s physical security systems could allow for seamless people flow while creating safe environments, all done in a covert manner without interrupting peoples’ way of life? This is exactly what can be achieved with the some of the new physical security applications that incorporate AI. Security solutions with AI: how, what, where? Today, security solutions driven by AI technologies are being developed and can be covertly deployed across a range of physical environments to protect our global citizenry. These new AI-driven technologies are taking multiple different forms, depending on the locations they are designed to protect. Video management surveillance systems (commonly referred to as VMS systems) are being enhanced by AI/computer vision technology to identify objects. These enhanced VMS systems can be deployed both inside and outside of buildings to identify and flag forbidden objects, such as visible guns, knives or aggressive people, in a wide range of public spaces, such as schools, hospitals, sport stadiums, event venues and transportation hubs. Recognized threat objects in hand or suspicious behaviours can be identified and flagged instantaneously for onsite security to further investigate. In addition, targeted magnetic and radar sensor technologies, concealed in everyday objects like planter boxes or inside walls, can now scan individuals and bags entering a building for concealed threat objects. Using AI/machine learning, these two sensor solutions combined can identify metal content on body and bag and match the item to a catalog of threat items, such as guns, rifles, knives and bombs with metal shrapnel. Without this advanced multi-sensor solution, it becomes nearly impossible to discover a weapon on a person's body before it appears in an assailant’s hands. This multi-sensor solution allows for a touchless, unobtrusive access to a building, but allows for immediate notification to onsite security when a concealed threat is detected. The hidden technology thus empowers security staff to intercept threats before they evolve into a wider scale attack, while also maintaining the privacy and civil liberties of the public, unless, of course, they are carrying a concealed weapon or pose a physical threat. AI-powered solutions proactively help onsite security to effectively safeguard the public Unlike many large, fixed detection security systems, AI-powered solutions proactively help onsite security to effectively safeguard the public without causing mass obstruction and disruption. Soft target hardening Hardening a facility against physical attacks and threats can be expensive, as well as maintaining and running large fixed detection equipment. It may also result in the threat shifting to ‘softer’, less secure targets, for example schools, music venues and places of worship, all locations we’ve see active attacks in the past decade. Around the world, we have seen the devastation to communities and the aftermath impact of these attacks. In the USA, for example, in February 2018, a 19-year-old gunman walked into Marjory Stoneman Douglas High School in Florida, and opened fire, killing 17 students and faculty members. And in the UK in May 2017, a suicide bomber attacked a concert venue in Manchester, tragically killed 22 people. It is a global priority to make these soft target public gathering places more secure. But in doing so we cannot turn them into fortresses. The security industry, public sector and national and local government must collaborate to deploy intelligent systems with technology at their core to not only protect lives, but also preserve a way of life. Integrated systems and behavioral detection One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI. Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. It’s not only knives, guns and explosives that intelligent systems can detect. They can also be trained to detect behavior and potential invisible biological threats, such as viral threats currently facing our world today. This does not mean profiling individuals. Instead, using AI that is deployed on existing CCTV or thermal camera systems, it looks for indicators that may identify a physical altercation and disturbance, an elevated body temperature, indicative of viral fever, or lack of a face mask for health safety compliance. When integrated, these solutions can provide onsite security with up-to-the-minute information to allow greater protection of the properties they serve. By using these intelligent, non-intrusive technologies, today’s security personnel are now more capable of detecting a wide range of threats. This is the future of public safety and security, and we should expect to see these new technologies becoming more common over the coming years, as cities around the world strive to create smart, safer communities. The human element While technology can make a significant impact to existing security systems, it would be wrong to position it as the end-all, be all to preventing future attacks. Technology is only part of the solution. Well trained security personnel are also required; individuals who know how to use new technologies and the data they provide, and then make informed decisions about how to engage a potential bad actor or threat. Not only will a properly trained security staff member help to prevent an attack from happening, but the extra insight provides by these intelligent systems can potentially interrupt an attacker in planning and walk through stages, or even before a weapon is drawn. This alone has many benefits beyond just preventing an attack. It means that authorities can help these individuals, some of whom may be suffering from mental health issues, to get the help they need from professional healthcare workers. By security personnel working with local authorities and healthcare professionals, potential attackers can get the support they need, from de-radicalisation programmes to specialized counseling, helping them return to being a healthy, productive member of society. These intelligent systems can potentially interrupt an attacker in planning AI for safer communities AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Perhaps none more so, though, than to institutes of education, where we have seen many violent attacks over the course of the last few years. Specifically, the application of AI for detecting odd behavioral activity could be used to identify potential active shooter attacks, or even students who may be depressed and prone to committing suicide. Both tragedies we see weekly around the world. One thing is clear, cross-sector collaboration and the application of integrated, intelligent AI technology that puts data and ultimate control into a human’s hands can be key to making our communities safer places to live.
