Tavcom Training, the world’s renowned provider of accredited security systems training courses and part of the Linx International Group, has announced that the organization is supporting the Naomi House & Jacksplace hospices by making a donation for every classroom and online course booked. Naomi House & Jacksplace Naomi House & Jacksplace provide expert hospice care to more than 525 life-limited and life-threatened children, young adults and their extended families from the...
With system designers having so many options when it comes to specifying the most appropriate cameras to monitor large areas, Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, provides an overview of the merits of some of the most suitable camera formats. PTZ cameras PTZ cameras have traditionally been used for city and wide area surveillance applications such as airports, car parks, shopping centers, sports stadia and warehouses, with operators able to track the movemen...
Blind spots in surveillance coverage, incompatible video and access control systems, lack of adequate perimeter measures are some of the common issues that facility directors must address with their security teams. At the end of the day, facility executives need technology that accomplish more with less and that expand situational awareness, overall system functionality, and real-time response capabilities, while generating cost savings. By leveraging technology like thermal imaging, this is pos...
Panasonic i-PRO Sensing Solutions Corporation of America is reaffirming its position as a recognized provider of advanced technology solutions for law enforcement applications at IACP 2020 with the introduction of the BWC4000. This new body-worn camera features a unique 12-hour field-swappable battery, providing law enforcement and security officers with extended camera operation without having to deal with cumbersome charging cables. All they need to do is quickly and easily swap a discharged...
IDS is now offering more than 20 new C-mount lenses. Thanks to lens resolutions of 5, 8 and 10 MP as well as different focal lengths and optical classes, they can be used in numerous application scenarios. In addition, they are characterized by a very good price-performance ratio. With these features they fit seamlessly into the "It's so easy!" product philosophy of the company. "When implementing image processing applications, it is not only important to choose the right camera, the lens also...
Choosing the right interface for the machine vision application is a key decision in one’s camera selection process. The following sections provide an overview of the different types of cables and connectors available for machine vision applications along with associated pros and cons. Useful for applications where extremely high-speeds or ultra high-resolution necessitate the use of such interfaces; for example, line-scan cameras used to inspect continuous flow processes like paper or pl...
Security video wall technology experts Ultimate Visual Solutions (UVS) have signed a distribution agreement with Zodiac Investment Corp in Vietnam, who will be its exclusive partner in the region. Zodiac was founded in 1991 and is recognized as the country’s high-tech products distributor and audio visual solutions provider, with bases in Hanoi and Ho Chi Minh City. It has completed installations in various fields, including education, government and the military. Data center video wall project The deal follows an initial collaboration between the two companies on several projects, including a demonstration and evaluation system for Zodiac’s demo facilities and a UVS Lucidity video wall controller for a data center video wall project in Hanoi. Steve Murphy, Managing Director of UVS, which has bases in Burnley and London, said: “Vietnam is a rapidly-growing market for us and we are delighted to be working exclusively with Zodiac, who will supply our products to their system integration clients throughout the country.” “Zodiac is dedicated to developing innovative technologies and efficient processes that create new markets and enrich people's lives and is the country’s leading audio visual solution provider.” Exclusive partner of UVS in Vietnam We are excited to be working with UVS and I truly believe that our clients will benefit from this partnership" Deputy General Director Tat Dat Nguyen from Zodiac said: ”We are excited to be working with UVS and I truly