ASSA ABLOY announces the availability of Medeco 4 (M4), the next generation of high-security key technology from Medeco. M4 builds on more than 50 years of lock engineering innovation, offering the highest level of protection against physical attack and unauthorized key duplication. Secure cylinders “With M4, we continue the legacy of trust that Medeco has built upon our over 50 years of manufacturing high-security locks in the USA,” said Joseph Kingma, Medeco General Manager, ASS...
The Security Industry Association (SIA) has named five young security professionals as the recipients of the 2021 SIA RISE Scholarship, a program offered through SIA’s RISE community, which supports the education and career development goals of young industry talent. Through this scholarship program, open to SIA student members and RISE members who are employees at SIA member companies each awardee will receive a $3,000 scholarship to use toward continuing education and professional devel...
The events of 2020, combined with technological advances and the adoption of cloud and artificial intelligence for video surveillance, will make 2021 a transformational year for the industry. Eagle Eye Networks, the front-runner in smart cloud video security, shared the trends that will have the biggest impact on video surveillance, security, and the use of analytics to drive business intelligence and improvement in 2021. Customers are asking for the cloud; Advanced analytics will transform vi...
Paxton has produced a new series of Net2 tutorials to support installers with the latest features in the innovative access control software. The short, informative videos provide guidance on how to make buildings more COVID-secure with Net2. The unprecedented nature of the coronavirus has led many businesses and building developers around the world to consider how people can move safely around their sites and maintain social distance while ensuring their business remains economically...
Technology has always stepped in to shorten distances between individuals. Whether through using electronic communications, such as email or video messaging, it has united people across different geographical locations and circumstances. Recent events have presented a unique challenge, where the ability to observe people and events in person has been restricted. This has had a knock-on effect on a variety of sectors, including healthcare, sports, and education. Broadcast cameras have offered a...
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at o...
MOBOTIX has been a pioneer of intelligent edge video technology for 20 years. The company has shaped the industry with its modular solutions. After opening the MOBOTIX7 platform for new, innovative software solutions last year, MOBOTIX is now even more flexible. The new M73 and S74 camera systems with three and four sensor modules per camera contribute to this. They can also set new MOBOTIX standards in terms of image quality, performance, and efficiency. With high quality Made in Germany, enormous flexibility makes the MOBOTIX video systems interesting for numerous industries during the pandemic and beyond. Artificial intelligence and deep learning Artificial intelligence and deep learning processes are drivers of the MOBOTIX7 video solution platform. The many special video analysis apps provide users in all industries with intelligent and cost-effective tools to cover relevant and current requirements, specifically in their everyday work. Solutions that do not yet exist can be redesigned to suit individual requirements. Thus, the platform is explicitly open for self-developed apps from MOBOTIX partners and customers -which means that new solutions are constantly being created to meet even the most innovative requirements. Helpful technology In the Corona pandemic context, MOBOTIX video systems provided effective hardware and software applications with its back-on-track solutions, which help keep life in business, trade, healthcare, and education as normal as possible. For example, anomalies in body temperature can be detected so that the persons concerned can undergo medical examinations. The thermal solutions are already being used, for example, by hospital visitors or hotel guests. The intelligent systems can also detect the wearing of mouth and nose protection. In retail stores or ski resorts, automatic announcements can be triggered if the MOBOTIX camera detects people without masks. Overcrowding situations can also be detected, and social distancing can be supported. Flexible systems retaining value MOBOTIX offers video systems with valuable benefits even beyond the pandemic through simple conversions While many of the technology solutions used to combat COVID-19 are used exclusively on a case-by-case basis, MOBOTIX offers video systems that offer valuable benefits even beyond the pandemic -through simple conversions. For example, reliable, object-based recording of customer flows and the most frequented areas on the sales floor can provide retailers with important information on customer behavior or product placement (detection of hotspots). Pre-installed apps The 22 apps already installed in the video systems serve the requirements of numerous key sectors such as industry & manufacturing, energy & utilities, retail and healthcare, education, transport and mobility, and the public sector. Future-oriented technology "The success of our products and solutions -even during the Corona pandemic -has confirmed that we have developed a future-oriented technology with our open, flexible, and at the same time cyber-safe video solution platform. We can implement individual requirements quickly and securely with our video systems," explains Thomas Lausten, CEO of MOBOTIX AG. "As self-sufficient IoT cameras, both the M73 and the S74 only transmit securely encrypted images to the network when relevant events occur: that is intelligent cybersecurity Made in Germany.” “With the possibility of developing completely new, individual apps, the MOBOTIX 7 system platform also offers the ideal technological basis for solutions that we don't even know we will need one day. MOBOTIX 7 is already thinking about the future," says Lausten enthusiastically. Relying on a cooperation network With MOBOTIX7, MOBOTIX offers its global technology partners the ideal platform for developing their own creativity. The partners can implement unique solutions for their customers, which can also be certified by MOBOTIX, in conjunction with the intelligent MOBOTIX camera systems. Cybersecurity Confirmation "We are ready for any technological challenge that may arise in a company or institution," explains Hartmut Sprave, CTO of MOBOTIX AG. "Our certification also confirms the cybersecurity of the new apps," says Sprave. "This opens up completely new revenue models for our partners. An individual challenge can develop into a solution that is profitable for the broad market and can be marketed worldwide via MOBOTIX."
