Suprema, a globally renowned company in access control, biometrics and solutions for time and attendance management, has announced that they have been selected as one of the ‘2021 Top 50 Global Security Companies’, by A&S Magazine. Top 50 global security companies Suprema has ranked on this top 50 list for 11 consecutive years now, which acknowledges them as a major security company in the global market. Suprema was also listed as one of the world’s top four entry system...
Herta launches a new version of its marketing solution that now displays a control panel with relevant information about the behavior of visitors in a business. The new version of BioMarketing has a Dashboard that shows real-time information on the performance of a business and allows users to view online data on the number of visitors and their recurrence, the average dwell time, or the level of occupancy. ROI on analysis The information of the new product allows to have a deeper description...
Hikvision, a pioneer in delivering high-performance professional security solutions with tremendous value, announced it has elevated three sales engineers to expert level based on dedication in the field. These three professionals were designated from the company’s established team of engineers across the U.S. and reinforces Hikvision’s support for its extensive base of dealers and customers across North America. Possible security solutions “Our team of sales engineers help...
The Physical Security Interoperability Alliance (PSIA) announces it has approved the Secure Credential Interoperability (SCI) 1.0 specification. The PSIA has been working with a broad group of industry pioneers in the access control industry to come up with this specification, which is likely to have a significant influence on the future of secure mobile credentials. Mohammad Soleimani, the Chief Technology Officer of Kastle Systems and the Chairman of the SCI Work Group, introduced this concep...
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of fa...
Hanwha Techwin announced a new intercom product, the TID-600R, that brings together the company’s high-quality camera functionality with audio features and analytics. The new intercom has multiple applications, from acting as a help point for queries and emergencies, to access control or seamless communication with a control room or a front desk reception. The SIP compliant TID-600R features a 2MP fisheye lens with a wide horizontal 180° field of view (114° vertical), low light pe...
STANLEY Security, a global provider of integrated security, health, and safety solutions announced its investment In Nexkey, Inc., an innovator in mobile-first, cloud-based access control solutions. This investment backed by STANLEY Ventures, the venture capital arm of Stanley Black & Decker is the start of a strategic partnership between the two companies. “We are committed to building safer, healthier, and more efficient environments, to help the world progress," said STANLEY Security Global President Matthew Kushner. "Nexkey's innovative technology helps provide a seamless access control experience with the added value of data insights. When paired with the expertise from STANLEY Security, this solution will provide even more value to organizations as we all adapt to our evolving world." Affordable, integrated security solutions Nexkey's wireless access control platform allows businesses to manage access with a mobile app or web portal Nexkey launched in 2018 to provide businesses with an easier way to unlock and manage door access. The company's wireless access control platform enables smart entry to any door, which allows businesses to manage access with a mobile app or web portal, simplifying installation and delivering valuable spatial intelligence to help optimize operations. STANLEY Security's investment in and partnership with Nexkey provides new opportunities for small- and medium-sized businesses to adopt affordable, integrated security solutions. Versatile solution “Nexkey unlocks more value beyond what traditional access control can offer, as our solutions are so versatile and simple to install that we can deploy them on any door at a fraction of the cost of today’s systems,” says Eric Trabold, CEO of Nexkey. “And with organizations increasingly turning to the cloud and mobile solutions, this partnership offers STANLEY Security’s customers a convenient solution for enhancing their access control, creating seamless on-site experiences, and providing intelligent insights throughout the entire building.”
Developer of the JetFlex gate operators, considered the fastest in the world, PPA has consolidated itself as an important global player in the electronic security sector. The company, which has been present since 2015, is preparing for a new expansion cycle in the American market, with the growth of its product portfolio. Acquisitions In recent years, PPA acquired three companies: the Celtron current movers factory, Citrox, which specializes in access control, electric fences, alarms, and IoT (internet of things), and GCP. Each company today constitutes a PPA product line. “These acquisitions allowed us to complete our product line. The distributor has to have the complete line to offer an installer. Thus, he can go to people's homes and sell everything they need in terms of security,” said PPA president Flavio Peres. Nexus Cube provides high operating speed with precise movements, reducing wear, extending the life of the product Inverter tech reduces consumption PPA's flagship in the US is the Nexus Cube mover, developed specifically for the American market. With inverter technology, it allows reducing energy consumption compared to other products. In addition, the Nexus Cube provides high operating speed with precise movements, reducing wear, extending the life of the product and the structure of the gate. Extending list of products “Demand has grown a lot. Between the first half of this year and the same period last year, there was a 40% growth in our sales in the American market. We are already known for our gate operators. And soon, PPA intends to make available in the US a more extensive list of products, such as the Citrox line”, explained Peres. PPA currently exports to over 30 countries. The US is one of the most promising markets for the company, which is building an extensive network of distributors in the country. PPA's trademarks Since its founding in 1983, proximity to distributors, installers, and end consumers has been one of PPA's trademarks. Another factor that distinguished PPA in the global electronic security market for its high investment in technological innovations. The company currently has a team of more than 40 mechanical and electronic engineers and invests more than 10% of its payroll in P&D.
