IDIS has further enhanced its IDIS Center VMS, adding new features and functions targeted at small to mid-sized enterprises and multi-site customers. Organizations can build powerful centralized monitoring solutions, quickly and easily, when implementing IDIS Center together with the wide selection of IDIS DirectIP cameras and powerful NVRs. These deliver customer lifecycle savings of 50% or more compared with server-based solutions, thanks to reduced installation time, no upfront or ongoing li...
AMAG Technology, a G4S company, expands its security offering with Symmetry Business Intelligence, a robust analytics engine designed to provide critical information via data analysis. Organizations can use the data from their access control system to determine if an employee or contractor is displaying abnormal behavior. AMAG Technology is a pioneer in unified security solutions that helps organizations mitigate risk, ensure compliance, and lower the overall cost of a security program. Risk s...
Symmetry Business Intelligence analyzes how a person’s access activity is tracked and patterns established based on a risk score methodology. Anomalous behavior may raise a person’s score, and high-risk identities are flagged in a dashboard. Identify the employees Dashboards within Symmetry Business Intelligence provide the security team with an at-a-glance look at identities with the highest risk scores. Scores are generated based on the reader location, time of day and a user&rsq...
Crossword Cybersecurity Plc, has announced that its Consulting division has signed several new agreements, including three with companies in the legal, insurance and financial services sectors, to help them improve their cyber security posture. A cyber transformation project has begun with a leading insurance company, the fourth client secured in the sector over the last twelve months. Crossword Cybersecurity will assist the company in improving its cybersecurity posture, building a more resili...
Digital Monitoring Products (DMP) is releasing a line of FirstNet-certified and compatible alarm communication radios that will work directly with AT&T FirstNet. With the new communicator, DMP XR and XT Series panels are the first to be available for use on FirstNet. FirstNet is the nationwide wireless public safety broadband network that has been established by the Federal Communications Commission, which hired AT&T to deploy it with $40 billion of planned investment. Previously, first...
Everbridge, Inc., the globally renowned company in critical event management (CEM), has announced that the company has unveiled new CEM capabilities across the Internet of Things (IoT) for corporate, government and healthcare organizations to protect their people, assets, operations, supply chain and brand from critical events such as coronavirus (COVID-19). Everbridge CEM platform Everbridge’s industry renowned CEM platform will feature a new IoT extension module that will also leverage...
ISC West will occur as scheduled March 17th through 20th, 2020. The show is not being canceled or postponed. The Show’s planning closely follows the CDC guidelines, local and state public health authorities and the US State Department/Federal Government travel rules related to the COVID-19 virus. Reed Exhibitions and the Show team are monitoring updates from the CDC and the Southern Nevada Health District (SNHD) which continue to indicate low risk of exposure to the virus in the United States generally and in Las Vegas. Offering vital business opportunities The ISC Security Events team takes pride in offering vital business opportunities to customers, including networking, education and access to new products and technologies and they are working diligently to ensure ISC West 2020 and their other events live up to customers’ high standards. The team is focused on making ISC West 2020 a successful and enjoyable event for all attendees and exhibitors. The team is focused on making ISC West 2020 a successful and enjoyable event for all attendees and exhibitors ISC West, in collaboration with premier sponsor the Security Industry Association (SIA), today has announced the full education and special events programming, including an additional keynote from Christopher Fowler, the former deputy chief of operations of the city of Seattle Police Department and Brigadier General/National Guard, to lead a discussion around managing insider threats in workplace environments. Comprehensive education programming The programming at ISC West this year mirrors market demand for education into new areas in the converged security space, introducing six featured exhibits: connected security, drones & robots, emerging tech, loss prevention & supply chain, public safety and smart home. The ISC West show floor has been re-imagined, modernizing show segments making it easier to navigate, allowing attendees to find the right products and solutions to meet their organizations’ business needs. In addition to comprehensive education programming, this year’s event will feature a number of exciting award ceremonies, networking opportunities and special events to bring the entire security industry community together. The ISC West special events are as follows. The SAMMY awards, hall of fame and MVP ceremony March 17, 4:30-6:30 p.m. Join Security Sales & Integration for its 25th annual SAMMY Awards, honoring dealers and integrators for their sales, marketing, business and installation excellence. SIA New Product Showcase (NPS) awards ceremony March 18, 3:30-4:30 p.m. SIA will honor and recognize new and innovative security products and services and award the winners for the Product Achievement Awards. SIA InteropFest All ISC West attendees are invited to the event to enjoy technology