Eagle Eye Networks, the global front-runner in smart cloud video security, has appointed David Barr as Enterprise Sales Manager for Europe to build the Enterprise Market Segment throughout the region. David has 30 years of experience in the security industry, joining Eagle Eye Networks after 17 years with Xtralis ADPRO, which in recent years was acquired by Honeywell. Responsibilities In his new role, David will work with Eagle Eye Networks global and EMEA end users and partners to develop their strategy, as the security market transitions from an on-premise recorder market to a true cloud market for video surveillance. Hybrid on-premise and cloud solution “This change isn’t happening overnight, but the great thing about Eagle Eye Networks is the possibility to start with a hybrid on-premise and cloud solution where clients can immediately see benefits of the cloud without investing in new hardware,” said David. “Eagle Eye Networks works with more than 3,500 existing analog or IP cameras, and even DVRs can be directly connected to the cloud." "This is a gamechanger for companies that want to upgrade their video surveillance, migrate to the cloud for additional cybersecurity, and better manage their operations in a multi-site environment.” API integrations and open platform capabilities Rishi Lodhia, Managing Director for the region, added, "The creation of this new role and the experience David brings to Eagle Eye Networks illustrates the company’s continued commitment and growth to support Enterprise customers within the region.” “Enterprise customers are transitioning rapidly to the cloud due to our easy API integrations and open platform capabilities."
Codelocks Inc., a renowned access control company that designs and distributes innovative, keyless door locks and access solutions, announces an ISO-certified photocatalytic coating which, when applied to Codelocks’ products, offers enhanced protection against viruses, bacteria, germs, volatile organic compounds (VOCs) and other environmental toxins. Clean by Codelocks is a clear, durable coating that utilizes a process called photocatalytic oxidation, allowing for the coating to react to light and convert harmful bacteria and germs into a non-toxic compound, resulting in a clean and hygienic surface. The coating is resistant to chemical cleaners and provides enhanced, active protection against bacteria. Requiring enhanced protection This photocatalytic coating can be applied easily to all products in the Codelocks range" “With the new year on the horizon, many offices, schools and hotels are planning how they can reopen safely,” said Matt Welty, Vice President, Americas at Codelocks. “By offering this antibacterial coating that has proven capable of eliminating COVID-19 in minutes, leaders and managers of these high-traffic facilities can keep their buildings safe. This photocatalytic coating can be applied easily to all products in the Codelocks range.” Industries requiring enhanced protection against the spread of viruses, bacteria and germs would greatly benefit from Clean by Codelocks. It should also be used in conjunction with existing cleaning and sanitization processes. Customers visiting the Codelocks website are able to opt for the new coating simply by ticking a checkbox next to the chosen product. Disinfection strategy Clean by Codelocks is a brand name operated by Codelocks Inc. to describe products that have been treated with the LumaCleanTM Multipurpose Photocatalytic Coating manufactured by USA Nanocoat, the manufacturer. All test results, certifications and claims are those applied for or of the manufacturer. Clean by Codelocks should be not be considered a replacement for an overall cleaning and disinfection strategy.
Radio Physics is pleased to announce the global launch of Optracon, a stand-off threat detection solution. Optracon is a fully automated multi-sensor fusion solution for detecting concealed mass casualty threats at distances of up to 30m. Harvesting data from state-of-the-art radar, video analytics, LiDAR, machine learning algorithms, and artificial intelligence to produce the world’s leading concealed threat detection solution. Following more than 18 months of development, greatly aided with the support of European Commission funding from a Horizon 2020 SME instrument grant. Performance trials The product has completed successful final trials, held recently at a sports stadium in Warsaw, Poland. Radio Physics is pleased to announce the performance of the technology greatly exceeded expectations and that of previous generation products, and Optracon™ has been released to the general market. Tracking people in crowds Optracon tracks people in crowds by merging modern 3D video analytics and LiDAR technologiesOptracon tracks people in crowds by fusing modern 3D video analytics and LiDAR technologies to provide an intelligent multi-sensor digital understanding of groups and flows of people – as a collation of 3D objects with previous and forecast coordinate paths. Threat detection radar This contextual view provides both a human and machine-based view of people that can/should be, or already have been, scanned by Radio Physics mm-wave MiRTLE OM30 threat detection radar sensors. Each radar has its own boresight camera that uses the same video analytic software as the context setting overhead camera(s) to focus on relevant body areas for mm-wave scanning as well as post-scan tagging. If necessary, a direct drive gimbal moves the radar unit through either small or large angular rotations at speed to target and scan individuals within a region of interest. Authority statements Mark Pritchard, CCO said, “We are delighted with the launch of Optracon, it is exciting times at Radio Physics, and are looking forward to working with our partners in the coming months on the many already identified opportunities across Europe and globally.” Gary King, CEO added, “We extend our sincere thanks to the European Commission and to our hosts and partners in Poland, without whose financial and logistical support this initiative would not have been possible”.