People have always had an innate need to feel secure, from building fires at the front of caves that ward off predators in prehistoric times, to today’s efforts of locking your front door. This need for security extends to venturing further afield from the home and is critical for communities to thrive and survive. More than ever, people want to be and feel safe; protected against physical and now biological threats. When it comes to staying safe, populations around the world have recently demonstrated immense adaptability to changing the way we live our lives in order to protect ourselves and others. In the wake of the COVID-19 pandemic, it isn’t strange to walk down a high street and not see swathes of people wearing face masks, where as little as six months ago it may have been an unnerving sight. While wearing a mask may not be a choice made by the majority in ordinary times, people are compliant as it is helping them get back to a “new” normality in day-to-day interactions. The same can be said for the use of technology. Beyond pure security, the technologies used to keep the public safe can become integrated into existing environments to make it easier to stay safe while visiting areas where there could be safety risks. Technologies used to keep the public safe can become integrated into existing environments Technology enabling freedom A good example of this is airports. The aftermath of the 9/11 attacks in 2001 changed how we are checked in at airports before boarding a flight, and I’m sure countless lives have been saved as a result of this more stringent security measures. However, the development of new technologies, which have been created against the backdrop of a more threat conscious world, could mean we are able to relax the experience of going through airport security for travellers. We now have innovations to spot, amongst hordes of people, those who pose a threat, while blending in with the general public. If we are able to make these identifications before an act is committed, we can cut out some of the draconian measures we are all so used to with scanning passengers before travel at a security checkpoint. If this is the case, then we could get to a model whereby you can pass through transport hubs, like airports, more freely, as fewer visible, large, overt checkpoints will be needed. And best of all, these new technologies can protect personal identity and civil liberties, until a threat object or behavior is detected. Concealable security solutions Today, visible checkpoints scan people in masses, using such large, wieldy devices, such as metal detectors, millimetre machines and hundreds of surveillance cameras peeking down from the ceilings. The use of these systems, which can feel intrusive and hold people up as they wait to pass through, can be reduced by employing new, innovative and concealable security solutions that are able to detect threats, but blend in with the existing environment; basically unseen, but always watching. For example, new advancements in magnetic technologies can be concealed in everyday objects that are aesthetically pleasing, such as planter boxes, which people walk past these every day without really noticing. These threat detection sensors, concealed in planter boxes, can scan individuals and their bags for catalogued metal objects. They can distinguish between those that may pose a threat, e.g. gun, knife, rifle, and those that are unlikely to, e.g. phone, keys. With this advanced magnetic technology, it becomes possible to discover weapons on a person's body, allowing for immediate alert notification to onsite security. Beyond physical objects, there are also small, concealable sensors that can detect, diagnose and track airborne trace explosives, chemical warfare agents and volatile organics. These sensors use tuneable electronic signals to detect chemical threats with a parts-per-billion sensitivity and can then send an immediate threat alert to security to investigate further. Threat detection sensors Innovative threat detection sensors can be integrated with existing security solutions These new, innovative threat detection sensors can be integrated with existing security solutions, such as access control systems, as well as security policies and procedures to enhance the effectiveness and performance of onsite security personnel and first responders. A great example of integration is using AI-driven/computer vision object recognition software with existing CCTV