These days, many organizations depend on third-party contractors for skilled and unskilled workers for their manpower requirements. The age-old methodology used in handling multiple contractors simultaneously along with their labor force can bring great instabilities to the organization from the perspective of safety management, legal dilemmas, and financial mishaps. There is a need for a comprehensive solution that complements the automation and alignment of such a workforce. At the same time, it should remove inefficiencies as it emphasizes legal and safety accountability. Specifically designed capabilities Keeping these concerns in mind, Matrix presents COSEC Contract Workers Management (CWM) solution with specifically designed capabilities to overview the entire process of contract workers’ management to the point. Matrix presents COSEC Contract Workers Management (CWM) solution with specifically designed capabilities Under the umbrella of this solution, organizations can plan, provide work orders, induct workers, generate e-passes, provide workers with Time-Attendance and access control, as needed. With Matrix COSEC CWM, bring in an overall enhancement of labor working and enhance the operational efficiency while bringing down the overall cost. Key features are as follows: Centralized monitoring and control with real-time status updates Contactless credentials such as face recognition, BLE Smart mobile application for field application and to minimize the extra hardware cost Contractor self-service portal for contractors to manage their labor workflow Third-party integration such as payroll management, device configuration, etc through built-in API Intuitive dashboard with easy worker attendance management and their access control rights
The security industry is booming. Whether technical high-end solutions or highly professional services - almost all sectors reported an increase in turnover last year. "These are the best preconditions for Security Essen 2022,” Oliver P. Kuhrt, CEO of Messe Essen is pleased to say. "We offer the industry a top-class platform to present new solutions compactly and efficiently to decision-makers, buyers and other experts. Security Essen covers the complete range of the security industry, and does so within short distances." Mechanical security technology The focus of the range of products and services is on innovations in the field of electronic and mechanical security technology as well as cyber security, services, and fire protection. The fair will be rounded off by an extensive accompanying program with informative lectures. Among the exhibitors registered so far are Carl Wittkopp, Deutsche Telekom, Hikvision, Kale Kilit aswell as Salto Systems - and also the company ABI Sicherheitssysteme. Security Essen is the most important platform for us as a manufacturer of electronic security technology" ABI Sales Manager, Joachim Schairer: "Security Essen is the most important platform for us as a manufacturer of electronic security technology. The entire security industry meets there, which gives us the optimal opportunity to present our innovations. The fair also offers us a unique option to make new, relevant contacts within the industry." Video security solutions Funkwerk video systeme GmbH will also be among the exhibitors. "We are very much looking forward to finally being able to exhibit at Security in Essen again next year. Even though digital conference solutions certainly have their advantages, the direct and personal contact to our customers and interested parties is simply irreplaceable in the context of an international trade fair. This time, the focus will be on our individual video security solutions, but also on new developments from the Smart Building and Mobility sectors," says Christian Kaup, Head of Product Management & Marketing. Its bandwidth is what makes Security Essen so attractive for the security industry. With the areas of video; access, mechatronics, mechanics, systems & perimeter; fire, burglary & systems as well as services & digital networking security, all segments of the industry are to be found under one roof. Intensive professional contacts The accompanying program offers further added value for visitors and exhibitors "This successful concept stands for short distances, direct discussions, and intensive professional contacts," says fair Project Manager Julia Jacob. Security Essen offers companies numerous opportunities to present themselves to an international audience. Exhibitors benefit from individual stand options, theme-specific joint areas, or time- and cost-saving complete packages. The accompanying program offers further added value for visitors and exhibitors. Together with the technical training institute Haus der Technik, Messe Essen is organizing the two-day fire protection forum. The Digital Networking Security Congress is also scheduled for two days of the fair. Here, the speakers will focus on security in networks, IT security, interfaces, and cyber threats. Security industry market Despite pandemic conditions, the security industry market developed well last year the Bundesverband der Sicherheitswirtschaft (BDSW) (German Federal Association of the Security Industry) reported an estimated increase in turnover of four percent to 9.21 billion euros for its sector. The German market for electronic security technology grew by 1.6 percent to 4.695 billion euros in 2020. Access control systems (plus 4.3 percent) and video security technology (plus 7.1 percent) grew particularly strongly here. ABI-Sicherheitssysteme sees a trend above all in products that are becoming smarter. "This development is caused, among other things, by the massive advance of cloud solutions. In addition, security technology will communicate more and more with building automation and partly merge," is the assessment of Sales Manager, Joachim Schaire.