believe that our clients will benefit from this partnership. UVS have developed an outstanding reputation for their reliable products and total service and support. As exclusive partner of UVS in the region, we are aware of our responsibility and will try our best to make sure that this partnership will be fruitful.” UVS, which has its headquarters at the Business First Burnley Business Centre, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. Suite of remote services It has recently launched a suite of remote services, including: Remote diagnostics and remote maintenance for UVS video wall technology which can offer quick analysis and resolution for most issues UVS engineers using remote connection software, which is fully encrypted and which the client has control over, to carry out maintenance For sites where the video wall controller does not normally have an internet connection, UVS is offering to supply a 4G data dongle as part of the contract (managed and paid for by UVS) to allow clients to get internet access as required Assisting clients with reduced cost annual maintenance contracts A live online demonstration facility to provide full video wall technology evaluations for partners and their clients who are in lockdown or self-isolation
The CCTV User Group is delighted to welcome Tom Reeve to the team as the organization’s new Chief Communications Officer. In this newly-created role at The CCTV User Group, Tom will be responsible for coordinating communications with members and non-members to deliver member services, increase the group’s profile and build membership. CCTV and Cyber security expert Tom has more than 20 years of experience in the UK security industry and has held a range of positions in respected UK publications during his career, including as editor of Security Management Today, SecurityNewsDesk.com and CCTV Image. More recently, he was deputy editor of SCMagazineUK.com, a journal for the cyber security profession. He is currently working as an independent writer and editor, producing a range of security and technology content. I can honestly say he is a true professional and always delivers to the highest standard" Peter Webster, Director at THE CCTV User Group, stated “I have known Tom for many years. We first met when he was working on CCTV Image magazine and came to Slough to interview me for an article. I have always enjoyed reading his work. I can honestly say he is a true professional and always delivers to the highest standard.” Security industry veteran Peter adds, “I am truly delighted to have Tom joining us and look forward to seeing his impact on the work we are doing to innovate further for the CCTV User Group members and business partners.” Tom commented on his appointment, “I’m delighted to be invited to work once again with the CCTV User Group, an organization I have known for years and with whom I enjoyed a very successful working partnership in the production of CCTV Image magazine. I’m relishing the opportunity to work with Peter to help realize the group’s communications strategy and build value for our members.”
GeoVision has announced the release of its GV-Decoder Box Ultra, a compact, easy-to-install video decoder that allows digital monitors to display live views from ONVIF IP cameras. GV-Decoder Box Ultra Optimized for decoding H265 and H264 video streams, GV-Decoder Box Ultra supports displaying 64 IP videos in sequence or in 4, 6, 8 and 9 matrix view. The security administrator can monitor live events, take snapshots when necessary, and pause a channel when any event or incident occurs. GV‐Joystick V2 can be installed to control speed dome cameras if needed. GeoVision Decoder Box Ultra offers a cost-effective way of displaying live videos on a screen without the need of a PC. Key features include: 4K UHD TV HDMI video decoder Decode up to 64 IP streaming Sequence view and Matrix 4/6/8/9 PTZ control with GV-Joystick V2 (optional) Auto-discover ONVIF IP camera Integrated GeoVision solutions Integrated in GeoVision solutions Together with GV-Mobile Server, GV-Decoder Box Ultra can display fish-eye image in Quad, 360° and Dual 180° views. The motion matrix feature also provides live view pop-ups upon motion events only. With GV-Control Center, live views from IP cameras can be projected through GV-Decoder Box Ultra directly onto a monitor. It is an ideal solution for assigning video channels to security posts with no PC.