interoperability demonstrations March 18, 4:30-7:00 p.m. The SIA InteropFest showcases interoperability among physical security solutions leveraging SIA's open supervised device protocol technology standard. All ISC West attendees are invited to the event to enjoy technology interoperability demonstrations, insights from special guest speaker Daryle Hernandez, chief of the Interagency Security Committee within the U.S. Department of Homeland Security’s Infrastructure Division, and a cocktail and networking reception. Mission 500 security 5K run/2K walk March 19, 7:30-8:30 a.m. One wouldn't want to miss this one-of-a-kind event where the security industry comes together to raise money for children in need. Register to run or walk and start fundraising today to make a difference while at ISC West 2020! A portion of the funds raised at the Security 5/2K will benefit Habitat for Humanity Las Vegas. SIA RISE happy hour March 19, 5:30-7:30 p.m. SIA’s RISE community will host a lively happy hour outing for young security industry professionals at Topgolf Las Vegas. Swing some golf clubs and enjoy cocktails and networking with other young security talent and those new to the industry. The RISE Happy Hour is open to young professionals employed by SIA member companies. ISC West customer appreciation party at TAO nightclub March 19, 10:30-11:30 p.m. Free for all ISC West attendees, enjoy an open bar at TAO Nightclub to celebrate at the customer appreciation party! SIA women in security forum breakfast March 20, 8:30-9:30 a.m. Sponsored by: Siemens Smart Infrastructure Boisvert will share her insights on strategy, sales and operations while working closely with clients Join SIA for a complimentary breakfast to celebrate women in security, featuring headline speaker Jaime Paris Boisvert, general manager for Siemens Smart Infrastructure. Boisvert will share her insights on strategy, sales and operations while working closely with clients to deliver solutions and services that optimize buildings and infrastructure by improving energy efficiency, comfort, safety and security. Day 2 mid-Day keynote: the threat from within Thursday, March 19, 12:00-1:00 p.m. Sponsored by: ADT Commercial Christopher Fowler, brigadier general (retired) and former deputy chief of operations, City of Seattle Police Department, will explore what can be done before a workplace security incident takes place and how to optimize internal processes to address it. “For more than 50 years, ISC West has been valued among security professionals and we are always working to better encourage and support attendees to connect professionals with the knowledge, products and services they need to do their jobs efficiently and effectively,” said Will Wise, group vice president, Reed Exhibitions. “2020 brings a new decade, and with it, new challenges to the converged security industry. The education and programming at ISC West this year will cover the industry edge-to-edge, sparking productive discussions around industry trends and advancements for all show attendees.”
Qognify - trusted advisor for physical security and enterprise incident management, will showcase its new VisionHub VMS+ during ISC West 2020. The enterprise-class security management solution is taking video management systems (VMS) to a new level by going beyond the pure management of video streams to include superior workflow support, situational awareness and system management capabilities. The first version of VisionHub was launched in 2016 to much industry acclaim, being awarded the Security Industry Association’s (SIA) New Product Showcase Best Video Surveillance Management System, as well as the CCTV System of the Year at the Security & Fire Excellence Awards. Security management solution The new VisionHub VMS+ is the ideal security management solution providing organizations such as airports, seaports and operators of critical infrastructure with: Enhanced resiliency – VisionHub VMS+ helps to avoid the loss of video footage with redundancy across all VMS components and with active/active dual recording. Situational awareness – The advanced geo-positioned maps within VisionHub VMS+ helps to localize and to assess an event within seconds. Furthermore, its built-in incident management component provides step-by-step guidance through the resolution process. Incident response management – VisionHub VMS+ provides actionable guidance and facilitates collaboration throughout the process of resolving an incident. Enterprise incident management solution Qognify has the most comprehensive range of solutions available on the market today Qognify will present VisionHub VMS+ at a special event on Thursday, March 19th at 11 am, in the presentation room Marco Polo, 804. With a multi-award-winning VMS portfolio comprising VisionHub VMS+, Cayuga, Ocularis and NiceVision, Qognify has the most comprehensive range of solutions available on the market today. Whether an organization operates from a single high-security facility or has a highly complex distributed infrastructure across hundreds of sites and many thousands of cameras, Qognify has a VMS to meet its exact specifications. Qognify will also be present on the main showfloor, participating with Pivot3 – the provider of intelligent IT infrastructure for mission-critical hybrid cloud and IoT surveillance environments on booth 26067. For organizations looking for a full-scale enterprise incident management solution, Qognify will also be showcasing the Situator platform on Wednesday, March 18th from 14:00 – 15:00 in Marco Polo, 804. The President of the Columbia-based surveillance and security company Siete 24 will explain how Qognify Situator is helping to reduce theft and false alarms while controlling costs for a large bank.
