“Normally when we talk about trends and the future, we are actually thinking more about the present. The reason we are keen on understanding trends is because we want to know how they will affect our current business and how we should act now to avoid being outdated.” Significant changes have shaped the security industry during the last decade, and more exciting innovations should be expected in the 2020s. Emerging technologies and applications, such as multi-dimensional perception,...
Qognify, the advisor and provider of physical security and enterprise incident management software solutions, will be present at Intersec 2020. The company will demonstrate the latest version of its state-of-the-art video management system Cayuga as well as its newly released, web-based central management platform Umbrella. Focusing on the outcomes of customers that place a premium on physical security, safety and operations, both products enable organizations especially in the logistics and ret...
CNL Software, globally renowned developer of Physical Security Information Management (PSIM) software solution, is pleased to announce that it will be exhibiting at Intersec 2020. CNL will focus on the technology that is driving the digital transformation of control rooms across the Middle East region. CNL will be joined by Cepton Technologies, Inc. a developer of industry-leading 3D sensing solutions, who will be showcasing their latest correlation of LiDAR data with real time video visualizati...
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A s...
Allied Universal®, a security and facility services company in North America, announces a strategic partnership with LiveSafe to provide mobile, two-way safety communications between the company’s security professionals and customers in order to prevent safety and security incidents. Allied Universal® Technology Services, a division of Allied Universal, will be utilizing the LiveSafe Mobile App effective immediately. Safety and security risk intelligence LiveSafe delivers action...
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Pelco, Inc., a global pioneer in intelligent video solutions, announced the appointment of Kurt Takahashi as Chief Executive Officer, effective November 1, 2019. Previously, Takahashi held the position of President of AMAG Technology, a global end-to-end security management platform. At AMAG, his innovative leadership transformed the company from being an access control focused business into an open, innovative security management solution specializing in access control, video surveillance, visitor management, identity management, incident and case management, and a fully integrated command and control software suite. Deep connections in the industry Prior to AMAG, Takahashi was the Vice President of Global Sales and Marketing at Quantum Secure where he led sales, business development, and marketing to drive global pipeline and top-line revenue growth. “During this time of transformation, there is no better person to lead Pelco than Kurt Takahashi,” said Russ Roenick, Pelco’s Chairman of the Board and Managing Partner of Transom Capital. “Mr. Takahashi is a proven leader with deep connections to Pelco and the industry." "With over 20 years in the physical security sector, his reputation with customers, dealers, consultants, and technology partners is invaluable. We know Kurt’s business and technology vision, executive experience, and ability to bring people together to achieve success will propel Pelco into a leading position in the security industry.” Distinctive video solutions “I am honored to have this opportunity to lead Pelco. We have a strong brand with talented and motivated people. I’m looking forward to accelerating our ability to deliver innovative, distinctive video solutions and experiences back to our customers,” said Mr. Takahashi.
Palo Alto Networks has announced new enhancements to its comprehensive Security Orchestration, Automation, and Response (SOAR) platform, Demisto. Demisto v5.0 enables security analysts to tailor the way they visualize incident and indicator flows, allowing security teams to better manage and automate incident response. Key updates to Demisto v5.0 include - Reimagined User Interface - Brand new UI that streamlines global navigation while also enhancing the delivery of information within each incident Enhanced Threat Intelligence - Access rich indicator intelligence from integrated sources and take action in a scalable manner Database Scaling - Install the Demisto app server and databases on separate machines. Multi-tier configurations let you scale your environment and manage resources efficiently SOAR on the fly - Introduction of chat support in the mobile application, letting you update relevant stakeholders on-the-go and ability to manage notifications from the web app, choosing to receive updates on email, Slack, Mattermost, or the mobile app Demisto v5.0 security platform Rishi Bhargava, VP Product Strategy, Demisto, a Palo Alto Networks company comments, “Demisto v5.0 is packed with new features suggested to us by our community of customers, partners, and independent users. We’ve also introduced changes that facilitate improved load management and scaling of resources, ensuring that organizations are secure irrespective of the pace at which they grow”. He adds, “Back in 2015, we recognized that security teams wilt under dual pressures every day: an ever-increasing volume of security alerts, and insufficient resources to address these alerts. Over the past four years, our customers have seen us as the only platform that has combined security orchestration, incident management, and real-time collaboration to make their lives easier”. Security Orchestration and incident management Rishi further stated, “Automating as much as possible hands time back to security teams to investigate, learn and improve, and sometimes just take a deep breath. Since joining forces with Palo Alto Networks, we have accelerated our go-to-market and made inroads into use cases outside of traditional security operations.