systems to detect visible threats, such as guns or knives. Every second in an early warning notification of a visible weapon drawn can save lives and possibly stop an attack from being carried out. Security and law enforcement can be alerted in real-time of the location and nature of the incident, so that action can be taken immediately. Extending the security perimeter with new detection sensors means security personnel and law enforcement don’t have to rely on someone reaching a checkpoint before a physical or chemical-based weapon is detected. And as these solutions get deployed more and more, awareness of these technologies seep into the marketplace. Would be assailants will be more likely to be deterred, as they think about walking along a path to the building or checkpoint and getting caught before they can instigate an attack. And to my earlier point, it also affords law abiding citizens more freedom to move around public spaces as they do not need to go through the lengthy security checks that we currently experience. Addressing current threats to act fast Unfortunately, annually we are seeing a rise in gun crime and knife attacks in soft target areas, with daily incidents reported across the US and UK. This has been exacerbated, specifically in the US, by the coronavirus pandemic and civil unrest, where gun sales have escalated in recent months - the FBI conducted 3.7m background checks on those wishing to purchase firearms in March 2020, an increase of 1.1m over March 2019. With so many more guns on the street, it increases the opportunity for bad actors to use these weapons with ill intent within their communities. It is important to harden soft target areas where our communities gather, such as schools, churches, resorts, office buildings, and stadiums and arenas. However, the nature of these venues - somewhere to meet, have fun and relax - do not lend themselves to prison-style, fortress-feel security measures. As well as the big, overt and visible technologies mentioned before, can in fact prove targets for terror. However, the good news is that some public sites have started to invest in and install these new innovative weapon detection solutions. This contributes to the creation of a seamless experience for civilians, who are able to enter and enjoy these locations without forsaking the way of life they have come to know and love, without divesting item in their pockets, pat downs, and slow walkthrough security scanners. Making public areas safer Beyond single-site installations at these locations, city managers and city councils are now looking at the widespread deployment of these new, concealable, touchless and unobtrusive security technologies, all with a goal to make their public areas safer. Once a threat is detected in one venue, an alert can be sent out in the immediate area Furthermore, by having an interconnected security system, once a threat is detected in one venue, an alert can be sent out in the immediate area. This will be picked up by other local security personnel in nearby sites, so they can be on guard to protect members of the public around their premises, as well as support law enforcement in finding and neutralising the threat. We’ve all heard the phrase smart cities, but with innovations in physical and biological threat detection, these cities can be as safe as they are smart.
Tragically, in the world we now live, mass shootings and gun violence are epic concerns not only in schools, but Big Box retail, hospitals, municipal buildings, festivals, sporting events, concert venues, and just about anywhere crowds gather or work. The number of incidents is not acceptable and is truly startling. There are many societal and mental health issues that can cause these events and their importance in solving this issue is critical. However, this article will be focussed on the technology side of preventing mass shooting events. Going beyond metal detectors The best way to eliminate mass shootings is to detect weapons before they ever enter, or as they enter, a building. Metal detectors have been effectively dispatched and used to identify weapons on a person entering a building. The major drawbacks of metal detectors are the cost to operate them, several security guards per machine, and the resultant bottlenecks which cause limited throughput at the entrances. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned New technology on the market uses millimeter wave detection to quickly scan someone walking through a portal. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned at the same time as the person. People can walk through the portals side by side to reduce bottlenecks. Additionally, the technology reduces the number of guards needed, reducing overall costs. Taking out the human element The first step in surviving a mass shooting is being situationally aware. Immediately accepting and understanding the sounds as gunshots is paramount. Just a few seconds can mean the difference between life and death during an active shooter situation. Gunshot detection can eliminate the fear factor, which in many cases temporarily paralyzes those involved and causes precious seconds to pass before action is taken. By using a trusted, effective gunshot detection solution properly partnered with a monitoring system can eliminate the human factor of indecision and delay. Further, coupled with a VMS camera system, it can visually verify the situation as an emergency, identify the shooter, and provide valuable, accurate information to First Responders—all within just a few seconds. The state of gunshot detection technology Gunshot detection technology has been explored and developed by the military since WWI, but commercially it has only been around for a few years. Such detection systems range from wide area coverage to room-to-room coverage. Most are acoustic based (using microphones) to listen for the sound of a gunshot, record the sound, then analyze it with sophisticated software to determine if it is, indeed, a gunshot. Many years have been invested fine-tuning the software to differentiate between a gunshot and other loud noises. Eliminating ambient noise is very difficult during this process. The locations and venues mentioned at the outset of this article inherently have loud, ambient noise. This, in most cases, causes systems to give a false-positive or to even fail to detect the gunshot. In turn, it can send unverified or wrong information to First Responders and Security and cause havoc of unwarranted fear and actions. To help increase the accuracy of the detection of an actual gunshot, many systems have added infrared sensors. Many systems use backroom or cloud servers to run the necessary analysis In addition to the challenge of false positives, many systems use backroom or cloud servers to run the necessary analysis. This not only increases the cost of the system but may increase the notification time of the actual gunshot. Integration of this data to alarm, notification, and camera systems is difficult and costly. And experts say none of these systems are yet 100 percent effective. Enter ultrasonic sensor technology Fortunately, new technology is emerging in the industry. Technology which can eliminate the false-positives and reduce the cost by doing away with the expensive software, servers, cloud servers, and human intervention. This technology uses non-acoustical ultrasonic sensors to detect the frequency of a gunshot concussive wave created by a bullet, leaving the chamber along with the explosion wave force. Because these sensors are not acoustic (microphone), they will not pick up the ambient noise like other systems. In addition, the ultrasonic sensors only detect the gunshot concussive wave within the determined frequency. This also helps eliminate confusion caused by loud noises such as thunder, cars backfiring, large boxes being dropped, etc. An added bonus is ultrasonic sensors are not acoustic, therefore they are never listening or recording, the sensors only operate when there is an actual gunshot; hence, they’re completely non-invasive. The ultrasonic sensors only detect the gunshot concussive wave within the determined frequency Finally, these non-acoustic sensors do much of the work through an onboard processor, no backroom or cloud servers are needed. Integration to systems such as VMS, Access Control, Alarm Panels, etc. requires minimal effort. This allows existing security systems to be integrated with gunshot detection, creating a low-cost, highly effective overall solution. Protecting our children, loved ones, employees, and customers is a monumental challenge for any security professional. Using newly available technology, combined with existing security infrastructure, we have the ability to add on layers of safety to help reduce the tragedy of gun violence and mass shootings. This article was co-written by Brad McMullen, General Manager at 3xLOGIC, and Brad Jarrett, CTO at Active Guardian.