Vaion, an innovator in end-to-end AI video security, announced that Joel Brunson has joined the company as CEO of Vaion's Federal business. Brunson brings world-class leadership in business growth and proven expertise in the federal government sector. "We're on a growth trajectory as organizations around the world realize the need to take a proactive posture to security in both the physical and cyber realms," said Tormod Ree, Vaion CEO. "Joel brings a unique vision and an incredible depth of experience working with the federal government on both video and cybersecurity solutions, a huge asset both for our team and our customers." Intelligent video security "Vaion is setting the precedent for intelligent video security. I've worked in this industry for nearly three decades, and the only thing that is constant is change," said Joel Brunson, CEO, Vaion Federal. "Organizations worldwide but especially in the government sector, need to rethink their approach to security. Vaion's ability to detect and address incidents through AI and machine learning, combined with our agility to meet the unique needs of different government agencies, is industry-shifting." The more warning we can give security professionals tasked with protecting the public, the better the outcome" Brunson joins Vaion from video conferencing and collaboration company, Acano which was acquired by Cisco. Before Acano, Brunson led teams at Black Box Video, Tandberg, and Avaya. Brunson has a passion for creating and developing successful business teams to meet and exceed targets consistently. In his new position, Joel will oversee both physical and cybersecurity solutions aimed at protecting federal government agencies from internal and external threats. Prevent threats from escalating "Joel has a track record of exceeding market expectations because he's raised the standard when it comes to understanding each unique customer's needs. This is especially important in the federal sector where security takes on a whole new meaning," added Ree. "Vaion offers a solution the federal market absolutely needs," added Brunson. "The more warning we can give security professionals tasked with protecting the public, the better the outcome." Vaion addresses the need for a scalable, intelligent video security solution across markets, federal government, retail, commercial, healthcare, and education. By detecting and addressing threats in real-time, Vaion allows security professionals to prevent threats from escalating. This is made possible through the use of computer vision and a neural network (machine learning) that mimics the human brain's ability to recognize patterns and categorize images. End-to-end security solution Vaion provides the tools to find 'what matters' in recorded video quicklyWith Vaion's end-to-end security solution, organizations can address security issues as they unfold rather than merely reviewing recorded incidents after the fact. And when necessary, Vaion provides the tools to find 'what matters' in recorded video quickly. A vital capability to expedite effective investigations with minimum resources. In the federal government sector, taking a proactive approach to security is no longer an option; it is a necessity. Just consider the reactive alternative for government agencies like the TSA who protects airline passengers and employees or the DOJ who runs the Bureau of Prisons or the CISA who protects critical national infrastructures, to name a few. All of these agencies are tasked with one thing, protecting the employees, buildings, records, and the citizens they serve. Vaion allows these agencies to be vigilant and alert to pre-empt threats rather than just respond. Vaion invites customers to learn more about their video surveillance innovation at ISC West, March 18-20 in Las Vegas. They will be demonstrating their latest technology at booth #19125.
HID Global, a worldwide provider of trusted identity solutions, announced the launch of HID® Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers dramatically simplify system deployment and management, meet the advanced security requirements of today’s dynamic environments and set organizations up for smarter, more connected access control. Access control systems “With the industry now seeking to use access control systems as a backbone for creating intelligent environments, consultants, integrators and end users are increasingly demanding more versatile, high performance solutions,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control Solutions, HID Global. Organizations can use their technology of choice and easily migrate to the latest solutions “HID Signo is built on an open platform and delivers on our commitment to innovation with its unprecedented flexibility and robust set of forward-looking features that optimize workplace experiences. Our goal is to put more choices in the hands of our customers and give them peace of mind in knowing they can continually adapt their systems as requirements change.” Physical and mobile credential technologies For ultimate versatility, the readers are interoperable with over a dozen physical and mobile credential technologies so organizations can use their technology of choice and easily migrate to the latest solutions at their own pace. Additionally, with support for Apple's Enhanced Contactless Polling (ECP) to enable Student IDs in Apple Wallet, HID Signo is driving the next wave of flexibility and convenience with mobile access. HID’s new readers are packed with smart features, such as automatic surface detection that recalibrates and optimizes read performance based on the mounting location. For rugged, outdoor performance, the readers are also IP65 rated with no additional gasket needed, and feature a capacitive touch keypad resistant to harsh weather conditions. Remotely configure and diagnose readers HID Signo’s connectivity-by-design model empowers administrators to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. Additionally, configuration can be further streamlined through the controller via the Open Supervised Device Protocol (OSDP). HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems" “HID’s novel approach to access control also lays the foundation for a future of cloud-connected systems that will enable new applications and innovative capabilities, such the ability to proactively anticipate and address system issues before they occur,” Radstaak added. Built-in support for OSDP Secure Channel Delivering multi-layered security with built-in support for OSDP Secure Channel and HID’s proven Security Identity Object technology, the readers store cryptographic keys on certified EAL6+ secure element hardware and custom authentication keys can be used to further enhance security. HID’s patented velocity-checking feature also protects against brute force rapid electronic attacks. The new line of HID Signo Readers is available through Advantage Partners in major markets worldwide, with a phased roll out in select regions.