According to the latest report by Omdia, a global market research firm, Suprema ranks first in global market share, excluding China in the field of biometric readers. Suprema is a provider of access control solutions, including biometric terminals. Biometric technology Omdia said in their Access Control Database 2021 Analysis that Suprema recorded a global market share of about 13% in the field of access control devices using biometric technology such as fingerprint and facial recognition, winning against many global security companies in Europe, the Middle East, and Africa. Based on this strong brand power in the EMEA region, Suprema was pushed into first place for biometric reader global market share in 2020, not counting China, Omdia said in their market report. The report also noted that more than 15 million mobile credentials were downloaded in 2020 and stressed that contactless access control measures have grown rapidly since the onset of the COVID-19 pandemic. Mobile access card solutions have been multiplying due to the spread of DID and mobile identification cards Access control sector Suprema was also selected as the number one brand in both the access control software sector and the mobile access card solution sector in a March 2021 survey by the international security publication A&S Magazine. Mobile access card solutions in particular, which were developed in response to the COVID-19 pandemic, have been multiplying at home and abroad due to the spread of decentralized identification (DID) and mobile identification cards, showing various possibilities for innovating new authentication methods. Integrated security provider "Suprema has grown into an integrated security platform provider that encompasses both hardware and software over the past 20 years since its foundation in 2000, and has solidified its leadership in the global market with seven overseas branches and 140 overseas partners," Suprema CEO Hanchul Kim said. "We will continue to evolve as a market leader in integrated security and access control through innovation in the field of AI, deep learning, and big data.”
LiveView Technologies (LVT) is excited to announce that loss prevention professional, Mike Lamb is joining the team. He will join the company as a Loss Prevention Consultant. Prior to joining LVT, Mike Lamb spent his career in loss prevention and asset protection. He has over four decades of experience in the field, leading the loss prevention and safety efforts for national retailers, such as Kroger, Walmart, The Home Depot, and the Federated Department Stores, which later became Macy’s Department Stores. Loss prevention and asset protection expert Mike Lamb’s most recent experience was as the Vice President - Asset Protection and Safety for the Kroger Company. In this role, he provided oversight for all shrink, waste and loss prevention efforts, for more than 2,700 locations, in 35 US states, under two dozen banners. Under his leadership, Kroger was able to reduce shrinkage for 13 straight year-over-year fiscal quarters. He retired from Kroger in November 2020. “We are thrilled to have Mike join LVT,” said David Studdert, the Chief Business Development Officer for LiveView Technologies (LVT), adding “LVT is a powerful tool for loss prevention professionals. We will rely heavily on Mike’s experiences in the field, to help us improve our product and services, so that we can better serve retail customers.” LVT to reduce shrinkage and incidents Mike Lamb is excited to advocate and inform the retail space about LVT, after using the product for many years Mike Lamb is excited to advocate and inform the retail space about LVT, after using the product for many years, to reduce shrinkage and incidents. His career and other efforts, in the industry, give him a unique and much needed perspective. His other experiences include serving as an Active Contributor and Executive Board Member of the Loss Prevention Foundation (LPF), and as a Board Member for The Loss Prevention Research Council (LPRC), and the Asset Protection Leaders Council, through the Retail Industry Leaders Association (RILA). Consultant with broad industry experience He also serves as an Advisory Committee Member with the National Association for Shoplifting Prevention and as an Editorial Board Member with Loss Prevention Magazine. Mike Lamb was most recently awarded an LP Lifetime Achievement Award from financial solutions provider, the APEX Group. “I’m excited to join the LVT team in a consulting capacity,” said Mike Lamb, adding “I look forward to the opportunity to contribute to their efforts, in advancing their service offerings, across the retail sector. They are a true leader in their respective space, contributing to significant value to their existing customer base, from a safety and security perspective. The opportunity to support LVT is truly an exciting one.” Mike Lamb is originally from the Knoxville, Tennessee, USA. He holds a degree in Security Management and Business Administration from the University of Tennessee. He and his wife, Donna, currently live in Florida, where he enjoys boating and fishing.