AVIOTEC's front-line technology offers flame and smoke detection for locations with no light. Thanks to separate additional infrared illumination unlit applications can be monitored with video-based fire detection delivering pin-sharp images. During the daytime, the device shows colored pictures and shifts to monochrome night mode when visibility drops below a pre-defined level. When daylight returns it automatically switches back to color mode. The video-based fire detection AVIOTEC IP starlight 8000 is now delivered with the new firmware. Existing installations can be upgraded to the new technology by a free firmware update. Flame and smoke detection Video-based fire detection is now also an option for applications where there is no lighting available. Due to infrared illumination less, light sources need to be installed e.g., for nighttime surveillance reducing the fire load and energy costs noticeably. In environments with no light AVIOTEC IP starlight 8000 working in monochrome mode can now perform both: fire detection and remote optical verification. Integrated day and night switch Day/night switch ensures reliable fire detection and video surveillance and provides time to solve the failure of light sources If the visible illumination fails, i.e., in tunnels, it is important to ensure that video-based fire detection is working uninterruptedly and that staff members in monitoring centers still have all the necessary insights into the situation. The integrated day and night switch ensures reliable fire detection and video surveillance. It gives operators enough time to solve the failure of light sources. This saves time-consuming and error-prone human investigation. Full redundant 24/7 illumination is not required anymore. Unobtrusive video surveillance with IR During night-time, burglars cannot spy on possible intrusion targets due to missing visible light or light sources while fire detection can be ensured. No visible illumination is used and helps to prevent burglary and arson. Combined intelligent video analytic rules also allow to track down intruders without visible light. Next to 24/7 fire detection, the new AVIOTEC version enables 24/7 intelligent video analytics for comprehensive safety solutions.
Current security and hygiene-protocols require special measures for access to buildings and rooms. This can lead to bottlenecks especially when there are large numbers of people and poses special challenges for many companies. Protecting the health of employees, visitors, and customers have a top priority. The risk of production downtime in the event of a quarantine measure is very high. Hygiene concepts reduce the risk of infection, but also tie up valuable human resources. Vital tasks of IRM-Guard® IRM-Guard® is the intelligent solution with which five essential tasks in the access area can be carried out quickly and safely: Temperature measurement Mask recognition Hand disinfection Visitor registration Access Control Functions IRM-Guard® is equipped with a 5-liter disinfectant dispenser. Over 1600 people can disinfect their hands here without having to refill the disinfectant. The disinfection of the hands, the mask control as well as the determination of the body temperature is sensor-controlled and contactless. Independent or integrated usage IRM-Guard® can be combined in many ways via the integrated interface for external access controls. The verification and control of doors, gates, or turnstiles are possible without any problems. IRM-Guard® can be used independently or integrated into existing security concepts. Origin and relocation The origin of IRM-Guard® is in Diepholz in Lower Saxony. The team from de Jong SICHERHEIT & IT developed, programed, and designed IRM-Guard® in countless hours. "Production was originally planned here," said Paul Andre de Jong, CEO of de Jong Security and IT. Relocating to Bravilor Bonamat can scale up production and increase efficiency and quality. “We did not expect such a demand, our production capacities were very quickly at their limit. Our customers had to accept delivery times of more than 4 weeks. We have therefore agreed to work closely with Bravilor Bonamat from Heerhugowaard in the Netherlands.” “By relocating to Bravilor Bonamat's existing assembly lines, which also have an excellent machine park with, among other things, edging and welding robots, laser cutting lines and thermoforming machines, we can scale up production and increase efficiency and quality again,” Paul André de Jong is certain. Long-term cooperation Björn Zutt, COO Bravilor Bonamat, adds “What may seem alien at first glance, is in reality very close to our core business.” “In the development and production of professional beverage preparation systems, such as coffee and espresso machines and hot water dispensers, as with IRM-Guard®, it is about the interaction of software, electronics, pumps, valves, high-quality metal processing and the transport of liquids. We are looking forward to a long-term and successful cooperation."