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead, Twickenham Stadium and the University of Hull. Paul Dodds, Country Manager, UK & Ireland, commented: “At a time when Brexit has seen many organizations reconsider their presence, Genetec is unequivocal about the role of the United Kingdom as a critically important part of the global economy. As such, we’re delighted to be opening a central London headquarters to better meet the needs of our channel partners, end users, and prospects.” Public safety applications We work with local partners to provide training, compelling educational experiences, and state-of-the-art support The new headquarters will incorporate an expanded state-of-the-art training facility, and a new ‘Genetec Experience Center’ housing innovative solutions from Genetec and its large ecosystem of technology partners. Furthermore, the office will house a dedicated research and development team focused on justice and public safety applications for law enforcement, emergency responders and local government. Michel Chalouhi, VP of Global Sales, added: “The new London headquarters will give us the perfect platform to continue to execute our UK strategy and sustain the excellent year-on-year growth that we’ve achieved globally over the past years. The security market is growing and changing rapidly. We are constantly facing new challenges, so we need to ensure we work with our local partners to provide up-to-date training, compelling educational experiences, and state-of-the-art support. Our base in London will help us do that, thanks to its fantastic location, facilities, and links.”
Everbridge, Inc., a pioneer in critical event management and enterprise safety software applications to help keep people safe and businesses running, announced a partnership with RiskBand, a provider of wearable, live-monitored safety devices for organizations and their workers. The alliance is part of Everbridge’s strategy to reach the broadest set of workers, including those that may not always have ready access to a cellphone, such as a hospitality employee, in-home healthcare provider, or lone worker in the field. With the additional modality and simple access of the RiskBand wearable device, Everbridge is expanding its addressable market for protecting employees regardless of their physical location, whether inside the office, working remotely, or traveling the globe. Critical events such as assaults and active shooter incidents are threatening lives and causing major business disruptions. Fatal work injuries have increased over the last decade, with 5,147 occupational fatalities recorded in the U.S. in 2017. Emergency response strategy The rise in smart technology is drastically improving operations for businesses across the globe" This challenge is only magnified by an increasingly mobile workforce, as well as the prevalence of lone worker scenarios across multiple industries served by both Everbridge and RiskBand, including healthcare, banking, retail, energy and utilities, hospitality, and higher education. Designed for enterprise-level personal safety and security, RiskBand’s wearable devices bolster an organization’s emergency communication and response strategy. A single push of a button provides two-way voice, user profile data, images, and geolocation, in near real-time to your organization’s security operations center. As part of the partnership, Everbridge will integrate its award-winning Safety Connection™ platform with RiskBand’s wearables, allowing both Everbridge and RiskBand customers to receive emergency messaging and provide detailed reporting of their location. The data from an employee’s RiskBand device is shared back to the Everbridge platform, allowing an organization to deploy the appropriate emergency response. The rise in smart technology and connected devices is drastically improving operations for businesses across the globe, and bringing about new opportunities to keep people safe,” said David Meredith, CEO of Everbridge. Immediate access to phones The collaborative partnership will enable us to enhance employee safety through state-of-the-art wearable devices" “Our partnership with RiskBand is advancing our existing connected safety ecosystem, offering employees without immediate access to a cellphone with a direct line for emergency communication that they can utilize anywhere.” As part of the expansion of that ecosystem, Everbridge is looking to introduce additional wearables into the marketplace, and integrate further with IoT devices, sensors, and smart building technology, all to better protect employees from an increasing array of workplace threats. "It is especially gratifying that a respected industry leader like Everbridge recognises the powerful solution of the RiskBand ARIES device and platform. We believe that this collaborative partnership will enable us to empower businesses to enhance employee safety through state-of-the-art wearable devices that are fully integrated with the most comprehensive critical event management solutions,” explained Jim Van Law, CEO and Co-founder of RiskBand. RiskBand will be fully integrated into Everbridge’s platform. Individuals attending the Global Security Exchange (GSX) conference next week in Chicago can visit the Everbridge Booth #124 to learn more about the joint offering.