The renowned intelligent video redaction tool, Pixelate by Ocucon, has been updated with a range of AI features that makes protecting members of the public in CCTV footage quicker and easier, while giving more control to the end-user. Pixelate 3 with auto-detection Pixelate 3 has introduced auto-detection and additional functionality, such as a zoom in/out ability, as well as improving on the existing ground-breaking features of this web-based software, including: GDPR compliance – Including auditable log of video redaction and UK processed data Intelligent automated redaction – Built on AI, this feature quickly blurs out individuals Suitable for all types of camera footage, including body-worn cameras Quick upload via easy-to-use web-based portal with new, updated user dashboard Significantly reduced redaction time compared to manual video redaction methods Intelligent video redaction service The update has come as the demand for subject access requests for CCTV footage is set to increase, with the general public’s awareness of GDPR laws continuing to rise. Any member of the public can request footage of themselves, however other individuals featured in the footage must be concealed, blurred, or pixelated to hide their identity. Whereas existing outsourced redaction services are time consuming and costly, Ocucon’s intelligent video redaction service allows users to quickly redact CCTV files via Pixelate’s secure web-based portal for a fraction of the cost, with monthly subscriptions starting from as little as £20 per month. Deploying AI technology Gary Trotter, Co-Founder and CEO of Ocucon said, “We are proud to launch this latest version of Pixelate. After listening to feedback from our clients, the team has worked tirelessly to create a smoother, quicker, and easier experience for users to redact people and sensitive information in CCTV footage.” Ocucon is currently delivering a number of confidential pilots for major supermarkets and retail chains He adds, “Pixelate truly is unique in its offering and Ocucon continues to research and develop AI technology that will only make GDPR compliance even easier and smarter in the future.” Cloud-based storage and retrieval platform Since its launch in 2018, Pixelate has redacted over 8,500 faces in 1,429 minutes of footage across 367 different videos. Customers who already use Ocucon’s powerful, cloud-based storage and retrieval platform also have full access to Ocucon Pixelate and can select video clips to redact from within the cloud. Recognized by top business awards for its digital technology innovation, Ocucon combines intelligent data analytics with the facility to store, analyze and retrieve unlimited amounts of HD video surveillance footage from within the Ocucon cloud-based portal. Since its launch, Ocucon has seen significant interest in both the UK and US, and is currently delivering a number of confidential pilots for major supermarkets and retail chains.
Honeywell is adding to its video series line with the launch of the 30 Series Embedded Network Video Recorders (eNVR), the latest affordable and fully featured NVRs that offer 4K HD (UHD) video resolution. The Honeywell 30 Series eNVRs are designed for use as part of video systems which comply with the John S. McCain National Defense Authorization Act 2019 (NDAA), Section 889. They are also PCI-DSS compliant and include enhanced cybersecurity with a built-in FIPS chip set Users will also benefit from encrypted streaming between 30/60 Series cameras to 30 Series NVR and all the way to Honeywell Video Management Viewer (HVMV) and mobile apps. The 30 Series eNVR gives users the option to choose between 8 or 16 channels NVRs, with multiple hard drive options and up to 20 TB of internal storage. Key benefits and features Easy to use - Features plug and play installation with the Honeywell 30 and 60 Series cameras to make set up fast and easy to help reduce storage, installation, and configuration costs. Create safety & security efficiency - Integrates the 30 Series IP camera motion, intrusion and advanced people detection analytics for improved effectiveness while using 265 HEVC Smart codec to reduce storage space. Superior user experience - Includes simple remote configuration through HVMV, with a Global P2P Service with reliable connection anytime, anywhere through mobile access for both Apple® and Android™ devices. With a user-friendly interface, HVMV can be deployed for device management and configuration, video live view and playback, smart search, event management, pan-tilt-zoom (PTZ) control, Fisheye camera de-warping and E-map. HVMV also features multiple monitor support, multiple display layouts, customized views and tours and global P2P remote connection for efficient monitoring and operation. HVMV can support up to 2,048 cameras and multiple NVRs which is ideal for small to medium or multi-site video systems. With HTTPS & TLS 1.2 encrypted streaming and communication between the 30 and 60 Series cameras, the 30 Series eNVR and HVMV, customers will benefit from an end-to-end encrypted and secure video surveillance solution.