Dallmeier electronic is “Exclusive Platinum Sponsor” of the WGPC 2020 (World Game Protection Conference) at the Tropicana Las Vegas (Las Vegas, NV) from 23 to 26 March 2020. There, the pioneer of video technology for casinos will showcase how casino managers can improve cooperation with regulation authorities, deal with criminal activities proactively, and make day-to-day operation much more productive. With over 20 years of experience in the field of video security and data management in casinos, Dallmeier and its solutions promote secure, smooth casino operations all over the world. In March 2020, the company now attends the 15th WGPC in Las Vegas as Exclusive Platinum Sponsor. The conference deals with current and future challenges of the casino industry, such as compliance with stricter requirements by the regulation authorities or handling criminal behavior proactively. Dallmeier will present their “Smart Casino Solutions” for security, gaming automation and data management as part of the exhibition (24 and 25 March 2020). HEMISPHERE SeMSy The HEMISPHERE open software platform for security and business serves as the focus of the Dallmeier conference presence. In particular, casino operators can use the HEMISPHERE SeMSy solution suite as a "Casino Operating System": It enables the integration of third-party systems (e.g., CMS, POS, access control) and the display and processing of many different data sources and interfaces. With just a few mouse clicks security personnel can create a “digital incident file” containing videos, notes, reports etc. Employees in different departments can use the SeMSy system, wherein individual widgets are enabled for them depending on their tasks to provide them with personalized, function-optimized tools for completing their tasks. Sophisticated system components such as 2D and 3D maps with "Active Elements" or pre-defined standard operating procedures (SOPs) guarantee efficient processing and effective cooperation in the event of significant incidents and alarms. In addition, with just a few mouse clicks security personnel can create a “digital incident file” containing videos, notes, reports and other information. As a result, casinos will have no difficulty satisfying compliance requirements imposed both in-house and by external bodies (e.g., regulation authorities). Panomera camera technology Besides extensive requirements in terms of reporting, given the video security technology deployed more and more casinos are also being required to satisfy stricter regulations imposed by the regulation authorities. These include for example an ultra-high 4K resolution on the cameras in the area of the gaming tables, together with an efficient H.265 encoding technology. The Dallmeier Panomera W camera series which was unveiled at the end of 2019 supports native H.265, and it also integrates up to eight 4K sensors in one camera system, thus offering operators an unrivalled, undistorted 360° view of all activity on the gaming floor. Dallmeier customers report enormous time savings for their surveillance tasks, such as locating a person of interest in less than three minutes instead of over 20 minutes. Its benefits range from significantly increased game pace to substantially more effective protection from cheatingMoreover, the definable minimum resolution density of Panomera combined with integrated neural networks enables AI-based video analysis applications. These can be used by marketing analysts, for example, to create heat maps using "crowd analyses", analyze visitor streams and so make arrangements for more efficient capacity utilization in all areas of the casino. Casino Automation Technology (CAT) Visitors to the conference can also learn about Dallmeier CAT; this is the first automation system for table games (e.g., blackjack) in the world implemented by casinos in a production environment. CAT combines video technology with AI technologies, which enable it to detect chips and cards, provide real-time information about the position and value of bets, game pace, float value and many other analyses. Its benefits range from significantly increased game pace to substantially more effective protection from cheating, even up to precise player rating to improve customer loyalty programs and prevent expensive misjudgements. CAT has already been deployed at over 1,000 gaming tables in Macau and was honored with the award for "Best New Product" at WGPC 2019.