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic impact of COVID is expected to hit brick and mortar businesses the worst, as their businesses are dependent on people being physically present. According to a recent report by RBC, it is estimated that 70% of Americans expect to avoid public spaces, 57% of Canadians will be unwilling to attend conferences without a vaccine and 63% of people will prefer to drive vs fly. This means, that for those of you in the business of travel, conferences, co-working spaces, retail stores, museums, art galleries, restaurants, sports arenas, hotels, cruises, airlines, resorts, theme parks, long-term care, education, etc. in the blink of an eye your approach to on-site safety just changed. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation To get back to business and operating at full capacity after COVID, operations must find a way to eliminate the fear, uncertainty and doubt in the minds of their customers and employees. The affect of COVID-19 on safety and security To safely get back to business, the Centers of Disease Control and Prevention (CDC) emphasis that all operations need a pandemic response planJust like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budget. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitization, the lines between the security and maintenance just blurred. From customers, to employees, to government regulators, to management, the focus is now on operations and the sanitization policies, procedures and actions of the team. To put this change of priority into perspective, six months ago, sanitisation was not top of mind for people. Why, because it was not a life or death issue, we had other first world problems to garner our attention. From an operations perspective if we enabled a sanitization issue to become significant enough to impact the safety of customers and staff and therefore the brand, then that was an operational choice versus a mistake. Standards for sanitisation Just like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budgetThe issue is, today while the operating priority of sanitization has significantly increased, it is not measured and managed to the same standard as the other safety and security concerns across a business. Also, important to consider, while people may not hold an operation liable during this first wave, we can guarantee they are not going to be as understanding during the second wave or a future pandemic. To safely get back to business, the Centers of Disease Control and Prevention (CDC) and the Occupational Health and Safety regulators emphasis that all operations need a pandemic response plan and should follow these simple guidelines: Develop your plan Implement your plan Maintain and revise your plan While this sounds simple enough, keep in mind that requirements are constantly evolving and will continue to do so for the foreseeable future, or at least until all the research is in. To create an emergency response plan for a pandemic, properties must first determine what needs to be sanitized. The current requirements dictate that most surfaces and objects will just need a normal routine cleaning, it is only the frequently touched surfaces and objects like light switches and COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-havedoorknobs that will need to be cleaned and then disinfected to further reduce the risk of germs on surfaces and objects. The challenge is when you step back and consider what people touch in a day; the list quickly grows. After only 30 minutes, I easily came up with a list of over 60 items that one could call ‘high touch’! If you think about it, the list is extensive; telephones, doorknobs, drawer handles, counters, pens, keypads, computers, etc. and the list is only going to get longer as the research comes in. The challenge is when you step back and consider what people touch in a day; the list quickly grows Operating efficiency If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper and filing cabinetsTo scope the impact on operations as part of the plan, we must then find and identify all of those high touch things across the property. If we then combine that with the fact that CDC requires that all high touch locations must not only be cleaned more often, but that they also require that each location is first cleaned with soap and water, and then disinfected for one minute before finally being wiped down. This means a one-minute task just turned into a 4-minute task, that must now be completed multiple times a day. From a resourcing perspective this adds up quickly, and operating efficiency must be a priority. Not to mention it is going to get very complicated to measure and manage especially. Post COVID rules Getting back to business is going to be complicated; lots to do, lots of moving parts and no technology to help. The fundamental challenge to keep in mind is not that the sanitization requirements have evolved, the real issue is that for most businesses this area has been left unchanged for generations. Still today most rely on checklists, logbooks and inspections to manage the responsibilities of our front-line workers, which might have been fine before COVID. Post-COVID the rules have changed and so should the approach to managing physical operating compliance on the front lines. COVID like most physical operating requirements is tactical, detailed and specific; broad strokes, the honor system and inspections are not going to cut it. The digital transformation COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-have. If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper, filing cabinets filled with checklists, never to be seen again. Only with the right data can we significantly improve the operational decisions necessary to accelerate our return to full operating capacity. At the end of the day, to fully recover, operations must eliminate the fear, uncertainty and doubt in the minds of customers and employees, only then can we really get back to business.
Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those traveling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveler take to protect their calls, texts and data streams from being spied on? Duvall: When traveling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travelers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilized by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilize Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travelers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travelers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travelers’ hotel rooms. When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveler take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travelers? Companies should educate their employees on the importance of maintaining good internet hygiene while traveling abroad Duvall: When traveling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while traveling abroad. Some general tips to recommend to your employees when traveling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if traveling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveler benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related Apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customizable healthy travel packing list. The app can store travel documents, keep records of medications and immunizations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travelers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travelers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travelers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
The optical speed lane and turnstile sector of the security market has had a very busy 2017. Growth in commercial construction has provided more opportunity. Innovations in technology have given speed lane manufacturers an opportunity to deliver a better product. Orion Sales Increase And Company Growth Orion Entrance Control, Inc., had a great 2017 as sales increased and our company grew. We attribute our success to the unique approach we have taken since day one: providing customized products that offer customers more than a “one-size-fits-all” solution. We offer the line of turnstiles that you would expect from any reputable manufacturer in the marketplace, but we know that when dealing with lobby security or entrance control, one size definitely does not fit all. By providing various options to supplement our core line, we give our customers a solution that best suits their needs.The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers One area that we will continue to build upon in the development of our products is in technology integrations. The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers. The manufacturers that can future proof their products to allow the addition of new technologies and to protect a client’s investment from obsolescence will be the big winners in 2018 and beyond. Integration In Entrance Control Orion ECI’s products are built with technology and designs that have this vision for the future. For example, we work with the leaders in biometrics and Point of Sale (POS) solutions to integrate these systems into our entrance control products. Oftentimes, with just a wave of the hand or the right credential, approved users can enter with no hassle or even ring up a purchase. From a business standpoint, Orion ECI experienced a year of continued process improvement and design in 2017. We reached record sales revenues as we continued to receive orders from our existing enterprise clients and new customers. For 2018, we plan to add personnel in key growth areas. This will include additional inside and outside sales positions and product production and engineering roles.