Arlo Technologies, Inc., one of the providers of internet-connected camera brands, announced the addition of two wire-free security cameras to its Arlo Essential Series: the Arlo Essential XL Spotlight and Arlo Essential. The Essential Series delivers the peace of mind every family needs to feel protected, both outside and inside the home. The series is highlighted by the Essential XL Spotlight Camera which features an integrated, extended-life battery that works for up to one year on one charge and an integrated spotlight with color night vision. Essential XL Spotlight The two new cameras both feature 1080p HD video, two-way audio, motion detection alerts and a built-in siren The two new cameras both feature 1080p HD video, two-way audio, motion detection alerts and a built-in siren – all in a beautifully compact, easy-to-install, wire-free design. The Essential XL Spotlight Camera is available now for pre-order at major retailers, while the Arlo Essential Camera will be available 2020 holiday season. The Arlo Essential Spotlight Camera is available now (launched June 2020) at major retailers and Arlo website. "Our feature-packed Essential Series offers wire-free cameras that are as easy to install as they are affordable, providing families with a range of features so they can choose the solution that's right for their home," said Tejas Shah, SVP product and chief information officer. "The Essential XL Spotlight camera highlights the collection, enabling continuous security and peace of mind with extended battery life. Perfect for installing in hard to access or busy locations, the Essential XL Spotlight camera offers homeowners up to 12 months of battery on a single charge for added convenience, whether it's serving as a standalone solution or complementing an existing Arlo ecosystem." Integrated Spotlight and Color Night Vision Features of the Arlo Essential XL Spotlight Camera include: Extended Battery Life: One year of battery life on one charge, perfect for high traffic locations or areas that are difficult to reach so one can charge less frequently Integrated Spotlight: Let's one see what's lurking in the dark with a bright spotlight to illuminate the area of activity; spotlight can be motion activated or manually turned on 2-Way Audio: Hear and speak to visitors clearly with superior audio quality Built-in Siren: Siren can be triggered automatically or manually from the app Color Night Vision: See color even at night thanks to an integrated spotlight Weather-Resistant and motion detection Full High Definition Camera: Capture clear details in full high definition with the ability to record video in 1080p Weather-Resistant: Designed to withstand heat, cold, rain or sun and can be used indoors or outdoors Motion Detection and Alerts: Alerts sent directly to one’s phone when motion is detected 130° Viewing Angle: Keep an eye on more of what matters with a wider field-of-view Platform Compatibility: Works with Amazon Alexa, Google Assistant and IFTTT for easy interaction, automation and control Each of the Arlo Essential Series wire-free cameras feature an integrated battery and are designed for quick and easy installation or placement nearly anywhere – inside or out, rain or shine. Wire-free cameras A direct to a WiFi connection enables the Arlo Essential Series wire-free cameras to function as a stand-alone home security solution without the need for a separate SmartHub or Base Station. Users with an existing Arlo security system can however, link their Arlo Essential Series cameras to a compatible Arlo SmartHub (VMB4540, VMB5000) or Base Station (VMB4000, VMB4500) to enable local storage recording and enhance camera range and battery life. The purchase of an Arlo Essential Series wire-free camera unlocks a complimentary three-month trial to Arlo's AI subscription-based service, Arlo Smart. 1080p video recordings Users will receive access to 30-days of rolling 1080p video recordings to store and view video clips. Notification settings can be adjusted, enabling Arlo Smart subscribers to fully customize their experience to spot people, vehicles, animals or packages. Arlo Smart's e911 feature provides access to emergency services local to the camera's location for quick action in emergency situations. Controlled entirely through the Arlo app, users can easily view live streams and recordings, adjust their camera settings or access cloud recordings.