Pulse Secure, the provider of software-defined Secure Access solutions, announced a new research report that highlights improving hybrid IT, BYOD, access management and IOT security as the top priorities for UK healthcare organizations. 92% report ‘Unauthorized Data Access and Data Leakage’ has led to impactful incidents within the last 12 months. The Q1-2020 State of UK Healthcare Secure Access report by Pulse Secure surveyed more than 60 senior information security and decision-making executives from healthcare organizations in the UK with 1,000 to over 10,000 employees. Improving access control consistency The research examined overall IT spending strategy, incidents, control gaps, operational capacity and technology tools. The report confirms that UK healthcare industry is investing heavily in a hybrid IT strategy with an overwhelming majority expecting to increase investments by greater than 10% with usage predominately going into private cloud (94%) followed by datacentres (88%). One in four respondents said their organization faced impact from malware, privileged user and IOT security incidents The continued uplift in cloud adoption and reinvestment in data center resources has also introduced data breach concerns, as 60% plan to improve access control consistency across hybrid IT environments. While a wide variety of potential secure access exposures were presented to respondents, unauthorized data access, mobile and web exposures, and vulnerable and unsanctioned endpoint device issues plagued UK health institutions. IOT security incidents Correspondingly, one in four respondents said their organization faced impact from malware, privileged user and IOT security incidents. The majority of midsized UK-based service providers cited significant impact with unauthorized application/resource access and use of unauthorized devices, whereas large institutions (those with 5,000 to 10,000 employees) claimed application unavailability/outage as having the highest impact. UK Healthcare providers are embracing mobile computing to improve medical responsiveness The report states, “Despite knowledge of their high impact incidents and access control gaps, a substantial number of respondents are less than confident, notwithstanding large investments in tools and security initiatives. Healthcare organizations’ ability to ‘orchestrate dynamic access authentication and protection’ is also in question, with 68% of respondents expressing little confidence.” UK Healthcare providers are embracing mobile computing and taking advantage of network- and web-connected devices to improve medical responsiveness, delivery and outcomes for their patients. BYOD access enforcement However, a majority (82%) of survey respondents cited mobile computing exposures and weak device access compliance among their top control gaps. Equally concerning is that 70% had nominal confidence in BYOD access enforcement, and 64% expressed similar confidence with IoT devices. As a result, streamlining BYOD and web-based mobile access and enhancing IoT security were expressed among the top priorities for security professionals in healthcare. The vast majority (96%) of respondents expressed a positive outlook towards tool set consolidation The research also illustrated a complex picture of healthcare organizations trying to plug holes and being reactive to threats or changes in IT infrastructures. While the industry seeks to optimize investments, the survey found that UK healthcare IT security practitioners’ use, on average, at least four related tools within each category of secure access. Standardizing integrated platforms The vast majority (96%) of respondents expressed a positive outlook towards tool set consolidation. To this end, over 40% place one or more secure access functions in the hands of managed service providers and plan to increase outsourcing by as much as 7% over the next 18 months. The report states, “With the evolving nature of the sector this is no big surprise with mergers, legacy technologies, modernization and shifts in working patterns and service provision all thrown into a melting pot of change. Healthcare organizations need to think about tool consolidation and standardizing on integrated platforms.” Software Defined Perimeter (SDP) technologies SDP enables trusted access directly between the user and their device to the application and resource Looking at longer term strategy, the report indicates healthy investment to improve access security where the majority (56%) of UK healthcare respondents cited secure access expenditures to rise by 5% to 15% and a third expect spend to increase up to 25%. Of particular note was the interest in Software Defined Perimeter (SDP) technologies, also depicted as Zero Trust Network Access. SDP enables trusted access directly between the user and their device to the application and resource. Like perimeter-based VPN technology, SDP invokes user, device and security state authentication controls before and during an authorized, protected connection. 62% of healthcare security decision makers anticipate an SDP project or pilot within the next 18 months. Security infrastructure consolidation Commenting on the report, Scott Gordon, chief marketing officer for Pulse Secure said, “The findings indicated that while workforce mobility, cloud and IoT security still threaten data privacy and service availability obligations for UK healthcare, these institutions appear to be making appropriate upcoming priorities and investments to reduce secure access risks.” “The report data suggests that hybrid IT adoption and security infrastructure consolidation in the UK healthcare segment is likely over the next few years as new approaches such as Zero Trust Network Access can serve to protect patient care advancements.”