How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilize. How can video analytics help with certain security scenarios? Video analytics tools Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use. Expected movement direction For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location. There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input. Detecting facial data There are illegal demonstrations and troublesome interferences that police have to deal with A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible. Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources. Event processing functions Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering. The video analytics tool can look out for large gatherings and increased footfall to alert security By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through. Reducing false alarms By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms. There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc. Preventing unsafe situations Complex events can include violations of one-way systems, blacklist-detected vehicles Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections. The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved. It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimizing false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimizing intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralized collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analyzing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or cellphones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximize convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organizations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimize the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Vehicle barriers first rose to the forefront of public attention after 9/11. The focus from 2001 to 2010 was on anti-terrorism, and vehicle barriers appeared at military and government facilities around the world. The U.S. Capitol breach on Jan. 6, 2021, brought heightened attention to the risks in a society that is increasingly fractured and volatile. Various protest events in recent months have made customers more aware of possible threats and prompted many to proactively install vehicle barriers and other systems to protect their premises. Shifting market focus Since 2010, and with the anti-terrorism market mostly saturated, the market focus for vehicle barriers shifted to public safety applications such as stadiums, schools, universities, large tech companies, and data centers. It’s an example of deploying technology developed in “wartime” to the broader public good, says Keith Bobrosky, the new president of vehicle barrier company Delta Scientific Corporation. Withstanding the pandemic The only remaining hurdle for Delta Scientific is to deal with continuing uncertainty going forward Like many in the security market, Delta Scientific has withstood a tumultuous two years during the duration of the novel coronavirus pandemic. They have “come through with flying colors,” says Bobrosky. The company never closed down, and its vaccination rate is high. The only remaining hurdle is to deal with continuing uncertainty going forward. Delta Scientific’s commitment Bobrosky began working in sales at Delta Scientific in 2007. Along the way, he has expanded into management, production, and engineering management. Through it all, he has seen a company that provides employees the autonomy to do their jobs and who have a strong commitment to customers, he says. The privately-owned company is nimble; decisions can be made quickly to respond to market changes, adds Bobrosky. Addressing needs during a pandemic The company was concerned about lower demand when the economy shut down, says Bobrosky, but they did not see an impact. The business was steady as a result of government entities and other organizations taking advantage of being closed to evaluate and address security needs. “We saw a decent flow of government business because of the shutdown,” says Bobrosky. Delta Scientific focuses on the domestic U.S. market but also has a presence selling to partners in the Middle East and Europe, where the equipment is known for its ability to take multiple hits. Even after withstanding an impact according to ASTM standards, their barrier is still operational. Increased steel purchased Delta Scientific ramped up its purchasing power, staving off any shortages and striving to keep lead times short As material shortages have spread through the industry, Delta Scientific has ramped up its purchasing power, staving off any shortages and striving to keep lead times short. Steel is their major component – literally, 98% of the weight of the products is steel, and there are 5,000 pounds of steel per barrier. The price of steel has gone up and there have been shortages. The company has maintained supply by leveraging its reputation and purchasing power. Most of their components are made in the USA, which has helped them dodge the recent challenges of the global supply chain. Application of barriers and bollards Automotive dealerships are another market for Delta Scientific; their bollards and barriers are used as anti-theft devices to keep vehicles from being stolen from a sales lot. Delta Scientific’s products can foil car thieves who might otherwise use a large vehicle to plow through a barrier and then enable a parade of accomplices to drive away in additional vehicles. Auto resellers buy anti-terrorism products to protect their inventories. DSC550 Open Frame vehicle barrier Delta Scientific’s products have evolved from push buttons and relay to touch screens and microprocessors New efficient product designs enable Delta Scientific to use less steel while keeping prices competitive and maintaining crash ratings. The products are more innovative, says Bobrosky. New barriers include the DSC550 Open Frame vehicle barrier, which does not block the view as solid barriers do. During the last decade control systems for Delta Scientific’s products have evolved from push buttons and relays to touch screens and microprocessors, although some customers still prefer the simplicity of the older approach. Portable crash barriers The equipment can also be controlled remotely and integrated with PSIM-type systems. Although the systems are stand-alone, some clients have been toying with the idea of controlling them through the internet, emphasizing the importance of appropriate cybersecurity. A separate line of portable crash barriers can be towed into place in 15 minutes by a vehicle or even a golf cart. They are used for events such as the Democratic and Republican National Conventions, the Oscars, music festivals, etc. There are hundreds of units in the field, available as needed for various events and rented out to event management companies and other organizers. Improving customer relations As the president of Delta Scientific, Bobrosky says his biggest opportunity is to continue improving customer relations – a never-ending goal. He will also strive to increase communication. Looking ahead, additional crash tests are scheduled for 2022, and the company will continue to look for ways to “do more with less.”