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecutions, they may look at newer HD or IP-based video systems. Upgrading To A Hybrid DVR System Applications include perimeter monitoring, public parking, city transportation, square/town safetyTo stretch a tight budget, a migration plan to an IP-based camera system could be phased in over time by centering the upgrade on a new hybrid DVR system. This way, both existing analog and newer IP-based cameras can be hooked into the system. For example, Hikvision’s Smart City Solutions include systems for government services, transportation and traffic management, or any combinations of these. Applications include perimeter monitoring, public parking, city transportation, square/town safety and temporary surveillance. Data capture form to appear here! Heart Of City Strategy Dahua Technology, a video-centric smart IoT solution and service provider, has introduced its ‘Heart of City (HOC)’ strategy, which is in line with the top-level design experience from hundreds of city projects. The strategy is based on the maturity of five technologies – artificial intelligence (AI), big data, cloud computing, IoT and 5G. The combination will enable the evolution of smart city 3.0 and bring great changes to our life, according to Dahua. A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using Dahua's cameras, monitors and switching equipment A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Future-Proof Radio Network Design Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Wearables are another new aspect of city surveillance system. For example, FLIR Systems, Inc. has announced FLIR TruWITNESS, a wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. TruWITNESS is worn on an individual’s body or mounted inside vehicles and is designed for any public safety organization that requires on-scene, real-time mobile surveillance TruWITNESS is designed for any public safety organization that requires on-scene, real-time mobile surveillance. Worn on an individual’s body or mounted inside vehicles, TruWITNESS includes visible-video, audio, global navigation satellite system (GNSS), gyroscope, accelerometer and magnetometer sensors. These sensors combine to send alerts and stream data to a central command center in real-time to ensure full situational awareness and global event handling. Featuring FLIR Neighbor Aware inter-device connectivity, TruWITNESS acts as an IoT device, triggering nearby TruWITNESS devices, fixed and motorized Pan-Tilt-Zoom (PTZ) security cameras, and other connected sensors to act upon an alarm event. TruWITNESS becomes a key component of FLIR Systems’ Video Management System, United VMS, which command centers use to manage video surveillance. United VMS combines video, audio, and other related data and makes it available for real-time situation management and forensic purposes. Video Analytics For Crowd Monitoring Crowd monitoring video analytics solutions continuously monitor vast areas instantly alerting police of any overcrowding areas. Qognify’s crowd monitoring video analytics solution was successfully used during the Maratha Morcha in the city of Kolhapur, India, on October 15th, 2016. The system monitored approximately one million protestors through 165 cameras installed across city. Smart threshold alerts were streamed directly into the control room while the crowd was building up, so that action could be taken before the crowd density reached dangerous levels, alleviating crowd safety and stability. Crowd monitoring video analytics solutions monitor vast areas instantly alerting police of any overcrowding areas At the core of the solution is Situator, Qognify’s advanced PSIM/Situation Management solution, which manages a myriad of security systems and sensors, including Qognify’s video management solution, from a newly built state-of-the-art Command and Control Center. Security operators and officials have advanced situational awareness of what is happening in their city and where. Automated, pre-defined Standard Operating Procedures (SOPs) were designed, in the local language Marathi, for handling routine security incidents as well as disaster management, ensuring that the most effective response is initiated, and procedures are executed in a consistent manner. Maintaining Law, Order And Safety Qognify also implemented its Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai, India. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. Qognify’s Video Management Solution controls hundreds of surveillance camerasAs a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing them to maximize Qognify’s Safe City solution. The Qognify Situator is an advanced Situation Management platform, and Qognify’s Video Management Solution controls the hundreds of surveillance cameras throughout the city. Role Of Standards In Smart Cities “Standards can assist in successfully deploying a comprehensive [safe cities] system with multiple technologies into a single, cohesive entity,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “With the ability to integrate various sensors and data from many different devices synthesized through one interface, government officials and law enforcement are afforded a more complete picture of their city’s security.” Deployment Of Facial Recognition Technology Live video streaming within the smart and safe city’s infrastructure means video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. Facial recognition technology can be added on to any video surveillance camera that is recording at a high quality This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police. Read parts one and three of our Smart Cities miniseries.