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco Acquired by Private Equity Firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic Spins Off Security Business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify Acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy Year for Acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola Continues Video Push with VaaS Acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE Acquires Access Control Companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy Expands Capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter Going Private and Selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com Expands Commercial Offering with OpenEye Acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimized for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT Makes Multiple Acquisitions, Sells Canadian Operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specializes in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
The new Courtyard by Marriott hotel at London’s Luton Airport is being protected with the latest, cybersecure video surveillance technology from IDIS. The complete end-to-end solution, from Korea’s video equipment manufacturer, is enabling trouble-free remote 24/7 monitoring, ensuring improved service efficiency, safety and security for guests. IDIS DirectIP® technology was chosen for its ease of installation and use together with the reassurance of multi-layered protection against cybersecurity risks. Although the installation team from DGS Systems had never previously worked with IDIS technology before, they found that it lived up to its true plug-and-play promise. Providing impressive recording capability IDIS DirectIP® made it easy to set up the three IDIS NVRs to provide impressive recording capability Despite having almost 100 cameras to set up - including 74 full-HD IR domes and 17 vandal resistant full-HD IR domes – one-click network configuration allowed the engineers to work rapidly, connecting devices easily and not needing to manually enter passwords for each one. This not only reduced installation time but ensured greater protection against network infiltration by minimizing the likelihood of human error, which can occur when passwords need to be written down and entered manually. Encryption technologies and NVR firewalls together with proprietary protocols and file structures make IDIS surveillance solutions less vulnerable to attacks than many common open architecture components. IDIS DirectIP® made it easy to set up the three IDIS NVRs (32-channel DR-6332PS-S) to provide impressive recording capability and meet the customer’s requirement for three months’ storage of all footage. Protecting building exteriors The NVRs’ 370Mbps throughput ensures no latency on live footage and high-quality image capture in full HD. Most of the cameras are used for incident investigation, although with the hotel’s service areas now covered, operational efficiency has been improved too. The hotel’s owner also wanted to protect the car parks and building exteriors to reduce the risk of crime For example, routine checks on the rooftop plant room can now be handled remotely, rather than in person, which is particularly useful during adverse weather conditions. The hotel’s owner also wanted to protect the car parks and building exteriors to reduce the risk of crime, and shortly after the system was completed, a gang of opportunist scrap-metal thieves was recorded stealing cables from the site. Handling rapid variations in brightness The IDIS full-HD IR domes provided video evidence that was key to a successful police investigation, delivering pin-sharp images in all lighting conditions and easily handling rapid variations in brightness and shade thanks to their true wide dynamic range (WDR). “The IDIS solution was very installer-friendly and easy to configure,” says Dariusz Surowy of DGS Systems UK, confirming that the same technology is now being used on more sites. Grzegorz Surowy, MD of DGS Poland, agrees: “It has rapidly proved how well it works with successful incident investigations.” Meanwhile, James Min, Managing Director, IDIS Europe comments that IDIS solutions are designed to be easy to install, simple to use, and to give the lowest total cost of ownership (TCO). “For busy hotels such as the Courtyard by Marriott at Luton, they provide the perfect tool for safety, security and more efficient management.”
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Security of Buenos Aires Province required powerful security tools to assist the local police in patrolling and enhancing the overall level of safety throughout the province. Strong and modern security equipment The Ministry of Security of Buenos Aires authorized the Dahua team to conduct research The Buenos Aires police sought strong and modern security equipment that could monitor the roads during police patrol, while keeping records as evidence. Additionally, they required a management terminal on the dashboard of each patrol car to allow the user to view videos in real time and manage all the surveillance equipment via the system. The technical equipment must be installed in a suitable position to avoid damage in case of car accident or airbag activation, and to ensure passenger safety under adverse conditions, such as weather changes, vehicle temperature shift, etc. After presenting Dahua Mobile Solution that could fulfill the aforementioned requirements, the Ministry of Security of Buenos Aires authorized the Dahua team to conduct research and implementation of this project. Monitoring road conditions The Dahua Mobile Solution covered 400 patrol cars of the Buenos Aires police, each of which was equipped with six HD cameras, including two different models of 2MP Mobile HDCVI IR Dome Camera – HDBW1200F-M and HDBW2241F-M-A, 3MP Network IR Mini-Bullet Camera IPC-HFW1320SP, and 2MP Mobile HDCVI IR Cube Camera HAC-HMW3200. Five cameras were also installed outside each patrol car to monitor