March Networks, a global video security and video-based business intelligence solutions provider, is pleased to introduce new capabilities available in its powerful Searchlight software. Used by international banks and retail organizations to extract valuable information on customer service, merchandising, operations, compliance and more, March Networks Searchlight helps businesses improve performance and profitability. Integrating clear surveillance video, relevant business data and highly accurate analytics, the software also enables organizations to proactively detect fraud and theft and quickly review suspect transactions – reducing investigation times by as much as 90%. Searchlight software also enables organizations to proactively detect fraud and theft Searchlight software With the launch of this latest version of Searchlight, customers benefit from enhanced filtering and customization features that make it easier to uncover losses and compare key performance indicators (KPIs) from multiple locations simultaneously. These new capabilities include: Expanded fraud/loss detection reporting. Users can now combine specific transaction types with associated point-of-sale (POS) or ATM/teller alarms to proactively pinpoint suspect incidents. A fraud investigator at a bank might set a business rule to report on all loan applications processed with no customer present, while a retail loss prevention manager may want to see all incidents where a no sale transaction is followed by the opening of a cash drawer. Users receive a list of all of their customized exceptions along with links to the recorded video so they can quickly scan through each incident and visually verify what occurred. Enhanced transaction pattern detection, which allows users to more precisely define suspect transactions by combining transaction types (e.g. withdrawals, deposits, voids, discounts or refunds) occurring within a set time interval. A retail employee voiding a transaction immediately following a cash transaction, for example, or someone conducting two ATM cash withdrawals below a set threshold within minutes might be committing a crime. This new Searchlight software capability helps investigators identify such theft and fraudulent incidents faster and provides clear video and data evidence to help them prevent recurring incidents from happening. People counting with employee filtering, through an integration with the latest FLIR Brickstream 3D analytic sensor, to provide highly accurate customer traffic data and sales conversion metrics. The feature uses a combination of Bluetooth Low Energy (BLE) technology and employee-worn tags to automatically identify and remove staff from customer counts, a process that can otherwise be manual or missing in today’s retail environments. Personalized reports that enable users to set and save ‘favorite’ dashboards incorporating data from multiple sites. The customized reports are ideal to help aggregate and compare KPIs, such as the location with the highest percentage of voids or returns, or the most transactions per day over a defined amount. Integrated video and data solutions “These latest Searchlight capabilities make it even easier for our banking and retail customers to uncover, analyze and compare data that’s critical to the success of their business,” said Dan Cremins, Global Product Management Leader, March Networks. “With more than a decade of experience providing integrated video and data solutions to these markets, we’re now focused on expanding the applicability of the data within an organization, while constantly improving the user experience.” March Networks will showcase its new Searchlight business intelligence dashboards and reporting capabilities in Booth 1319 at the Global Security Exchange (GSX) Exposition, September 10-12, 2019 in Chicago, IL. March Networks is a globally renowned provider of intelligent IP video surveillance and business intelligence solutions. They provide technical expertise to enable organizations to realize the true power of integrated data and video. Headquartered in Ottawa, Canada, they are a global organization with corporate offices located worldwide.