Safety and Security Things GmbH (SAST) will be both a first-time exhibitor at ISC West and also feature a larger booth – 1,800 square feet. The Bosch startup is looking to make a big splash in its first-time appearance at the largest security trade show in the United States. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Founded in September 2018 and based in Munich, Germany, SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for providing knowledge and functionalities tailored to integrators. SAST’s Open IoT Platform The open IoT platform is based on an open standardized operating system for video security cameras The open IoT platform is based on an open standardized operating system for video security cameras that creates a common basis for innovation and growth for the security industry. Apps built on SAST will enable airports, restaurants, stadiums and other facilities to transform security cameras into smart devices. The first partners are already developing apps based on the SAST ecosystem. “We will bring all the partners of our platform together and will showcase the first applications already realised on the platform,” says Nikolas Mangold-Takao, SAST Vice President of Marketing and Product Management. “In order to showcase this effectively at ISC West, we will create a space to demonstrate solutions effectively. At the same time, we are using the booth as our meeting space and will create a collaborative environment for our partners and all participants.” IoT And Access Control “We want to ensure that all visitors of our booth (No. 10073) are getting to see first-hand solutions which are already realised based on first apps and cameras using our Operating System,” he adds. “We also want to demonstrate the benefits of the SAST platform for solution developers, integrators and manufacturers.” SAST is about bringing different players from the industry together in order to deliver better solutions" SAST will be looking for measurable results at ISC West. “On the one hand, we measure results by hard facts, such as the number of new partners who will join us and how satisfied our current ones are with the output,” says Mangold-Takao. “On the other hand, direct feedback from visitors at the booth, especially professionals from our industry and end-customers, is also extremely important to us, and we will measure it. SAST is about bringing different players from the industry together in order to deliver better solutions.” Openpath Access Solution Another new exhibitor with a relatively large booth is Openpath, whose booth (No. 23051) will be 1,200 square feet. Openpath Access combines cloud-based software and sleek hardware with an app to enable hands-free access to an office using a smartphone that doesn’t need to leave your pocket. Although large for first-time exhibitors, the Openpath and SAST booths fall squarely in the “medium range” of overall exhibit sizes at ISC West – larger than the smallest 100-square-feet exhibits typical for many first-time exhibitors, but still smaller than the largest booths such as Hanwha Techwin America (5,500 square feet). In addition to the new exhibitors on the main show floor, the Emerging Technology Zone, located in the Venetian Ballroom, will welcome new startups in the security marketplace.
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardized business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order center. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organization is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Center helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Center, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organization to support customers by optimizing spend, mitigating risk and enhancing their security programs. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritize technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Center are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organization’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Center near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
RCP21, a pioneering Community Interest Company (CIC), has used SmartTask to help set up and manage an in-house security operation at Langthwaite Business Park in South Kirkby, West Yorkshire. The workforce management software was adopted to coordinate a full-time team of officers, tasked with protecting 120 businesses located at the site, without the need to increase management and administrative resource within the organization. SmartTask has since enabled RCP21 to deliver a superior security service in the most reliable and efficient manner. Workforce management solution “As managing agents of Langthwaite Business Park, we had previously outsourced the security requirements, but we took the decision to bring the service in-house,” explains Nicola Parker, Operations Manager at RCP21. “We recognized the need for a proven workforce management solution that would underpin our security solution moving forward. SmartTask has given us the visibility and control needed to deliver our service and provide customers with complete peace of mind.” SmartTask is used to manage RCP21’s full-time team at Langthwaite Business Park that provides a range of security services including CCTV monitoring, mobile patrols and keyholding and alarm response. SmartTask-enabled smartphones are used to scan 32 checkpoint tags around the site, so RCP21 has full visibility of mobile patrols that take place. Submit incident reports SmartTask has proved to be a hugely useful tool that is delivering value across our security operation" The software’s SmartForm functionality also enables security officers to electronically view their daily tasks; complete vehicle safety checks; and submit incident reports. In particular, the incident reporting tool allows a security officers on patrol or responding to an alarm response to capture all essential information, including any photo evidence, via a smartphone. This means RCP21 has an electronic record of any incident in real-time, so it can take immediate and appropriate action as well as share relevant details to the customer. Monthly performance reports can be taken from SmartTask, while incident data is included within the business park’s newsletter to provide information in relation to crimes and incidents on the park. Mobile workforce management “SmartTask has proved to be a hugely useful tool that is delivering value across our security operation. The software is simple and easy to use by all staff involved and is effective in enabling us to monitor and deliver our security services to a very high standard,” concludes Parker. Paul Ridden, CEO of SmartTask: “Our cloud-based employee scheduling and mobile workforce management software is highly configurable and scalable, making it an ideal solution for any security operation. Whether you are a top 30 security company or a small in-house team, it is possible to take advantage of SmartTask’s user-friendly, feature-rich functionality to better plan, manage, deliver and report on your security services.”