road conditions from every angle In addition, five cameras were also installed outside each patrol car to monitor road conditions from every angle: HDBW2241F-M-A on both sides; HDBW2241F-M-A and IPC-HFW1320SP on the front top; and HAC-HMW3200 at the back. All of the products support IP67& IP6K9K, shock-proof, and resistant to vibration and severe weather conditions. HDBW1200F-M was installed inside each car to monitor its situation and regulate police behavior. As part of the requirement, the management terminal was installed at the center of the dashboard and linked to the central server through a 10/100 wired Ethernet connection via an RJ45 connector. Automatic recognition technology In addition to the cameras, Dahua Mobile Video Recorder MXVR4104-GFW was also deployed for efficient video storage. Its embedded GPS positioning allows the user to track the vehicle in real time. In case of emergency, it will trigger the alarm and automatically upload the data on time. It also supports image capturing of suspected vehicles and uploads them to the management platform It also supports image capturing of suspected vehicles and uploads them to the management platform. Indeed, Dahua Technology has launched a smart police car solution to aid the police in identifying suspected vehicles and people. Featuring automatic recognition technology, the new device can compare suspected vehicles and people with the information in its database, achieving efficient mobile control and identification. Mobile video surveillance solution With the implementation of Dahua Mobile Solution, the Buenos Aires police can now manage social security better through a comprehensive monitoring system. The mobile surveillance system with high-definition image quality and other advanced functions enabled the police to obtain first-hand evidence, achieve timely intervention and control dangerous and detrimental activities during their patrolling. This significantly improved their work efficiency, stabilized social order, and helped build a safe and harmonious community. “We are very satisfied with Dahua products. The mobile video surveillance solution used in police cars enables our police to work more efficiently and safely because the surveillance center is available 24 hours a day, providing appropriate assistance in solving various issues or incidents that the police may encounter. ” Said Dr. Ignacio Greco, Deputy Secretary of the Provincial Ministry of Security, Buenos Aires.
Video walls installed in Bristol City Council’s “world class” security operations center by visual display experts Ultimate Visual Solutions (UVS) have completed 25,000 hours of continuous operation. The three video walls are each made up of 55-inch 24/7 grade LCD displays with narrow bezels and are part of a multi-purpose center which brings together some of the city’s critical support services and acts as a control center in the event of a major emergency. The Operations center, which has been operating since February 2017, houses what used to be the council’s Emergency Control Center, Traffic Control Center and Community Safety (CCTV) Control Rooms together in a single space for the first time. Live CCTV images It also installed a conference/incident video wall made up of four display These teams provide essential public safety services that utilize around 700 CCTV cameras in the city. UVS installed a curved video wall made up of 12 displays for monitoring a wide range of data including mapping, traffic monitoring and live CCTV images. It also installed a conference/incident video wall made up of four display, with access to the same data, and a smaller police incident monitoring video wall. Peter Anderson, Head of Connected City Service at Bristol City Council, said, “Having a high-quality and resilient monitoring wall is essential in providing a world class service that’s help keep the city safe, moving and healthy. The monitoring wall provides the technology and framework for effective public space surveillance which is an integral element to provide first class images which can be used to help bring offenders to justice.” Problem-free operation UVS Managing Director Steve Murphy said the ability to provide high quality displays which have operated problem-free was key. He said, “The control center was hailed as world class when it opened and obviously seamless 24/7 operation is of paramount importance. We are delighted to have hit the 25,000 hours milestone and to be part of such an important project, helping to keep the people of Bristol safe.” As well as the video walls UVS also installed two video wall controllers and inputs to allow operational staff and visitors to display tablet and mobile device data on the displays. It also provides an annual maintenance contract. Synectics Synergy VMS platform All video wall control is fully integrated to the Synectics Synergy VMS platform" Steve Murphy added, “The project was won after very detailed technical and commercial evaluation by the end client and their consultants (IBI) including detailed demonstration of the required system functionality. All video wall control is fully integrated to the Synectics Synergy VMS platform. UVS have worked closely with Synectics during the past 12 years, which ensured the seamless integration.” UVS, formerly eyevis UK, is based at Business First Burnley Business Center and provides video wall displays and audio visual solutions to a range of clients across the UK. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. Providing turnkey solutions It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station, to cope with increased demand for its technology. eyevis UK changed its name to Ultimate Visual Solutions (UVS) last September following the acquisition of eyevis GmbH by the Leyard group. The rebranding has allowed the company to offer an expanded range of products and services and remain at the forefront of providing turnkey solutions for all types of audio visual and visual display applications.