Arteco’s VCA video analytics system is their latest new product, signaling a move from machine vision-based analytics to deep learning video analytics. A server – separate from the Arteco video management system (VMS) – manages the algorithms for the analytics. Arteco has been field-testing the product for a year and a half and had planned to launch it officially at ISC West in March (which was postponed). In lieu of the trade show launch, the company has been presenting the product (along with partners) through a series of webinars. The deep learning video analytics product operates out of the box – “just turn it on,” says Steve Birkmeier, Arteco VP of Sales. Functionality is based on “training” of pre-classified objects, such as differentiating between a person, an animal, a vehicle, or just clutter. The deep learning library focuses on people and vehicles. Detection and identification The new system detects everything in the field of view The new system detects everything in the field of view and only identifies what the operator is looking for, thus reducing false alarms. Any identified object is provided with an accuracy reading (e.g., 92% confident it is a human.) The system can be set up from the graphical user interface (GUI). Arteco VCA (video content analysis) also uses analytics rules, such as “if A+B=C, then do D.” Therefore, an abandoned object may elicit a different response than a violated area. With roots in the industrial automation market of the early-2000s, Arteco offers an event-based video management system (VMS) platform. That is, their emphasis is on identifying and providing video at the moment something happens rather than managing a vast amount of video that shows, in effect, nothing of interest. Arteco’s system, providing functionality expected in a full-featured VMS, is designed around the need to react to exceptions and events. Video verification “We can pull in events from any type of system and provide the related video,” says Steve Birkmeier, Arteco VP of Sales. “It can be access control, fire, intrusion, perimeter security, radar or microwave barriers, vape sensors, license plate recognition, or whatever.” An open connector, xml framework enables Arteco to interface with other systems and provide video verification of events. In addition to a focus on event-based video, Arteco also emphasizes ease of use, building on their 20-year history with video analytics. Another point of differentiation is their open architecture that easily and repeatably enables incorporation of third-party “events.” Finally, Arteco’s systems are competitively priced (less expensive), including flexible pricing and licensing structure to maximize value for a customer. In addition to security, there are multiple operational applications that use video verification In addition to security, there are multiple operational applications that use video verification. For example, integration with warehouse management software using metadata from warehouse surveillance video can provide a searchable database. An operator can enter a purchase order number, for instance, and the system provides video associated with that sale. The role of video in physical security Arteco has traditionally been a strong player in the utilities vertical, where event-based video management is useful to keep watch on high-value assets located in remote areas with little physical security. Another strong vertical is car dealerships in the United States, including security and loss prevention applications as well as integration with fleet management (using RFID and/or license plate reading). Arteco’s heat mapping capabilities can help a car dealer analyze customer activity to guide merchandising decisions, in the same way a retail store might. Big-box stores are another application for Arteco’s combination of marketing analytics, security and loss prevention. Arteco’s strength is also proving useful in the emerging, highly regulated cannabis industry. State regulations require that each marijuana plant be tagged, and systems are required to provide total chain of custody records from “seed to sale.” In the case of Arteco, video associated with a specific plant tag is available at each stage of growth, production and sale. Coronavirus and video management The analytics can detect when people are grouped together closer than 2 meters As an Italian company, Arteco has already applied its deep-learning VCA product at city centers in Italy, which was hard hit by the novel coronavirus. The analytics can detect when people are grouped together closer than 2 meters, for example, and can provide an alarm if social distancing requirements related to the coronavirus are not being observed. The system can also detect and confirm the use of face masks at an entrance. Tracking that number – the percentage of customers who comply – in real time might offer additional peace of mind for high-risk customers entering a store, for example. Birkmeier contends the world has been changed forever by the pandemic, although acceptance over time of new technologies being introduced will vary greatly by geographic location. Already, in the last decade or so, acceptance of video surveillance has been greater, even in the U.S. market, he says. ”More often you hear ‘why don’t you have cameras’ rather than ‘I don’t like these camera here,’” he comments.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organizers globally have canceled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was canceled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theater offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local /national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
Empire House, the luxury business members' club due to launch in West Yorkshire in a few weeks, has invested a five-figure sum in state-of-the-art, automated security systems to create a slick customer experience, intensify site security and help protect clients from COVID-19. In readiness for opening in a few weeks’ time, the Slaithwaite-based business center – which will incorporate offices, a ‘lounge’ area with stocked bar and corporate and event facilities – is set to attract businesspeople from all over West Yorkshire and offer 24-hour access to tenants. CCTV and intruder system Recognizing a need to heighten client experience and reduce the manpower required, Empire House has invested in CCTV, access control, fire and intruder alarm support from Huddersfield-based specialists, Centurion Fire & Security Ltd. The automated system has been designed to make the management of the building simple. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality Able to be programmed to allow and deny access around the building, the system ensures that no unauthorized individuals can gain entry. It is wholly integrated with the CCTV and intruder system, permitting ‘triggers’ and push-notifications to key holders when an area has been ‘breached’. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality, allowing or denying entry based on whether they are wearing a mask or not. Manned onsite teams Amy Byram is the founder of Empire House. Commenting on the investment, she said: “We wanted to provide the utmost security for our clients, whilst ensuring that their experience is slick and uninterrupted – the last thing that people want is to feel that their privacy is being intruded, and we have got that balance just right.” “I am impressed with the functionality of the software, which will allow the management team to ensure security is maximal at all times, without the costly need for manned onsite teams. We can lock and unlock doors directly from an app, whilst enabling us to mark people as safe or missing in an emergency. We hope our clients will be as equally as impressed by the technology as we are.”