At GSX 2019, SilverShield™ Safety & Information Systems will showcase their award-winning visitor and information management system (Booth #1594). The solution is an easy-to-use, cloud-based SAAS approach to security, with several different modules that provide a complete safety solution. “The SilverShield Visitor and Information Management System is the most effective way for users to vet and manage visitors for any size facility,” said Robin Baker, CTO, SilverShield. “We look forward to demonstrating the powerful software to GSX attendees this year.” The SilverShield Visitor Management System enables staffed or unstaffed visitor screening at all types of facilities – schools, medical facilities, or any type of business that screens visitors and maintains visitor records. This cloud-based (SAAS) multi-platform solution allows users to quickly screen a visitor’s credentials against custom watchlists and the national sex offender database, in near-real-time, to decide if the visitor should be welcomed or denied entry. If welcomed, your staff is notified of visitor and VIP arrivals. Register manually or by scanning a valid ID The Virtual Lockdown System alerts users to take immediate action to initiate their lockdown procedures If there is a threat identified at any entrance, the system allows the user to immediately send silent alerts to designated stakeholders via a two-way communication mode. When integrated with the SilverShield ID Badge System, the system can create temporary ID or permanent ID badges for staff, students, and vendors. For organizations with unstaffed entrances, the SilverShield Kiosk System allows visitors to register themselves – manually or by scanning a valid ID. The interactive Kiosk System will also notify staff of VIPs or unwelcome guests, increasing security and safety even in unmanned entry points. In the event of an emergency situation or unwanted guest, the system’s Incident Management module can alert local police, initiate a virtual lockdown, and produce mass emergency notifications via email, SMS/text, cellphone and web push notifications. The Virtual Lockdown System alerts designated stakeholders via an audible siren sent to all users’ computers or cellphone devices, to alert users to take immediate action to initiate their lockdown procedures. Event Management System The solution pre-screens guests, ensuring that unwanted guests are not invited to events or facility activities SilverShield’s HR & Safety Resource Center enables companies and schools alike to store their Security Plans in a secure Learning Management System (LMS) and share it along with supporting materials with staff and stakeholders. The system also encourages assessments to ensure comprehension of security protocols, procedures and plans. The solution’s Event Management System pre-screens guests against watchlists and the national sex offender database, ensuring that unwanted guests are not inadvertently invited to events or facility activities. The system will manage invitations and RSVPs and can issue parking and visitor passes to approved guests via email and SMS/text, helping to safeguard a safe and secure event.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Security of Buenos Aires Province required powerful security tools to assist the local police in patrolling and enhancing the overall level of safety throughout the province. Strong and modern security equipment The Ministry of Security of Buenos Aires authorized the Dahua team to conduct research The Buenos Aires police sought strong and modern security equipment that could monitor the roads during police patrol, while keeping records as evidence. Additionally, they required a management terminal on the dashboard of each patrol car to allow the user to view videos in real time and manage all the surveillance equipment via the system. The technical equipment must be installed in a suitable position to avoid damage in case of car accident or airbag activation, and to ensure passenger safety under adverse conditions, such as weather changes, vehicle temperature shift, etc. After presenting Dahua Mobile Solution that could fulfill the aforementioned requirements, the Ministry of Security of Buenos Aires authorized the Dahua team to conduct research and implementation of this project. Monitoring road conditions The Dahua Mobile Solution covered 400 patrol cars of the Buenos Aires police, each of which was equipped with six HD cameras, including two different models of 2MP Mobile HDCVI IR Dome Camera – HDBW1200F-M and HDBW2241F-M-A, 3MP Network IR Mini-Bullet Camera IPC-HFW1320SP, and 2MP Mobile HDCVI IR Cube Camera HAC-HMW3200. Five cameras were also installed outside each patrol car to monitor road conditions from every angle In addition, five cameras were also installed outside each patrol car to monitor road conditions from every angle: HDBW2241F-M-A on both sides; HDBW2241F-M-A and IPC-HFW1320SP on the front top; and HAC-HMW3200 at the back. All of the products support IP67& IP6K9K, shock-proof, and resistant to vibration and severe weather conditions. HDBW1200F-M was installed inside each car to monitor its situation and regulate police behavior. As part of the requirement, the management terminal was installed at the center of the dashboard and linked to the central server through a 10/100 wired Ethernet connection via an RJ45 connector. Automatic recognition technology In addition to the cameras, Dahua Mobile Video Recorder MXVR4104-GFW was also deployed for efficient video storage. Its embedded GPS positioning allows the user to track the vehicle in real time. In case of emergency, it will trigger the alarm and automatically upload the data on time. It also supports image capturing of suspected vehicles and uploads them to the management platform It also supports image capturing of suspected vehicles and uploads them to the management platform. Indeed, Dahua Technology has launched a smart police car solution to aid the police in identifying suspected vehicles and people. Featuring automatic recognition technology, the new device can compare suspected vehicles and people with the information in its database, achieving efficient mobile control and identification. Mobile video surveillance solution With the implementation of Dahua Mobile Solution, the Buenos Aires police can now manage social security better through a comprehensive monitoring system. The mobile surveillance system with high-definition image quality and other advanced functions enabled the police to obtain first-hand evidence, achieve timely intervention and control dangerous and detrimental activities during their patrolling. This significantly improved their work efficiency, stabilized social order, and helped build a safe and harmonious community. “We are very satisfied with Dahua products. The mobile video surveillance solution used in police cars enables our police to work more efficiently and safely because the surveillance center is available 24 hours a day, providing appropriate assistance in solving various issues or incidents that the police may encounter. ” Said Dr. Ignacio Greco, Deputy Secretary of the Provincial Ministry of Security, Buenos Aires.