Growth is accelerating in the smart cities market, which will quadruple in the next four years based on 2020 numbers. Top priorities are resilient energy and infrastructure projects, followed by data-driven public safety and intelligent transportation. Innovation in smart cities will come from the continual maturation of relevant technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth-generation telecommunications (5G) and edge-to-cloud networking. AI and computer vision (video analytics) are driving challenges in security and safety, in particular, with video management systems (VMSs) capturing video streams and exposing them to various AI analytics. Adoption of disruptive technologies “Cities are entering the critical part of the adoption curve,” said Kasia Hanson, Global Director, Partner Sales, IOT Video, Safe Cities, Intel Corp. “They are beginning to cross the chasm to realize their smart city vision. Cities are taking notice and have new incentives to push harder than before. They are in a better position to innovate.” “Safety and security were already important market drivers responsible for adoption of AI, computer vision and edge computing scenarios,” commented Hanson, in a presentation at the Milestone Integration Platform Symposium (MIPS) 2021. She added: “2020 was an inflection point when technology and the market were ripe for disruption. COVID has accelerated the adoption of disruptive technologies in ways we could not have predicted last year.” Challenges faced by cities Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018 Providing wide-ranging services is an expanding need in cities of all sizes. There are currently 33 megacities globally with populations over 10 million. There are also another 4,000 cities with populations over 100,000 inhabitants. Challenges for all cities include improving public health and safety, addressing environmental pressures, enabling mobility, improving quality of life, promoting economic competitiveness, and reducing costs. Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018. Other challenges include air quality – 80% of those living in urban areas are exposed to air quality levels that exceed World Health Organization (WHO) limits. Highlighting mobility concerns is an eye-opening statistic from Los Angeles in 2017: Residents spent an average of 102 hours sitting in traffic. Smart technology “The Smart City of Today can enable rich and diverse use cases,” says Hanson. Examples include AI-enabled traffic signals to help reduce air pollution, and machine learning for public safety such as real-time visualization and emergency response. Public safety use cases include smart and connected outdoor lighting, smart buildings, crime prevention, video wearables for field agents, smart kiosks, and detection of noise level, glass breaks, and gunshots. Smart technology will make indoor spaces safer by controlling access to a building with keyless and touchless entry. In the age of COVID, systems can also detect face mask compliance, screen for fever, and ensure physical distancing. 2020 was an inflection point when technology and the smart cities market were ripe for disruption, Kasia Hanson told the MIPS 2021 audience. Video solutions Video workloads will provide core capabilities as entertainment venues reopen after the pandemic. When audiences attend an event at a city stadium, deep learning and AI capabilities analyze customer behaviors to create new routes, pathways, signage and to optimize cleaning operations. Personalized digital experiences will add to the overall entertainment value. In the public safety arena, video enables core capabilities such as protection of people, assets, and property, emergency response, and real-time visualization, and increased situational awareness. Video also provides intelligent incident management, better operational efficiency, and faster information sharing and collaboration. Smart video strategy Intel and Milestone provide video solutions across many use cases, including safety and security Video at the edge is a key element in end-to-end solutions. Transforming data from various point solutions into insights is complicated, time-consuming, and costly. Cities and public venues are looking for hardware, software, and industry expertise to provide the right mix of performance, capabilities, and cost-effectiveness. Intel’s smart video strategy focuses around its OpenVINO toolkit. OpenVINO, which is short for Open Visual Inference and Neural network Optimization, enables customers to build and deploy high-performing computer vision and deep learning inference applications. Intel and Milestone partnership – Video solutions “Our customers are asking for choice and flexibility at the edge, on-premises and in the cloud,” said Hansen in her presentation at the virtual conference. “They want the choice to integrate with large-scale software packages to speed deployment and ensure consistency over time. They need to be able to scale computer vision. Resolutions are increasing alongside growth in sensor installations themselves. They have to be able to accommodate that volume, no matter what causes it to grow.” As partners, Intel and Milestone provide video solutions across many use cases, including safety and security. In effect, the partnership combines Intel’s portfolio of video, computer vision, inferencing, and AI capabilities with Milestone’s video management software and community of analytics partners. Given its complex needs, the smart cities market is particularly inviting for these technologies.