Birmingham’s hospitality businesses have benefited from significantly increased outdoor dining space, following the deployment of ATG Access’ Surface Guard system at a number of locations around Hurst Street. With many businesses struggling as a result of the restrictions placed on public venues by the government, Birmingham City Council was keen to make it possible for people to return to the city’s usually bustling bars and restaurants in a safe, socially distanced way. It recognized that pedestrianizing key areas would significantly increase capacity and enable venues to take advantage of the government’s sidewalk license scheme. However, the council also wanted to keep the roads open to normal traffic between Monday and Friday to minimize disruption, while allowing bars and restaurants to use the carriageway for outside dining space at the weekend. Vehicle access extension plates Requiring an innovative, flexible solution in order to achieve this temporary pedestrianisation, Birmingham City Council contacted renowned event-protection business, Crowdguard. With less than 24 hours’ notice, Crowdguard deployed 65 metres of ATG Access’s hugely sought-after Surface Guard barrier system in five different locations across the city center, with four locations having Vehicle Access Units. Surface Guard is a completely surface-mounted system, meaning that there is no damage to the underlying road Thanks to the specialist vehicle access extension plates, the barriers provide access to normal traffic from Monday to Friday, while also creating safe, pedestrianized areas with no unauthorized vehicle access on Saturdays and Sundays. Surface Guard is a completely surface-mounted system, meaning that there is no damage to the underlying road, with a lightweight and modular design that makes it quick and easy to deploy with no machinery required. Crash test standard Without appropriate security measures in place, pedestrianizing busy city center can render the public more vulnerable to hostile vehicle attacks, thanks to greater numbers of people gathered in outside areas. A Surface Guard barrier can withstand the impact of a 7,200kg vehicle traveling at 32kph and has been tested twice in accordance to the IWA 14 crash test standard, providing world renowned protection against such attacks. The barriers are also designed to allow people to flow in and out of an area with minimal disruption, preventing the unnecessary build-up of crowds. This makes them ideal for facilitating social distancing, while also providing further protection from vehicle as a weapon attacks. The temporary pedestrianization of Hurst Street was hailed a success after its first weekend of operation, which saw an estimated increase in trading of up to 50% for participating venues. Offering flexible solution Iain Moran, Director at ATG Access, commented: “Birmingham City Council has done a brilliant job supporting its hospitality businesses, recognizing very quickly the value that pedestrianization could bring to the sector. Increasing capacity in this way has only become more important in light of the new 10pm curfew, so we hope to see more councils and local authorities following suit to give venues the best chance of survival." In this situation, Surface Guard offered the perfect flexible solution, ensuring all needs can be met" "However, it’s also vital to keep public safety and security front and centers when making any changes to our urban landscapes, as well as bearing in mind the impact that pedestrianization can have on other businesses in the area. In this situation, Surface Guard offered the perfect flexible solution, ensuring all needs can be met.” Support hospitality businesses Deborah Ainscough, Operations Director at Crowdguard, said: “We are proud that, through innovations such as Surface Guard, we have been able to make a real difference to Birmingham’s hospitality sector, helping as many people as possible to show their support for local businesses in a safe and secure way.” James Betjemann, Head of Enterprise Zone and Curzon Delivery at Birmingham City Council, commented: “Crowdguard provided the council with a number of temporary barriers to facilitate a series of weekend road closures to help support hospitality businesses deal with the impact of COVID-19. Deborah and the team were able to mobilize and install the barriers at very short notice and provided excellent customer service throughout the scheme.