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
Peake ReLeaf is a local and independently-owned medical cannabis dispensary facility, located in Rockville, Maryland. Through its recently-opened, 4,200-square-foot facility, the company provides a wide range of cannabis and cannabis-infused products to patients with a valid medical marijuana certification, to treat a variety of qualifying conditions such as anorexia, cachexia, chronic or severe pain, glaucoma, PTSD, seizures, severe nausea, and severe or persistent muscle spasms. Installing an efficient video surveillance system While Peake ReLeaf faces the ordinary challenges of any small business as a cannabis dispensary, it is also subject to a number of stringent Maryland Medical Cannabis Commission (MMCC) regulations, which include strict requirements for video surveillance that dictate video quality, system performance, storage and other factors. After much research, they decided to contract Skyline Technology Solutions for their surveillance system because of their transparency, robust IT background and previous experience with medical marijuana facilities. Wisenet QND-6010R dome cameras for indoor surveillance Skyline recommended that PeakReleaf install cameras from Hanwha Techwin America Based on the regulatory needs and many conversations about how they wanted their business to operate, Skyline recommended that PeakReleaf install cameras from Hanwha Techwin America to secure both the interior and exterior of the facility. For indoor use, Skyline installed Wisenet QND-6010R vandal-resistant dome cameras that offer picture clarity so facial features could be easily identified. Wisenet QNV-7080R cameras for outdoor surveillance For outdoor use, Peak ReLeaf chose the Wisenet QNV-7080R cameras that provide 4-megapixel image quality with true wide dynamic range (WDR), motion detection, defocus detection and tampering detection at an affordable price. Both camera models, Wisenet QND-6010R and Wisenet QNV-7080R cameras come integrated with WiseStream II compression technology that can reduce bandwidth by 50%. WiseStream II compression technology WiseStream II compression technology dynamically controls encoding, balancing quality and compression according to movement in the image resulting far less bandwidth and storage requirements. This allowed Peake ReLeaf to meet the MMCC storage requirements in a cost-effective manner. Since the dispensary’s opening, Hanwha cameras have continuously provided the performance and capabilities to ensure Peake ReLeaf remains in compliance with the strict MMCC requirements, even as they continue to evolve moving forward. Cameras featuring onboard video analytics The Hanwha cameras have made it easier to identify and view video thanks to their ability to flag video based on motion or other factors using onboard video analytics. “Hanwha cameras offer us the video quality we need, and the cameras’ video analytic and other capabilities provide us with the flexibility that will allow us to quickly adapt to the inevitable regulatory changes that will come as we navigate this very new industry in Maryland,” said Nate Miller, one of the founding members and Peake ReLeaf’s Executive Vice President.
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?
Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?
HD CCTV: Manufacturers & Suppliers
- Dahua Technology HD CCTV
- Seagate HD CCTV
- Hikvision HD CCTV
- Axis Communications HD CCTV
- LILIN HD CCTV
- Avigilon HD CCTV
- Illustra HD CCTV
- Arecont Vision HD CCTV
- IDIS HD CCTV
- LTV Europe HD CCTV
- Bosch HD CCTV
- Messoa HD CCTV
- Sony HD CCTV
- Vicon HD CCTV
- Hanwha Techwin HD CCTV
- TruVision HD CCTV
- Panasonic HD CCTV
- Dallmeier HD CCTV
- Visionhitech HD CCTV
- FLIR Systems HD CCTV