Being isolated on the edge of wilderness means there’s a need for a video system that is both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC), since 2009, has relied on video management software (VMS) from Milestone Systems, to enhance security, safety, and efficiency at the airport. Milestone XProtect VMS installed At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times and Milestone XProtect VMS has supported the airport’s needs along the way. As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash, and expanded parking facilities. As the need to increase security continues, XProtect open platform software will enable IT team growth and the seamless integration of new cameras, and data storage capabilities. Enhanced situational awareness All video is kept for up to a full year, with most of the system’s cameras set for motion recording, around the clock. As a result, administrators achieve greater situational awareness and better security. The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport contends with a great deal of plane de-icing, for several months each year. The process occurs at a distance from the main buildings. Thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing airline personnel to monitor progress on their own has saved airport staff time and resources. Monitoring security In addition, the airport uses the system to closely monitor the security checkpoint, to capture video documentation, in case of an incident. By monitoring baggage areas, it’s possible to investigate lost bags and left-behind items, by reviewing recorded video. New 4K multi-sensor cameras support an investigatory system, helping staff see previously uncovered areas. The cameras capture high-resolution video and provide enough data to zoom in, after the fact. Deployed Agent Vi’s video analytics Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport Additionally, the team has deployed video analytics from Agent Vi, to provide a layer of automated alarms, for flagging abnormal occurrences. For example, video analytics can detect travelers moving against the foot traffic flow and crossing into restricted areas. Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport. Authorized users now have a new standard for accessing surveillance remotely. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive activity overview. Force multiplication using advanced technology The ongoing use of Milestone’s VMS makes it possible to maintain the independence and efficiency of a small team of personnel, delivering maximum security at the edge of a wild frontier. Andrew Wells, IT Manager for the Jackson Hole Airport, said “Situational awareness for our team and our clients allow us to be as secure and efficient as possible, with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport Jackson Hole Airport lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in the USA. It is unique for being entirely within the Grand Teton National Park limits. It is the busiest airport in the state of Wyoming, with nearly 500,000 in-bound passengers welcomed annually. The Jackson Hole Airport covers over 500 acres of land area and has one runway, nine boarding gates, and three baggage carousels.
Salient Systems, a pioneer in open architecture video management systems, has announced that its CompleteView VMS, an open platform video management system has been selected by Maine-based Brigid Farm for a multi-state video upgrade project for the company’s cannabis facilities. With headquarters in Saco, Maine, Brigid Farm is a vertically integrated cannabis firm that has been providing cannabis products for more than a decade. The company has recently expanded its operations to include multiple grow fields, an edible manufacturing facility, and two retail stores – a total of eight locations in Maine and one in Massachusetts. Remote and centralized monitoring As each location poses its security challenges, Brigid Farm chose the robust, open platform CompleteView VMS to enable remote access to and centralized management of video from all the company’s locations, including its retail operations, The Farm Stand, and The House of Hash. We were looking for a robust VMS that could help us easily monitor all of our operations from anywhere" “Given the heightened security concerns in the cannabis industry, and the unique security needs for our different locations, we were looking for a robust VMS that could help us easily monitor all of our operations from anywhere,” said Brett Messer, owner, and general manager of Brigid Farm. “It was vital for us to have an open system that can accommodate our future technology needs and expand as our company grows.” Integration software and LPR Brigid Farm also selected CompleteView for its ability to integrate with several other key operational technologies, including license plate recognition (LPR) to monitor daily incoming and outgoing deliveries, point of sale software for retail transactions, and the cannabis industry seed-to-sale tracking software, which cannabis businesses use for regulatory compliance. “Our CompleteView VMS is widely used in the cannabis market as it is uniquely positioned to solve pain points for cannabis operators,” said Sanjay Challa, chief product officer, Salient Systems. “We’re excited to work with Brigid Farm to fulfill their integrated video management needs and provide them with operational visibility across their enterprise.”