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that the Santa Cruz Beach Boardwalk, an iconic amusement park in California, has recently upgraded its security infrastructure with the Security Center platform. By unifying video and access control park-wide, the park’s security team is able to speed up investigations and emergency response. Touted as the ‘Coney Island of the West’, the seaside park features about 40 rides, 30 restaurants, 15 retail shops, arcades, miniature golf, bowling, and conference and banquet facilities. Video surveillance technology As an admission-free park, guests can enter through multiple entrances to buy food, purchase ride tickets, or simply walk around and enjoy the surroundings. Unlike gated parks which typically have a main security checkpoint, the park’s security team must be hyper-vigilant to spot potential security threats before they can develop. Security operators constantly monitor video cameras and work directly with field officers to handle issues. While video surveillance technology helped security teams watch over the large park, aging equipment began compromising their efficiency. As the search for a new video management system began, the team prioritized openness, reliability, and a vendor’s reputation in the market. Moreover, their aging access control system would soon need replacing too. Actively monitoring cameras The team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors The Santa Cruz Beach Boardwalk team chose the Genetec Security Center platform because of its unique ability to unify video surveillance, access control, and other systems and sensors. The flexibility of the platform was a key selling point and enabled them to choose their preferred cameras and door hardware. Today, the team at Santa Cruz Beach Boardwalk uses the Security Center platform to manage over 400 cameras and 220 doors across the entire amusement park. From one single interface, operators actively monitor cameras and doors, respond to alarms, handle investigations, and export and share video evidence. This ensures that every security incident is effectively resolved without having to switch applications. Video surveillance system “Like any busy amusement park, our guests sometimes become separated from their groups. When this happens, we are now able to use the Security Center Omnicast™ video surveillance system, along with assistance from our field officers, to quickly reunite guests with their parties,” said Will Graham, Security Technology Administrator at Santa Cruz Beach Boardwalk. If motion is detected near a perimeter after opening hours, the platform will trigger an alarm and display live video and a 10-second replay of the event on a dispatcher’s monitor. This allows them to quickly identify if it’s an actual threat. Unique access privileges The team has also expedited investigations by sharing system access with other departments. This includes food service, loss prevention and ticket sales who can handle their own preliminary investigations, if needed. The team has set up different door schedules and rules and created over 200 cardholder groups “Using the Security Center platform, all door events are linked to video which means our team can quickly gather the information needed and solve cases faster,” said Graham. With Security Center, operators get an instant view of an event as it’s unfolding. So before sending an officer to check on the area, they can quickly identify if it’s a threat or a false alarm. Using the Synergis system, the team has set up different door schedules and rules and created over 200 cardholder groups with unique access privileges for various roles and responsibilities. Managed software maintenance For added peace-of-mind, the Santa Cruz Boardwalk team receives fully managed software maintenance and monitoring via the Genetec Advantage maintenance package to help ensure their systems always available and up to date. “Using Security Center has definitely heightened our response efficiency at Santa Cruz Beach Boardwalk. Everything from video surveillance and access control to alarm management has been consolidated into one solution—it’s just a better, more effective way to work. And we’re confident that with this unified platform, we’ll be keeping our guests happy and safe well into the future,” concluded Graham.