Video walls installed in Bristol City Council’s “world class” security operations center by visual display experts Ultimate Visual Solutions (UVS) have completed 25,000 hours of continuous operation. The three video walls are each made up of 55-inch 24/7 grade LCD displays with narrow bezels and are part of a multi-purpose center which brings together some of the city’s critical support services and acts as a control center in the event of a major emergency. The Operations center, which has been operating since February 2017, houses what used to be the council’s Emergency Control Center, Traffic Control Center and Community Safety (CCTV) Control Rooms together in a single space for the first time. Live CCTV images It also installed a conference/incident video wall made up of four display These teams provide essential public safety services that utilize around 700 CCTV cameras in the city. UVS installed a curved video wall made up of 12 displays for monitoring a wide range of data including mapping, traffic monitoring and live CCTV images. It also installed a conference/incident video wall made up of four display, with access to the same data, and a smaller police incident monitoring video wall. Peter Anderson, Head of Connected City Service at Bristol City Council, said, “Having a high-quality and resilient monitoring wall is essential in providing a world class service that’s help keep the city safe, moving and healthy. The monitoring wall provides the technology and framework for effective public space surveillance which is an integral element to provide first class images which can be used to help bring offenders to justice.” Problem-free operation UVS Managing Director Steve Murphy said the ability to provide high quality displays which have operated problem-free was key. He said, “The control center was hailed as world class when it opened and obviously seamless 24/7 operation is of paramount importance. We are delighted to have hit the 25,000 hours milestone and to be part of such an important project, helping to keep the people of Bristol safe.” As well as the video walls UVS also installed two video wall controllers and inputs to allow operational staff and visitors to display tablet and mobile device data on the displays. It also provides an annual maintenance contract. Synectics Synergy VMS platform All video wall control is fully integrated to the Synectics Synergy VMS platform" Steve Murphy added, “The project was won after very detailed technical and commercial evaluation by the end client and their consultants (IBI) including detailed demonstration of the required system functionality. All video wall control is fully integrated to the Synectics Synergy VMS platform. UVS have worked closely with Synectics during the past 12 years, which ensured the seamless integration.” UVS, formerly eyevis UK, is based at Business First Burnley Business Center and provides video wall displays and audio visual solutions to a range of clients across the UK. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. Providing turnkey solutions It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station, to cope with increased demand for its technology. eyevis UK changed its name to Ultimate Visual Solutions (UVS) last September following the acquisition of eyevis GmbH by the Leyard group. The rebranding has allowed the company to offer an expanded range of products and services and remain at the forefront of providing turnkey solutions for all types of audio visual and visual display applications.