Cumbria Police have refreshed their fleet of frontline TETRA radios, deploying Sepura SC21 hand-portable radios to police officer roles and SCG22 mobile radios in vehicles. In total over 1,400 radios have been deployed to enable the force to upgrade to the latest standard of TETRA radio capability. Enhanced Mobile communication Aware of the need to refresh their radio fleet, the force organized field trials for new radios. Feedback from officers using the new Sepura SC21 TETRA radio was overwhelmingly positive. A vital advantage for the SC21 over the previous Airwave estate being the powerful TETRA engine and receive sensitivity. These combine to allow Cumbria Police officers to maintain Airwave coverage and keep communicating in the county’s many rural locations, where less powerful handsets frequently lose coverage. This deployment was further supported by the ability of the SCG22 to act as a Gateway, extending Airwave coverage where it might not otherwise reach and further enhancing the overall critical communications solution. Minimized training required The radios were programmed with a bespoke user interface designed to offer officers a familiar user experience The mobile radio was chosen as it has comprehensive deployment options, including car, van, motorcycle, and desk mount options, and shares a common interface to the SC21 meaning officer training is minimized. The transition to the new Sepura devices was undertaken during the COVID pandemic in the UK, with the Sepura team working with Cumbria Police to identify safe and effective ways to support an accelerated transition. This included Sepura supporting the force with a provisioning service, meaning the radios were pre-programmed and delivered to force headquarters ready to deploy. In addition, the radios were programmed with a bespoke user interface designed to offer Cumbria Police officers a familiar user experience, minimizing officer training. Secure communication solution Adrian Johnson, ICT Operational Change Business Lead at Cumbria Police said, “Our officers require reliable secure communications with the easy-to-handle, reliable kit. Our old terminals were no longer supported by the manufacturer and were starting to fail. Our officers have been providing Policing services to our citizens and visitors to Cumbria throughout the COVID pandemic.” “The Sepura rollout has occurred during this global pandemic, during which the team had to learn new ways of doing things safely. The project team worked effectively with Sepura’s support teams to successfully deliver this new equipment to our teams.” “It is imperative in a mission-critical environment that we have excellent relationships with suppliers and immediate access to subject matter experts when our technicians need help or advice. Sepura understands Cumbria Police’ requirements and willingness to work together was key to achieving the agreed solution.” Providing effective solutions Dawn Griffiths, Business Development Manager for Sepura said, “We are delighted to support Cumbria Police in upgrading their hand-portable radios to the SC21.” “The expectation for modern radios is much greater than it was previously, and Sepura’s SC range can support these demands with powerful data applications, intelligent connectivity, and advanced features such as wireless Over The Air Programming which will enable the force to keep evolving their TETRA solution for many years to come.”
Here East is an innovation and technology campus located at the heart of Queen Elizabeth Olympic Park in London, UK. Once the Press and Broadcast Center for the 2012 Olympic Games, it is home to a thriving community of over 4,500 creative, academics, and innovators. Designed as a mini-city, the campus is a mixed-use development that houses offices, retail units, university facilities, cultural exhibitions, and public spaces. Notable tenants include BT Sport, the V&A Museum, Sports Interactive, and the studios of noted choreographer Wayne McGregor. In total, the site offers 1.2 million square feet of flexible space and caters to a wide range of visitors. Modernizing data The previous video management system was still functioning. Yet, Here East’s Head of Security, Leighton Jones, was familiar with the Genetec unified platform and was confident it could deliver more. The advanced capabilities of the Genetec system would enable his team to gain a deeper understanding of the environment, resolve incidents in real-time and ensure a positive user experience. “Here East is a truly iconic location with a diverse list of high caliber visitors and tenants,” explains Jones. “I wanted to be able to say we use the best technology available and in my experience that is Genetec.” Here East has begun a multi-year phased adoption of Genetec solutions, starting with the deployment of Genetec Clearance to modernize data handling and the secure sharing of digital evidence. GDPR compliance Implementation of the EU GDPR has led Here East to revisit its processes for the sharing of video surveillance footage Like many organizations, the implementation of the EU General Data Protection Regulation (GDPR) has led Here East to revisit its processes for the sharing of video surveillance footage. Each time Here East received a validated evidence request, operators burned footage onto physical storage media such as a CD or a USB stick. The process was time-consuming and also created chain-of-custody issues. Here East had no control over how that footage was stored and shared by others. “It wasn’t a situation I was comfortable with,” explains Jones. “We find ourselves needing to share footage internally and externally. We need to retain controls on our data.” Clearance simplifies evidence sharing All digital evidence is now collected, shared, and distributed through Genetec Clearance. The team at Here East can put appropriate safeguards in place to minimize the risk of footage being inappropriately shared or lost. For example, it can specify viewing rights for specific users, set time limits, and revoke access to previously shared footage. The automatic redaction features available within Genetec Clearance have also streamlined the processing of requests for video evidence. Under the terms of the EU GDPR, any citizen can submit a subject access request, with Article 15 of the legislation presenting specific challenges concerning video surveillance. Article 15 states “the right to obtain a copy… shall not adversely affect the rights and freedoms of others.” Video surveillance operators must redact the identities of multiple other third parties in relevant frames of video before footage can be shared. On a busy night, the canalside restaurants and bars on the Here East site can contain 1,000 people in a single camera’s field of view. Before the user had to spend significant time manually redacting the identifies of innocent parties in the footage. With Genetec Clearance, that task is instant and automated. Improved incident reporting capabilities Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back to the senior management. Each month the Here East team runs an automated report breaking down incidents by time, date, and location. It then uses this data to make recommendations surrounding security operations and the deployment of resources. Where it’s applicable they run educational workshops for tenants. For example, phone snatching and bike theft are two of the most common crimes in their London borough. By closely monitoring the data, Here East can take proactive steps to detect, deter, and discourage perpetrators from operating on the Here East site. “It’s all well and good having the data but the most important thing is being able to visualize it, spot the meaningful patterns, and take the right preventative actions,” explains Jones. “Genetec Clearance makes this seamless”. The foundations for future growth Here East is still in the early phases of a long-term rollout with Genetec but is already benefitting from a unified approach to security, digital evidence-sharing, and operations. Further deployments will see the innovative site continue to work closely with Genetec to maximize value, push the boundaries of the technology and exceed the expectations of its tenants. “We’re continuing the legacy of the 2012 Olympics and have ambitious plans for the day-to-day management of this iconic site,” concludes Jones. “Our tenants expect a gold medal standard service and we have no intentions to disappoint”.