Simultaneous suicide bombings at several churches and hotels in Sri Lanka on April 21 were of a scale, sophistication and level of coordination that hasn’t been seen since 9/11. Nine suicide bombers targeted three churches and three hotels on Easter morning, and the resulting casualties numbered 359 dead, including 45 children, and about 500 injured. The complexity of the attacks suggests the bombers received help from an outside organization, likely the Islamic State (IS). Sadly, security warnings from Indian intelligence officials, which might have helped to prevent or minimize the attacks, were ignored by Sri Lanka security weeks earlier. In the wake of the massacre, two of Sri Lanka’s top security officials were asked to resign, and Sri Lanka’s president promised to completely restructure state security. Contradiction To The Terrorism Report The twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacksA motivation for the Sri Lanka tragedy is thought to be the March 15 shootings at two mosques in Christchurch, New Zealand, where 50 people were killed and 50 more were injured. A 28-year-old Australian white supremacist was arrested and charged with murder. Taken together, the twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacks, as documented in a recent report. The suicide bombers in Sri Lanka were eight men and one woman, most of them well-educated and coming from the middle or upper class. One was the leader of National Thowheeth Jamaath, the homegrown militant Islamist group the government has blamed with carrying out the attacks. There is also evidence to corroborate a claim of responsibility by IS. Some 60 people have been arrested in the investigation. Even days later, police continued to find explosives and said there was still danger. Multiple Attacks One explosion on Easter morning occurred at St. Sebastian’s Church in Negombo, 20 miles north of Colombo, where more than 100 were killed. Another bomb killed 28 people at the Zion Church in Batticaloa, and an unknown number died at St. Anthony’s Shrine, a Roman Catholic church in Colombo. The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury. Two more explosions happened Sunday afternoon, one at a small guest house and another at the suspects’ safe house, where three officers were killed. Security at houses of worship has been a high-profile concern in the United States in recent years following incidents such as an attack at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston in 2015 that killed nine people. Just last October, 11 people were killed and six others injured in a shooting at a synagogue in Pittsburgh. Hardening Security At Churches “It’s no longer enough to pray for a safe and secure environment,” commented Patrick Fiel of PVF Security Consulting in an Expert Panel Roundtable discussion. “Churches are soft targets. Clergy and parishioners will need to work closely with security consultants and local law enforcement to harden their facilities.” Access control, CCTV solutions and mass notification systems are all helpful and can be placed unobtrusively so as not to interfere with aesthetics of the church, Fiel adds. The scale and scope of the bombings in Sri Lanka provide a wakeup call to the global likelihood of terrorist attacksIt doesn’t appear technology would have made much difference in the case of the Sri Lanka attacks, although awareness and vigilance can have an impact. At Zion Church in Batticaloa, for example, a bomber was stopped by pastors from entering the congregation area where some 500 people gathered. Because of their suspicions, the bomb was instead detonated in a courtyard where children were eating breakfast; 28 people died. The scale and scope of the bombings in Sri Lanka provide a dramatic wakeup call to the continuing global likelihood of terrorist attacks. The last territory of the Islamic State in Syria fell in March, but IS and its ideology live on, and continue to be a global terrorism threat. And that’s just one among many possible sources of terrorism worldwide. Hopefully, the recent incidents do not foreshadow more attacks that are even more deadly.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The massacre in Las Vegas is both sadly familiar and terrifyingly novel. Because of the recent series of violent attacks on innocent people gathered in public places, high body counts are no longer unheard-of, although the 59 dead after the Las Vegas tragedy sets a depressing new record. These news stories have become so grimly commonplace as to dull our collective sensitivity to their shock. However, the modus operandi of the latest attack, apparently by a “lone wolf” – carefully planned and involving a stockpile of nearly two dozen guns gathered in a hotel room – prompts new soul-searching about how public events are secured, not to mention a re-evaluation of security in the hospitality sector. Public Events At Risk From Attack The sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. Such attacks are not unheard of, but to what extent might it have been foreseen in this instance? It’s a new concern to add to the mounting list of possible risks at public events, such as a car in the crowd or a bomb in a backpack. Add to the list a firearm assault from above. If security is supposed to protect against that which is reasonable and foreseeable, this tragedy clearly expands the list. Preventative Measures For Sniper Attacks Certainly, there are measures that can prevent sniper attacks, such as police officer sharpshooters positioned on nearby rooftops scanning the windows of nearby buildings for potential threats. Such measures are routinely employed for high-security events such as a Presidential visit, but not generally for a country music concert. Should organizers of public events reevaluate the level of risk, now that the dangers have been demonstrated in a dramatic and deadly fashion? Broadly speaking, nearby buildings with lines-of-sight to public areas are a new security risk to be considered. Might public events need to be located somewhere else? What about parades down city streets, or Times Square at New Year’s Eve? New York’s Police Commissioner James O’Neill may have said it best: “We do understand that no city or town in this country is completely immune.” Security In Hospitality Sector The implication of the Las Vegas massacre for the hospitality industry is an additional issue. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. Most hospitality companies keep their focus on things like limiting theft, controlling unruly guests, or keeping strangers from roaming the halls. In contrast, hotels in the Middle East and Asia, where there has historically been more chance of violence, have a higher level of security. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals Even in Las Vegas, where the gaming and hospitality industries embrace video in a big way, the emphasis is not on watching guests who may be stockpiling firearms. What might the impact of greater security be on guests and, by extension, a hotel’s business? In a competitive market that emphasizes the guest experience, any negativity suggested by additional security measures would likely be evaluated carefully lest it impact the bottom line. Anything perceived as invasive of a guest’s privacy would be frowned upon. Our appetite and/or tolerance for tighter security in the wake of a tragedy will inevitably dissipate over time. In short, the hospitality industry is likely to continue to be a “soft target” for years to come. New Security Training And Technologies Might a higher level of training among hotel staff to promote awareness of suspicious behavior make a difference? It’s a low-profile, comparatively low-cost possibility many hospitality professionals will be looking at in the days to come. There are less obtrusive technologies on the market that could help. For example, Steve Wynn, CEO of Wynn Resorts, has said they have installed “non-visible” metal detectors at every entrance. One manufacturer of such equipment is PatriotOne Technologies, which offers a “cognitive microwave radar technology” embedded in a wall or stand-alone unit at a controlled access point. The company made news at last week’s ASIS show by announcing integration of its system with March Networks’ video recording solution. Concerns For Security Trade Shows The latest tragedy hits especially close to home for those in the security industry who travel to Las Vegas every year for the ISC West show. Mandalay Bay is at the other end of the strip from much of the ISC West activity, but the attack still seems to hit directly in our neighborhood. Next year, the security market will be going to Vegas at least twice, for ISC West in the spring and again for the ASIS 2018 show in the fall. Somewhere in the midst of those events may be a solution that could help prevent such tragedies. We can all hope so. Meanwhile, our thoughts are with the victims of the Las Vegas massacre, their families and friends. Infographic: How To Prepare For Active Shooter Incidents
A networked surveillance system has been installed at Petwood Hotel in Lincolnshire, the former home of members of 617 Squadron, more famously known as The Dambusters, during World War 2. The hotel, situated in the village of Woodhall Spa, was originally built in 1905, as a country house for a wealthy Baroness, and after serving as a military convalescence hospital during World War 1, was converted into a hotel in 1933. Located among magnificent lawns and landscaped gardens, the Grade II-listed hotel has 53 bedrooms, a Squadron Bar filled with World War II memorabilia, a restaurant and terrace bar, and function rooms. Dahua Smart PSS viewing platform The system at the Petwood Hotel comprises 12 HFW5431-ZE bullet cameras, four HDBW5431-ZE dome cameras, and 13 HDBW2421R-ZS mini dome cameras. Images are recorded and processed on to a central server, while viewing is managed by a Dahua Smart PSS viewing platform. Some 29 Dahua bullet, dome and mini-dome network cameras have been installed by Videcom Security around the hotel. Externally, cameras monitor the car parks, where previously there were incidents of damage to vehicles. With the new system, however, the source of any damage can be quickly located, so helping with guests’ insurance claims. Other cameras are positioned so that the hotel’s management has coverage of the entire perimeter. Perimeter protection Inside, cameras are located in public areas such as reception, the bar area and function rooms Inside, cameras are located in public areas such as reception, the bar area and function rooms. They are designed to help resolve payment discrepancies and to deter any unwarranted behavior. Images from the cameras go back to a secure room in the hotel’s separate office block, while staff at reception is able to view live images. “The Dahua system delivers all the benefits we were looking for,” said George Kane, General Manager at the Petwood Hotel. It is reliable, easy to use, and provides excellent quality recorded images, which can be accessed quickly and easily. The cameras are discreet and sensitively installed in and around the listed building. Video surveillance system The technology is great and Videcom Security have handled the project well and sensitively, considering the building is more than 100 years’ old and the hotel remained open throughout the period of installation. “The new surveillance system has been brilliant. The high image quality will enable us to resolve any liability issues in the car parks, while the system reassures guests and staff about internal and external security,” said Danny Harsley, Northern Engineering Manager at Videcom Security. Danny adds, “The Dahua equipment was ideal for this project and, as we have found on many other projects, was easy to install and commission. It’s also a great system to use.”
Based in High Wycombe, Lata Lata opened in 2018, with the express purpose of combining the best produce The Chilterns have to offer, together in one neighborhood restaurant. Like many businesses especially in the hospitality sector, Lata Lata suffered from the impact of COVID-19, with lockdown preventing restaurants from opening as usual. However, determined to stay open they concentrated all efforts on their takeaway service, with support from the likes of Wycombe Wanderers, which helped keep the restaurant running during this critical time. Temperature monitoring terminal Now that the government has given the green light for restaurants to open fully, Lata Lata has been meticulously planning re-opening and taking every step to ensure staff and customer safety. Along with social distancing measures, seating, booking systems and hand sanitizers, Lata Lata has gone a step further than many by deploying a temperature monitoring terminal at the entrance of their premises. Staff and all customers are using this device to check their temperature before entering. The temperature monitoring terminal deployed by ANT Telecom is very accurate, reliable and contactless. The solution is also discreet to ensure minimal disruption to the restaurant’s service and atmosphere – meeting, or even exceeding, guidelines for COVID-secure premises. As guests arrive their temperature is automatically checked and confirmed by the camera and terminal. Customers are also advised to sanitize their hands, keep to social distancing measures and use card payment only. Extra layer of security They understood what we were after from the very beginning and made the perfect solution for us" Customers so far have embraced the technology and are pleased with the additional assurance this provides, with customers commenting on how the restaurant felt safe with COVID precautions that were easy to follow. Ross Hunt, Co-Owner, Lata Lata, comments: “We found working with ANT Telecom really easy. They understood what we were after from the very beginning and made the perfect solution for us. An unobtrusive instrument that adds an extra layer of security making our customers feel safe and ready to come back.” Temperature monitoring solution Klaus Allion, MD, ANT Telecom, adds: “It’s been great to work with Lata Lata to implement a solution to get the restaurant up and running with a COVID-secure environment.” “Although the measures put in place to keep everyone safe may seem like dining out has fundamentally changed, the temperature monitoring solution is designed to cause as little impact on the experience as possible. And with the knowledge that risk-reducing initiatives are in place, customers can enjoy their meals with peace of mind that they are within a safe environment.”