Established in 1976, Meghna Group of Industries (MGI) is a conglomerate in Bangladesh. MGI operates out of a large campus in Dhaka that houses its head office, 45 different manufacturing plants, and maintenance workshops, all under one roof. MGI has a turnover of over USD 3 billion, and an employee strength of over 30,000. Being an established and trusted group, it required operations to be suitably monitored, in order to ensure uninterrupted production, adherence to quality standards, and timely delivery of supplies to customers. So far, it had been monitored by manned security, with accompanying risks ranging from damage to assets, misuse of equipment, thefts, leakage of confidential information, employees’ safety, poor record keeping for vehicles entering or exiting the premises, and more. Providing investigation-Friendly monitoring software Enabling IVA at various locations has helped in the monitoring of infrastructure Designing of the solution started with a joint site survey by Videonetics, MGI IT heads, and the system integrator. After extensive research, Videonetics developed a unified solution encompassing Intelligent Video Management Software (IVMS), Intelligent Video Analytics (IVA), and a customized ANPR system to read and capture license plates in Bengali language. Key aspects of the solution included the following: Videonetics’s IVMS has been deployed to help in viewing and recording feeds from over 500 cameras installed in multiple factory locations. This is enabled over IP network in an efficient and elegant way. In addition, the solution provides investigation-friendly monitoring software at the front-end, while relegating all the complexity of the server software to the back-end. Enabling IVA at various locations has helped in the monitoring of infrastructure, vehicles, people, crowds and objects, for automatic detection and analysis of events of interest. Manned security to address safety The operators get a bird’s eye view of various sites from their centralized location, enabling them to respond quickly and effectively when an incident occurs. The solution has been installed on Red Hat® Enterprise Linux® which makes the overall system more secure and maintainable. Videonetics’s Automatic Number Plate Recognition (ANPR) system has been customized to read license plates in Bengali. Regardless of the lighting conditions, the Bengali ANPR accurately captures with timestamp the license plate of any vehicle as it appears in the camera’s field of view (FoV). The new implementation enables security operators to be deployed at the unified interface In addition, the system is integrated with the IVMS at the command and control center, for viewing and analyzing vehicular movements, and taking action, if required. THE IMPACT Prior to the installation of Videonetics’s solution, MGI used to rely on manned security to address safety, security and operational risks. However, the new implementation enables security operators to be deployed at the unified interface, for monitoring multiple sites such as assembly plant, warehouse, process, dispatch area, vehicle movement, and so on. Personal protection equipment detection So now, MGI operators can handle incidents of thefts, potential break-ins, unauthorized intrusions, and conduct investigations, without having to leave their desks. This has helped MGI in maximizing resources and significantly reducing costs. But the biggest benefit has been to be able to provide a safer environment to its employees, and to secure its workplaces with optimization in day-to-day operations. The open architecture of the solution allows MGI to continue adding, in a single interface, more AI & DL powered applications such as personal protection equipment detection, facial recognition, fire & smoke detection, workers slip/ fall detection, workers head count, vehicle movement management, to name a few. This makes it possible for the company to address all its security concerns with a holistic approach.
Use of iTrak solution by casino operators in both Macau and Las Vegas for reporting, security and loss prevention expands Omnigo’s global footprint. Omnigo’s security system “One of the major benefits of penetrating a market like Macau with Omnigo’s security system is that casinos can draw from a shared database of banned patrons, advantaged players, and VIP guests from Day One of implementation,” said Mark Kornegay, CRO of Omnigo Software. He adds, “Sharing data across properties enhances security and surveillance for everyone by allowing casino operators to exchange critical information with each other and with law enforcement.” Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting iTrak security solution Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting and data analysis. Casinos can function more efficiently using iTrak thanks to its simplified reporting and notification process. The system also empowers casino employees to leverage data-driven security intelligence to address incidents in real-time, track persons of interest and mitigate risk and exposure to liability. Various modules within iTrak include Facial Recognition, Visitor Management, Lost and Found and more. Security and risk management system In addition to the Macau expansion, Omnigo’s casino portfolio also includes 100% of the Las Vegas Strip casinos and 65% of the Canadian gaming market. Each casino uses iTrak, Omnigo’s security and risk management system for incident reporting, property surveillance and security and loss prevention. “It’s a true testimony that these casino operators have put their full confidence into Omnigo’s offerings to keep their properties safe. With that level of trust, we’re able to prioritize innovation and bring the latest technology like facial recognition software and advanced data analytics to market faster for our customers, both large and small,” Kornegay added.