Four out of every five (82%) of existing CCTV and video monitoring systems are set to be extended to help keep schools and colleges ‘COVID Safe’, found a new education sector study of 91 education organizations based in the UK, US, Sweden, and Norway, carried out by video security as a service (VSaaS) provider AVA Security in March 2021. Many schools and colleges have already adapted their video monitoring systems to support COVID safety measures. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 6 months. Adopting video monitoring/CCTV technologies The AVA Security Education Sector Trends Report 2021 just out, provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 6 months. New COVID Safe-specific video analytics 29% were using their existing video systems to help provide temperature level health checks at some building entrances Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the 6 months. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels inside retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 6 months. Mask and face recognition systems Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 6 months. However, the Education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22% of schools and colleges have deployed facial recognition to date, although this is set to more than double to 29% over the next 6 months. The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely before the end of 2021. Cybersecurity becomes a key IT priority There has been an increased focus on cybersecurity to protect access to vital data and online learning resources As IT, operations, and security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few months, the University of Hertfordshire experienced a major cyberattack that led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. VSaaS selection criteria For the 82% of all education respondents actively considering Video Security as a Service (VSaaS) options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS in 2021, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ Reduced costs and ease of use The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people. While 24% of education sector decision-makers considering VSaaS, said the provider needed not to be headquartered in mainland China. Integration with existing camera systems A net 80% of video monitoring system decision-makers in the education sector also considered it important A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment. A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Video analytics An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via cellphone-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection Education sector video monitoring system decision-makers are considering VSaaS and weighing up criteria for selection" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Video security solutions Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Maritime Culture Center is a branch of the National Maritime Museum in Gdańsk, Poland. The Maritime Culture Center (MCC) promotes information on maritime subjects in a comprehensive and interactive way by employing multimedia techniques. The main attraction of MCC is a permanent interactive room called ‘People-Ships-Ports.’ Another exhibition, ‘Boats of People of the World,’ is a rich collection of boats, varying from an Eskimo kayak to a Venetian gondola. The MCC also organises temporary exhibitions on popular maritime topics. Embedded access control The MCC needed an intrusion system with embedded access control for more than 400 alarm zones, 55 areas, and 25 doors. Vanderbilt SPC’s offered a reliable system that can be expanded to include a large number of alarm zones. Solutions provided: SPC6300 with 38 input expanders (SPCE652). 18 2 door expanders (SPCA210). 13 keypads (SPCK420). 5 RF-expanders (SPCW130). “Due to installing Vanderbilt’s SPC system, the museum is safe. The system meets our expectations in the field of security. Thanks to their wireless equipment (receivers and detectors) we can protect the exhibits in the temporary exhibition. Vanderbilt turned out to be a very helpful company in installing and programming the security system in the building of the museum,” said Michał Drobczyński of Maritime Culture Center.
Round table discussion
Perimeter security is the first line of defense against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
Environmentalism is a universal consideration in most business sectors in 2016. Whether seeking to provide greener products, or looking for new ways to minimize waste of manufacturing processes, most companies are involved to some degree with environmental concerns. Green has not traditionally been a big driver in the security industry, but there are indications the profile of environmentalism is increasing. We asked this week's Expert Panel: How green (environmentally friendly) is the security industry? How should the industry mean time between failure as a whole (integrators and manufacturers) work to improve the industry’s environmental record?
"Going green" is not a new initiative, but rather, one that businesses and individuals are constantly aware of and continuously making a conscious effort to contribute to. The global population has become increasingly environmentally conscious over the years. Businesses and homeowners alike are investing more in green alternatives for their various needs. Many businesses adopt a green business ethic by ensuring that their products and ways of working are compliant with certain green standards. We asked our panellists for their thoughts on how technology can help keep the security industry green. Let's take a look at their responses.