Iris ID, a provider of iris recognition technology, announced its contactless IrisAccess® biometric technology is being used for employee time and attendance at hotels in Iraq which are part of Millennium & Copthorne Hotels, a London-based hotel company that manages and operates 135 luxury hotels in 80 locations worldwide. The Millennium hotels – the Millennium Kurdistan, the Copthorne Hotel Baranan and Millennium Kurdistan Hotel and Spa – are located in the Sulaymaniyah province in the country’s Kurdistan region. Biometric readers The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use" Mohammed Murad, vice president, global sales and business development, Iris ID, said iCAM 7S series biometric readers provide a quick and accurate way to record the time employees work each day. “The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use,” he said. “The iCAM 7S platform automatically tilts to locate a person’s face and iris patterns. Also, it’s important in the COVID-19 era, that the technology is contactless and not impacted by employees wearing personal protective equipment such as gloves, masks and goggles.” Integrate with the payroll management system The iCAM 7S time and attendance units integrate with the hotels’ payroll management system to ensure accurate reporting of hours worked without any manual processes. Iris ID’s highly accurate identity verification technology eliminates a costly payroll fraud scheme known as buddy punching – when one employee signs in or out for another. InfoMet Technologies, an Istanbul, Turkey-based integrator of security and building management systems, installed the Iris ID system in the three Iraqi hotels.
Since the spread of COVID-19 started in Denmark, the Danish government has closed all restaurants, bars and other business areas. In order to comply with the back-to-business policies of the government, Arkaden Food Hall, a popular food court located in Odense, needs to keep the number of guests within a specific limit per square meter – 308 people in their case. Being responsible for their customers and staff, the Food Hall deployed the People Counting and Flow Control Solution from Dahua Technology, to ensure a smooth and safe reopening after the pandemic. People count solution With 14 food stalls and 2 bars, the Food Hall has two entrances. The people count from these two entrances needs to be combined and displayed on screens to determine if there is any more room for customers to enter or will have to temporarily wait at the door. The solution consists of: 2 Entrances with 5 Series IPC (HDW5442E-ZE) 2 DPB18-AI 2 DHL32-F600 1 DSS Pro License 64 Channels + BI Module People counting and flow control The Dahua AI-powered people counting camera can automatically and accurately calculate the real-time number of people entering the restaurant, avoiding congestion and helping to mitigate the spread of the pandemic. The DSS PRO platform with People Counting and Flow Control, together with monitors and DPB18A helps send different videos/pictures and editable content for guests to see. When the number of guests exceeds the set value, the platform and monitors will notify and display ‘the limit is reached’ on the digital signage at the entrance of the Food Hall, reminding incoming customers to wait at the door. In addition, the people counting cameras are simple and easy to install, which allowed the installer to complete the entire project in just 1 day. Enhancing the safety level The People Counting solution has given us statistics and data about the behavior of our customers" “The People Counting solution has given us statistics and data about the behavior of our customers, which saves us a lot of resources since we do not have to physically count the number customers at the door. Furthermore, we can provide them with important information at the entrance using the monitors. We are very happy with our cooperation.” “There seem to be lots of innovative solutions out there that we would be more than happy to try out since we feel this will benefit us to be smarter and more efficient in many ways,” said Sanne Brigsted, Business Development Manager of the Food Hall. Faced with the impact of COVID-19, the Dahua People Counting and Flow Control Solution enhances the safety level and competitiveness of business establishments like Arkaden Food Hall, while creating a comfortable dining environment for their guests. Restaurant management efficiency Most importantly, it has helped the restaurant to successfully achieve its primary task of reopening its food hall by allowing an operator to monitor the customer traffic in real time so that timely security measures can be taken before the place becomes packed with customers. With this smart system, no additional employees are needed to count customers manually at the door, which can significantly reduce labor costs and improve restaurant management efficiency. Moreover, its monitor can serve as a notice board to inform customers or as a multi-purpose advertising screen with event marketing and planning based on the DSS Pro's intelligent data analysis, providing a platform with huge expansion potential and creating business opportunities for the restaurant.
In the emirate of Ajman, the real-estate developer is AQAAR. AQAAR’s construction projects represent 90% of all developments in the region, and include more than 200 towers and buildings, over 18,000 apartments, five hotels, two schools and a university. More buildings are still under construction. This burgeoning portfolio of buildings provides housing, work and recreation for some 120,000 people and counting. And AQAAR recognizes its duty to keep these locations safe. “Our aim is to become the safest community in the UAE,” says Ghaleb Jaber, Executive Director, AQAAR. Networked video security solution “We want to prevent crime, and to help people to continue to live and work peacefully in the buildings that we construct. To support this, we needed a specialized provider that was capable of delivering a cutting-edge, 24 hour networked video security solution featuring tens of thousands of cameras.” Hikvision products are excellent: the intelligent AI-based technology was exactly what we were looking for" During AQAAR’s search for an ideal video technology supplier, Hikvision stood out from all the rest. “Hikvision products are excellent: the intelligent AI-based technology was exactly what we were looking for,” says Ghaleb Jaber. “But just as importantly, Hikvision demonstrated excellent credibility in deploying large-scale video security projects of this type.” AI-Based video security solution Working with the AQAAR team, Hikvision and its partners designed a comprehensive AI-based video security solution comprising different types of cameras. The majority of these are Hikvision 2MP IP cameras. These AI-enabled cameras offer a wealth of intelligent functionality, such as perimeter protection, and are being installed throughout all public areas and buildings. They are also installed at construction sites to help prevent theft of expensive building materials. The AQAAR solution also features Hikvision ANPR IP Cameras installed at the entrances to the parking lots of Ajman’s hotels. These use Automatic Number Plate Recognition to ‘read’ a car’s license plate, and will only lift the barrier to authorized vehicles. Centralized management system For added peace of mind, AQAAR chose to install a network of Hikvision Under Vehicle Surveillance Systems, for automatic security checks at key locations. Furthermore, the AQAAR team chose the Hikvision 16 Channel NVR for video recording, coupled with the Hikvision iVMS-5200E Centralized Management System in the control center. “For public security installations such as this, we always adopt a multi-phase approach," explains Mohammed Barakat, Account Manager for Hikvision MENA. This will unlock their intelligent features such as intrusion detection and facial recognition" “The first phase is the hardware installation. Phase two involves setting up the Centralized Management System, and creating one main control room that unites all video feeds. Then at phase three, we will switch on the AI capabilities of the cameras. This will unlock their intelligent features such as intrusion detection and facial recognition.” Intelligent parking management “Some of this, such as the intelligent parking management, has already been enabled. But which other capabilities AQAAR chooses has yet to be decided; it will depend on the needs of the urban planning and its residents as the project unfolds,” Mohammed explains. With the end of the installation now in sight, Ghaleb Jaber at AQAAR is eager to test the full potential of Hikvision’s proactive, comprehensive security solution. “We look forward to exploring how all elements can work in harmony together, to help AQAAR ensure the safety of residents and workers as our development continues to grow.”
LILIN announced that Aida traffic management solution will be released and unveiled at ISC West 2020. With the success of LILIN Aida number plate recognition (ANPR), LILIN Aida adds AI traffic management to Aida product line. LILIN Aida can be installed on the edge for traffic analysis where the metadata gets sent to remote Navigator Control Center. LILIN Aida ANPR and traffic management can integrate with LILIN Navigator VMS products including Navigator Control Center, Navigator Corporate, and Navigator Enterprise for event notifications, statistics, and system automation. Both LILIN Aida and LILIN Navigator products utilize Intel Media SDK for Windows and maximize the GPU processing power for video decoding and rendering. LILIN offer Aida ANPR, traffic management, VMS software, and AI recorders (NAV2000AI and NAV3000AI series) which can run on Intel CPU, GPU, VPU, and NVidia Cuda on Windows OS. LILIN Aida traffic management LILIN Aida software is able to run Multiple AI models on distributed AI CPU, GPU, and VPUs of a Server. LILIN Aida ANPR series and Aida traffic management use the latest deep learning technology. LILIN Aida traffic management by deep learning technology requires thousands of pictures for image labeling Aida traffic management can provide accurate AI traffic object recognition for parking spot detection, parking violation, turn left violation and turn right violation, wrong way detection with number plate recognition, truck, motorbike and pedestrian violations, queuing detection, average speed detection, and loitering detection. LILIN Aida traffic management by deep learning technology requires thousands of pictures for image labeling and machine training of object datasets. These processes are time consuming tasks. The datasets are then used for traffic managements. Intelligent video surveillance Image labeling needs more attention for inference accuracy. LILIN deep learning processes consist of image labeling, video recognition, and accuracy validation. LILIN design and developed AI-enhanced software combined with intelligent video surveillance edge devices can optimize traffic system. Mr. Steve Hu, Product Manager of LILIN, said, “We are very pleased to show Aida traffic management solution at ISC West 2020, since our development engineers focused on the AI development for years. Other than AI products, LILIN will demonstrate products for custom install, facial recognition system, QR code for B&B, campus solution, building automation, access control for hotel, and LILINHome app.”
Round table discussion
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?