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honored to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Sitting on the banks of the river Niger in West Africa is Niamey, Niger’s capital city. The capital city faces some unique challenges to the safety of its local residents and visitors. To help tackle these issues, the government of Niger is working with Hikvision’s West Africa team to install a state-of-the-art, cutting-edge video surveillance solution across the region. Niamey has a history of trade and commerce. Its large and bustling open air market – the Grand Marché – sells everything from clothes, to jewelry, to food, and attracts an estimated 20,000 tourists a year. But while the city has long been known as one of the more relaxed capitals of West Africa, in recent years Niamey has received high profile attention due to criminal incidents in and around the capital city. African Union Summit The city would also receive high profile guests from around the world, including key personnel from the UN and WTO When it was announced that Niamey would host the 33rd Session of the African Union (AU) Summit for the very first time, the Government of Niger decided to seize the opportunity to establish a complete urban video surveillance network. It was vital that this high profile event could run for the full five days without any disruption or untoward incidents, as Niamey would attract visitors and heads of states from across the continent. The city would also receive high profile guests from around the world, including key personnel from the United Nations and World Trade Organization. Complete video surveillance solution Vincent Wang, Technical Support Engineer for Hikvision West Africa, says, “The AU Summit is a key event in Africa’s diary, and always requires a high security presence. It gave us the ideal springboard for launching a complete surveillance solution that would provide security to those in attendance, while giving the city a robust set of tools to help prevent and manage security incidents long into the future.” When seeking out the ideal surveillance solution for this project, the Government of Niger learned about several similar projects that Hikvision had already completed in African cities and was impressed how well the solution is running. “They wanted to emulate a project, so that’s what we set about doing.” says Vincent. Hikvision high resolution cameras Vincent and the team worked with technology partners, ITS Solutions to design a complete urban surveillance network in Niamey, which would protect residents and visitors across the whole city during the summit and beyond. Central to the solution was the installation of more than 100 Hikvision high resolution cameras for 24-hour monitoring of the city. Along the 12 main roads, and at key intersections throughout the city, the government’s security team installed the Hikvision DarkFighter 2 MP Speed Dome Cameras (DS-2DF8225IX-AEL). These cameras are designed to deliver high quality images in low light or dark environments. They are also equipped with license plate recognition technology so as to effectively identify vehicle violations, such as over speeding or other traffic rules violations, even at midnight with no light. Hikvision PanoVu Series 180° Panoramic + PTZ Cameras Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras Meanwhile, Hikvision PanoVu Series 180° Panoramic + PTZ Cameras (DS-2DP0818ZIX-D/236) were installed at the entrances and exits of the main government offices and hotels, for reliable surveillance and overall protection of all visitors with panoramic view at the time of the summit event. Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras. And the high speed PTZ also offers the function of fast detail positioning over the panoramic area. In the control center, security teams were given Hikvision iVMS-8600 video management software (VMS) in conjunction with large LCD monitor screens, to display a live stream from all the city’s surveillance cameras. Hikvision’s urban video security solution also includes mobile surveillance, allowing law enforcement or government officials to use a mobile device to see a live stream from any Hikvision camera installed in the city, even while on the move. Enhancing network infrastructure The installation was thoroughly planned. “The existing local infrastructure provided some challenges,” says Vincent. “But we investigated it fully during our test phase, so we could design a surveillance network to suit”. “For instance, we found a few potential issues with the local power supply, but to remedy this we installed a UPS network to guarantee power to the cameras for at least 2 hours should the grid fail. We also assessed the local network infrastructure, and the ambient lighting at night. This work was fully completed during our proof of concept several months before the summit.” Hikvision surveillance solution for smart city The African Union Summit was well received and passed without event. The Hikvision surveillance solution undoubtedly played a key role. “The people of Niger feel a certain confidence when talking about the summit,” says S.E Brigi Rafini, the Premier Ministre, at the government of Niger. “It couldn’t have happened without the support of Hikvision technology. The comprehensive security solution was central to the event’s success.” Counseil de Bureau de Securité at the Government of Niger kept positive attitude towards the future potential of this solution. “Thanks to Hikvision technology, Niamey now has a comprehensive city safety solution that will help us to both prevent crime, and respond in real time when incidents do occur. It’s a landmark project for our country and the region as a whole, and we are very interested to see how this innovative technology can help our city and our people to be safer.”
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?