JEWISH CARE has placed its trust in the latest access control, door entry and CCTV technology, to help create a safe and secure environment for residents living in Anita Dorfman House, a new 64-bed care home facility recently erected at its Sandringham care and community hub in Stanmore. Phase 1 of the project has seen the MEPH contractor Harvey Group, award a contract to South London system integrator WLS, to install a Paxton Net2 access control and door entry system with the objective of ensuring that JEWISH CARE has strict control as to who is able to enter the accommodation block or gain access to its sensitive areas. Home management control Paxton proximity card readers and door entry panels have been installed at the new care home’s 5 entrances which, together with 55 door entry handsets deployed throughout the building, allow JEWISH CARE reception and security personnel monitor all access control events. They are able to do so with the help of Paxton’s user-friendly Net2 software platform run on a desktop PC. WLS has also installed over 60 high definition 4-megapixel network dome cameras manufactured by Dahua at carefully chosen locations both within and around the building, to help detect intruders, as well as visually verify access control activity. In addition, automated barriers will shortly be installed at the site’s entrance. Linked to the CCTV system and triggered by Automatic Number Plate Recognition (ANPR) analytics, the barriers help care home management control vehicle access to the site. Smooth implementation of the access control JEWISH CARE is the largest health and social care organization serving the Jewish community in London With over 70 centers and services touching the lives of 10,000 people every week, JEWISH CARE is the largest health and social care organization serving the Jewish community in London and the South East. “We go to great lengths to ensure our clients feel safe and this is particularly important as many of them have disabilities, mental health needs or live with dementia,” said Lindsay Long, Facilities Manager at JEWISH CARE. “Investing in the latest generation of access control, door entry and CCTV solutions was therefore considered to be an essential requirement and we have been delighted with how Harvey Group, WLS and the various manufacturers involved in the project, have worked closely together to ensure a smooth implementation of the access control, door entry and CCTV systems.” Stopping unwanted visitors “The combined solution is enabling us to deter and stop any unwanted visitors from entering the building, as well as track and record people as they move around the building, without causing any inconvenience or disruption to colleagues, clients and genuine visitors.” A second phase of the project which is due to be completed by the end of 2020, will see WLS expand the security systems to cover the care home’s new independent living and communal facilities. As was the case during phase 1, WLS has also been tasked to install a TRIAX satellite TV system throughout new facilities, to enable to clients watch British and Israeli TV.
Staff safety and customer service will be boosted across Sydney’s rail network with the deployment of SafeZone®, the safety, security and emergency management solution from CriticalArc. The ground-breaking technology will enable Sydney Trains to manage a wide range of situations, including mitigating risks to staff and customers and strengthening the capacity to respond to incidents and emergencies across the network. For example, SafeZone will put up to 2,500 of Sydney Trains’ front-line staff directly in touch with security control room teams, letting them summon immediate assistance at the touch of a button. High safety standards The investment in SafeZone will cover over 175 stations across the greater Sydney area and is the latest step in a modernization drive to transform Sydney Trains’ operations, with more than a million customer journeys taken on the network every weekday. SafeZone enables staff to call for assistance and receive optimized response at the touch of a button, via their assigned smartphone. This capability is as valuable on crowded city platforms at rush-hour as it is on more remote suburban stations where staff may be working alone late at night. “Sydney Trains is committed to fulfilling our duty of care to all of our staff and enhancing our high safety standards in order to maintain and enrich customer service levels on station platforms,” explains Mark Edmonds, Manager of Security Capability, Network Operations. Real-time situational awareness Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events “Employing proven technology such as SafeZone will help us solve day-to-day challenges, further improving the safety of our staff and helping them work more effectively to continue to deliver world-class service.” Across its transportation network, Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events. This makes possible a wide range of security management functions, such as sending targeted alerts to specific individuals and groups. It enables control room operators to pinpoint the location of individuals needing help so they can initiate the most efficient and rapid emergency response. Primary safety concern “This visionary deployment by Sydney Trains will have a significant impact on the safety and wellbeing of staff and thus will produce dividends with regards to customer service and satisfaction, and the potential for streamlined operations moving forward,” says Glenn Farrant, CEO, CriticalArc. “With staff safety a primary concern for all rail operators internationally, implementation of this technology by Sydney Trains represents a significant step forward for the sector and will be the blueprint for many implementations to follow.”
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?