Established in 1976, Meghna Group of Industries (MGI) is a conglomerate in Bangladesh. MGI operates out of a large campus in Dhaka that houses its head office, 45 different manufacturing plants, and maintenance workshops, all under one roof. MGI has a turnover of over USD 3 billion, and an employee strength of over 30,000. Being an established and trusted group, it required operations to be suitably monitored, in order to ensure uninterrupted production, adherence to quality standards, and timely delivery of supplies to customers. So far, it had been monitored by manned security, with accompanying risks ranging from damage to assets, misuse of equipment, thefts, leakage of confidential information, employees’ safety, poor record keeping for vehicles entering or exiting the premises, and more. Providing investigation-Friendly monitoring software Enabling IVA at various locations has helped in the monitoring of infrastructure Designing of the solution started with a joint site survey by Videonetics, MGI IT heads, and the system integrator. After extensive research, Videonetics developed a unified solution encompassing Intelligent Video Management Software (IVMS), Intelligent Video Analytics (IVA), and a customized ANPR system to read and capture license plates in Bengali language. Key aspects of the solution included the following: Videonetics’s IVMS has been deployed to help in viewing and recording feeds from over 500 cameras installed in multiple factory locations. This is enabled over IP network in an efficient and elegant way. In addition, the solution provides investigation-friendly monitoring software at the front-end, while relegating all the complexity of the server software to the back-end. Enabling IVA at various locations has helped in the monitoring of infrastructure, vehicles, people, crowds and objects, for automatic detection and analysis of events of interest. Manned security to address safety The operators get a bird’s eye view of various sites from their centralized location, enabling them to respond quickly and effectively when an incident occurs. The solution has been installed on Red Hat® Enterprise Linux® which makes the overall system more secure and maintainable. Videonetics’s Automatic Number Plate Recognition (ANPR) system has been customized to read license plates in Bengali. Regardless of the lighting conditions, the Bengali ANPR accurately captures with timestamp the license plate of any vehicle as it appears in the camera’s field of view (FoV). The new implementation enables security operators to be deployed at the unified interface In addition, the system is integrated with the IVMS at the command and control center, for viewing and analyzing vehicular movements, and taking action, if required. THE IMPACT Prior to the installation of Videonetics’s solution, MGI used to rely on manned security to address safety, security and operational risks. However, the new implementation enables security operators to be deployed at the unified interface, for monitoring multiple sites such as assembly plant, warehouse, process, dispatch area, vehicle movement, and so on. Personal protection equipment detection So now, MGI operators can handle incidents of thefts, potential break-ins, unauthorized intrusions, and conduct investigations, without having to leave their desks. This has helped MGI in maximizing resources and significantly reducing costs. But the biggest benefit has been to be able to provide a safer environment to its employees, and to secure its workplaces with optimization in day-to-day operations. The open architecture of the solution allows MGI to continue adding, in a single interface, more AI & DL powered applications such as personal protection equipment detection, facial recognition, fire & smoke detection, workers slip/ fall detection, workers head count, vehicle movement management, to name a few. This makes it possible for the company to address all its security concerns with a holistic approach.
Use of iTrak solution by casino operators in both Macau and Las Vegas for reporting, security and loss prevention expands Omnigo’s global footprint. Omnigo’s security system “One of the major benefits of penetrating a market like Macau with Omnigo’s security system is that casinos can draw from a shared database of banned patrons, advantaged players, and VIP guests from Day One of implementation,” said Mark Kornegay, CRO of Omnigo Software. He adds, “Sharing data across properties enhances security and surveillance for everyone by allowing casino operators to exchange critical information with each other and with law enforcement.” Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting iTrak security solution Omnigo’s iTrak allows casino operators to protect their staff, patrons, property and assets while streamlining reporting and data analysis. Casinos can function more efficiently using iTrak thanks to its simplified reporting and notification process. The system also empowers casino employees to leverage data-driven security intelligence to address incidents in real-time, track persons of interest and mitigate risk and exposure to liability. Various modules within iTrak include Facial Recognition, Visitor Management, Lost and Found and more. Security and risk management system In addition to the Macau expansion, Omnigo’s casino portfolio also includes 100% of the Las Vegas Strip casinos and 65% of the Canadian gaming market. Each casino uses iTrak, Omnigo’s security and risk management system for incident reporting, property surveillance and security and loss prevention. “It’s a true testimony that these casino operators have put their full confidence into Omnigo’s offerings to keep their properties safe. With that level of trust, we’re able to prioritize innovation and bring the latest technology like facial recognition software and advanced data analytics to market faster for our customers, both large and small,” Kornegay added.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honored to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals