Buildings or sites with existing or future Nedap access control systems can now benefit from integration with Forge Bluepoint visitor management to give people visiting their space smart, secure and time-limited access. Integration with Forge Bluepoint The new integration was customer-driven by HB Reavis’s new building in Bratislava, Nivy Tower, which went live in November. Wayne Lee, Director at Forge, said “We’re excited about this partnership and being able to offer our c...
As International Security Week (ISWeek), 30 November – 3 December 2020, draws closer, experienced names in the industry are preparing to join together to dissect recent incidents of terrorism and how to combat extremism while protecting national assets. International Security Week The International Security Week marks five years since the shocking series of coordinated terrorist attacks across Paris, France which tragically killed 130 people. Recent incidents in Nice, France and Vienna,...
Mobile Communications America (MCA), the foremost provider of voice, video, and data solutions that enhance the safety, security, and operating efficiency of workplaces announces the addition of S3 Integration, LLC (S3), a front-runner in integrated security management systems, life safety systems, and IT solutions and services. Safety and security industry Headquartered in Baltimore, Maryland since 1996, S3 is a market front-runner in the safety and security industry with a geographic presenc...
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Intelligent video appliances The Razberi product line of intelligent video appliances, automated security software,...
Axis Communications announces the upcoming launch of AXIS Object Analytics. This intelligent video analytics application offers detection and classification of humans and vehicles tailored to the surveillance need. Ideal for various installations including public buildings, warehouses, and parking lots, it will be offered pre installed on compatible Axis network cameras, adding value at no extra cost. Designed with a straightforward interface, tailored scenarios are easily set up with only a few...
With system designers having so many options when it comes to specifying the most appropriate cameras to monitor large areas, Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, provides an overview of the merits of some of the most suitable camera formats. PTZ cameras PTZ cameras have traditionally been used for city and wide area surveillance applications such as airports, car parks, shopping centers, sports stadia and warehouses, with operators able to track the movemen...
The new Wisenet TNV-8010C 5-megapixel corner mount camera has been built to make it impossible for a ligature to be tied around it, as well as very difficult for someone to rip it off a wall. Although primarily intended to assist police, prison and mental health institutions in preventing inmates and patients from self-harming within secure room environments, the vandal-resistant and water-proof TNV-8010C also offers a robust solution for other demanding applications, such as the monitoring of activity at ATMs and within lifts. Sharp color images With a wide field of view and a -7~+7° tilt range, the TNV-8010C features Hallway View which enables the camera to capture 5-megapixel images in a 3:4 aspect ratio and 2-megapixel in a 9:16 aspect ratio, thus enabling users to more effectively monitor tall and narrow spaces, such as corridors. The TNV-8010C is equipped with Wide Dynamic Range (WDR) technology that performs at up to 120dB As a true day/night camera which is able to capture clear, sharp color images when the ambient light level is as low as 0.1lux, the TNV-8010C is equipped with Wide Dynamic Range (WDR) technology that performs at up to 120dB to accurately produce images in scenes that simultaneously contain very bright and very dark areas. Intelligent Video Analytics Key Features IP66, IP6K9K and IK10+ vandal resistant. Optional aesthetically pleasing brushed stainless steel cover. Bi-directional audio support. Built-in alarm input/output (I/O). A suite of built-in Intelligent Video Analytics (IVA) includes defocus detection, directional detection, motion detection, enter/exit, virtual line and audio detection, as well as tampering detection which will generate an alert if someone attacks the camera. Support for WiseStream II complementary compression technology, as well as H.265, H.264 and MJPEG compression formats. Bandwidth efficiency is improved by up to 75% compared to current H.264 technology when WiseStream II is combined with H.265 compression. Micro SD/SDHC/SDXC slot. Up to 128GB of video or data can be stored on-board the camera should there be disruption to the network. Video of any incidents, which potentially might have been lost, can therefore be retrieved when the network connection has been restored. Power over Ethernet (PoE) which negates the need to install a power supply and separate cabling for the camera. 3 magnet points, which lock the camera’s module into its anti-ligature cover, makes installation quick and easy. Installing dome camera “As is the case with our previously introduced 3-megapixel TNV-7010RC corner mount camera which has built-in IR illumination, considerable thought has gone into the design of the TNV-8010C,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “In addition to preventing a ligature being tied around it, the TNV-7010RC’s is also considerably smaller than its predecessor. As such, it will fit neatly into a corner of a room or lift and offer a more attractive option to installing a dome camera in the same location.”
Quantum Corp. unveils the all-new data and storage management platform - Quantum ATFS. It is the first network-attached storage platform to integrate real-time data classification and insights with the needs of applications, determining how storage resources are allocated and consumed. Data insights enable organizations to visualize data without the constraints of a file system, automate purposeful data placement based on policies, and optimize resources using just-in-time data movement policies. The ability to support the needs of data and applications on premise or in the cloud advances Quantum’s strategy to be the provider of management and storage services for unstructured data anywhere. Crawling file systems “The engineering teams at Quantum worked with storage experts to address the many challenges IT teams face with growing storage needs. They designed an innovative and unchained solution with cutting edge technology, data provenance and analytics to provide a storage platform that works for IT, instead of IT that works for storage,” noted Jeffrey McDonald, PhD, Director of Information Technology, The Hormel Institute. Customers are performing ‘unnatural acts’ to manage their data – guessing at capacity and where data lives, or crawling file systems for days to find what is needed by the business. They are often uncertain about what they can delete and when they can delete it. The results are silos of data, and a loss of control and visibility. Optimizing storage resource ATFS delivers a consistent end user experience to deploy resources on premise or in the cloud ATFS (All-Terrain File System) meets this challenge. It is designed to ensure just-in-time purposeful placement of data, meeting the performance, resiliency, availability, and access demands of applications and workflows. As a result, ATFS delivers a consistent end user experience to deploy resources on premise or in the cloud. By leveraging data classification, metadata and business-oriented tagging to streamline and optimize storage resource consumption, ATFS transforms storage economics, eliminating the premium organizations pay for performance. It is designed to manage hardware resources as a service to the application when and where it is needed it at scale. Achieving greater efficiencies “The ATFS system we have at 5 Guys Named Moe is the backbone of our extremely high bandwidth cloud data migration work,” said Eric A. Reid, Head of Post-Production, 5 Guys Named Moe, Inc. “Utilizing the metadata tagging built into the ATFS platform allows us to prioritize data efficiently and make sure that NVMe space is automatically allocated to the most resource intensive tasks without any manual input. This reduces costs overall while ensuring we have the right balance of storage space and high-end performance available for our workflows.” ATFS ingests data, which can be placed into flash, bulk, or the cloud based on policies, application defined tags, or manually. Performance may be tuned based on the size of the active data set. Automated policies place data ‘just-in-time’ to support workloads while achieving greater efficiencies and improved productivity per unit of storage. Asset management tools By automating data classification and placement, ATFS serves a wide range of use cases: Automate Application Workflows: Integrate with asset management tools, schedulers, and other applications to automate tasks using API in life sciences, media and entertainment, finance, and more. Active Data Retention: Metadata and tags simplify access to data over time. Deploy Resources in the Cloud: Burst into the cloud using cloud-based applications or use ATFS for large data set retention. Collaboration: Secure data sharing across the organization and externally without creating duplicates. Control Data: Execute on retention, protection, and access guidelines per regulations, best practices, to ensure data. Providing deeper insights ATFS is available to order beginning this December as software installed on a Quantum appliance ATFS is available to order beginning this December as software installed on a Quantum appliance. Scott Sinclaire, Senior Analyst, ESG: “Cloud adoption continues to accelerate, as businesses demand greater elasticity from their storage resources, their compute capabilities, and their budgets. ATFS is designed for this new data landscape, to provide businesses with the insight necessary to extract value from their unstructured data.” Ed Fiore, General Manager, Primary Storage at Quantum: “For customers with millions or billions of files, classifying those files so they can be organized, searched, and then placed based on rules is a key advancement toward getting control of massive unstructured data sprawl. We designed the ATFS platform to address these challenges, to align an application’s needs with storage resources in real time, and to provide deeper insights into data.” Unique industry perspectives Quantum will host VirtualQ | Transform, an online forum for unlocking the value of unstructured data, November 17th in Europe, and November 19th in North America. The company will showcase the latest offerings to capture, store, manage, protect, and archive unstructured data in all its forms. Participants will gain unique industry perspectives on the forces and trends shaping Quantum’s technology roadmap and get exclusive access to executives, as well as product and technical leaders.
Videonetics, AI & DL powered Unified Video Computing Platform™ development company, proudly announces technology integration with RBH Access, manufacturer of access control, and security management systems. User benefits from the integration Built on the powerful integration framework between Videonetics Intelligent Video Management Software (VMS) and RBH AxiomX Alarm Management Suite, the users are empowered to gain end-to-end control over the physical access points through one centralized interface. The seamless integration allows visual verification of the person, captures events as they happen, and the ability to respond immediately, from the user-friendly GUI of Intelligent VMS. Functions and controls At the time of the incident, the operators will be notified with an alert and they can leverage the full power of both RBH AxiomX and Videonetics IVMS to quickly lock/unlock doors, control cameras, retrieve live video, and much more. Henceforth, they are equipped to make decisions, after conducting investigations of specific access points using video evidence, analyze patterns, and generate reports. The user can manage access rights with live videos and real-time notifications using Intelligent VMS desktop, web, and mobile clients. Simplified security operation at reduced TCO Customers benefit from reduced TCO by only upgrading the surveillance system Best suited for all sizes of installations with scalability, the integrated solution simplifies security operations and enhances safety measures of the businesses. Moreover, customers will also benefit from reducing the total cost of ownership due to only upgrading the surveillance system, rather than adding multiple hardware components. Authorities statement “We are delighted to have solidified our partnership and further deepens our long-standing relationship with RBH Access, bringing true value to our joint customers and partners. Combining our IVMS with RBH Alarm Management Suite will help them to design highly efficient surveillance solutions for both public and private sectors across the world.” “Built on open architecture, the unified solution delivers powerful, effective, and robust intelligence to our customers, eventually increasing both security and situational awareness of the site,” expressed Avinash J. Trivedi, VP – Business Development of Videonetics. “I see Videonetics as one of the fastest-growing Indian companies in security systems. We are proud to get this integration working. I see in the near future we will work on many large opportunities where customers are demanding and want integrated solutions. Biggest synergy I see both the companies believe in giving customized solutions to users,” said Vinay Vashishta, Director Operations, South Asia, RBH Access.
Integrated Design Limited (IDL) has developed a new cost-effective and rapidly deployable entrance control solution that can help business owners adhere to COVID-19 social distancing guidelines and help keep staff and customers safe. Based on existing, proven technology, the Integrated Design Limited’s customized Door Detective Compact entrance control solution has been adapted to enable robust and straightforward population monitoring and control at single entrance doorways. Door Detective Compact solution The Door Detective Compact solution is ideal for a range of workplaces, such as offices, especially for shared kitchen facilities or toilets, small retail stores, factories, leisure facilities, and colleges, etc. or any other work environment where the maximum capacity needs to be controlled to prevent overcrowding. Installed on either side of a door frame or placed on both sides of an entrance on stands, Door Detective Compact units monitor the doorway using infrared optical technology and detect pedestrian movement in either direction. Real-time population monitoring and detection Using the newly developed control box, a maximum population threshold limit is set Using the newly developed control box, a maximum population threshold limit is set. As people walk in and out of the monitored area, the real-time population is detected and displayed on the control box, along with the maximum number of people permitted in the space at any one time, with lights and alarms used to provide alerts when safe numbers are exceeded. If the population is at a safe number, the units display green lights indicating that further people can enter. Should the population count reach the set threshold limit, the Door Detective Compact units turn red, providing a warning that no further people should enter. If the maximum limit is exceeded, the units flash red and an audible alarm sounds to indicate that numbers need to be reduced to a safe level. As people leave the monitored area, the population count decreases and the units return to green, to signal that it is safe for further people to enter. Small footprint, aesthetic design The rectangular stainless steel enclosures of the Door Detective Compact have a small footprint and offer an aesthetically pleasing two-tone design to complement multiple types of décor, while still maintaining its market-renowned performance. Tony Smith, Major Accounts and Marketing Manager at Integrated Design Limited (IDL), stated “Businesses which require their staff to be physically present, whether that be in an office, a factory, a retail store, or other, have been looking for ways to control the number of people it is safe to have in their premises, or particular areas within their premises, at any one time.” Tony adds, “We have developed a rapidly deployable and cost-effective solution which is, in essence, a ‘plug-and-play’ population counter which doesn’t require any complex installation and can be set up in around 15 minutes, to help business owners keep their staff and customers safe by preventing overcrowding.”
Renowned risk management company, SmartWater Technology Limited (The SmartWater Group), has teamed up with Vantage England & Wales to help protect its agricultural customers from rural crime. As a result of the partnership, SmartWater Technology, a division of The SmartWater Group, will supply forensic marking liquid for Vantage’s Trimble agricultural portfolio, including advanced navigation and machine control systems designed specifically for farming use. SmartTrace liquid Each Trimble product comes with a bottle of SmartTrace liquid with a unique forensic code. All the user needs to do is to apply this to their asset using the syringe provided and register the individual code on the national database. Also provided with the SmartTrace liquid are deterrent stickers that can be applied to each of the Trimble brand products. If in the event a stolen item is recovered it can instantly be tracked back to its owners via the database, which is accessible to the police. Gary Higgins, Chief Operations Officer (COO) of SmartWater Technology division, stated “We are delighted to be working with and supporting Vantage England and Wales with this industry first venture. Valuable assets will now be forensically marked, making them uniquely identifiable and therefore less attractive to thieves.” SmartWater forensic solution We chose SmartWater as it is used in many industries including banking, retail and construction" Gary adds, “With hundreds of criminal convictions to date and a 100% conviction rate in court, criminals are aware of the power of SmartWater to categorically link them to their crimes.” Mark Griffiths, National Sales Manager at Vantage England & Wales Ltd, said “We at Vantage needed a deterrent to protect our customers’ equipment, we chose SmartWater as it is used in many industries including banking, retail and construction. Being able to apply a product meeting specification for these industries and bringing it to UK agriculture made complete sense and has been well received by our customers.” Compliance with HO Forensic Science Code of Practice Mark adds, “Our product association with SmartWater will not only deter thieves, but it gives our customers confidence that we can support them throughout the process should the worst happen.” SmartWater forensic solution is currently the only system that is compliant with the HO Forensic Science Regulators Code of Practice, which means it is admissible in Court as evidence. Rural crime in England hit an eight-year peak last year, rising by 9% on the previous year. Costing businesses around £46m in losses, the rise was partially driven by organized gangs targeting expensive vehicles, such tractors and quad bikes.
Cash infusion will help accelerate the installation of its proprietary weapons detection platform in schools, commercial buildings, and government sites ZeroEyes, the only AI-based platform focused solely on weapons detection, announced that it has secured $1.5 million in funding, led by Grateful Investments with participation from Legion Capital, Backswing Ventures, Natoma Group, and angel investors, bringing the total amount raised to $4 million. The majority of the round was raised in March, and ZeroEyes will use the funds to propel its growth and its vision of stopping violent threats before they occur. weapons detection solution Founded by a team of former Navy SEALs and military veterans, ZeroEyes’ AI weapons detection solution is currently installed in schools, commercial buildings, and government sites, with many more pilots underway. With this additional funding, ZeroEyes will further expand the adoption of its technology across the country and enable the company to move to a larger, dedicated facility to demonstrate its platform to prospects, partners, and customers. “This year we’ve seen exponential interest in our technology, as we’ve piloted and validated our solution as a clear, cost-effective and proactive way to detect weapons, stop violent threats and keep people safe,” said Mike Lahiff, CEO of ZeroEyes. “With gun violence - particularly active shooter incidents - continuing to increase each year at alarming rates, the funding will enable us to accelerate our installations across a broad spectrum of customers, at scale.” AI technology AI weapons detection platform sights where a threat is in real-timeZeroEyes’ AI weapons detection platform is one component of an organization’s multi-tiered security approach and integrates with an organization’s existing camera systems and video analytics. If a visible gun is detected, an alert is initially sent to the ZeroEyes monitoring team, followed by notifications to local emergency dispatch and onsite security staff, a process that takes a mere three to five seconds. By seeing exactly where a threat is in real-time, ZeroEyes closes the critical seconds between when a gun could be spotted to when it is fired, saving lives. “Our focus is simple: work with early stage companies that have a sound business model and compelling purpose,” said Ted McCullough, Founding Partner at Grateful Investments. “The ZeroEyes team’s decades of combined military experience, and steadfast commitment to addressing the mass shooting tragedies that are far too commonplace today is a cause we are honored to support.” “ZeroEyes’ growth is a testament to the caliber of the team, its unique and proprietary technology, and its real-world application to addressing a critical and sobering issue,” said Michael Viscuso, Managing Partner at Legion Capital Partners. “We look forward to ZeroEyes’ continual expansion in public venues across the country in the months and years to come.”
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco Acquired by Private Equity Firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic Spins Off Security Business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify Acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy Year for Acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola Continues Video Push with VaaS Acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE Acquires Access Control Companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy Expands Capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter Going Private and Selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com Expands Commercial Offering with OpenEye Acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimized for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT Makes Multiple Acquisitions, Sells Canadian Operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specializes in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based Analysis Software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot Identification Software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated Security Systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Public Safety Access Points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller Recruitment Program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. The system determines the location of shots fired, the number of shots, and the type In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges For Securing A School Environment Multiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ cameras Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent Cameras With Video Analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video Cameras With Low-Light Capability It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. There are video cameras available with extreme low-light capability to see in near-dark or complete darkness Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
With traffic levels constantly rising, cities around the world are looking for ways to manage the sheer number of traffic on their roads. The city of Chorzow in southern Poland wanted to go a step further and provide information to streamline their public transport on the roads, as well as regular vehicles. They approached Sprint, a systems integrator in Poland, who delivered an intelligent traffic management solution using Hikvision technology. City municipal Board of Streets and Bridges in Chorzów (MZUiM – Miejski Zarząd Ulic i Mostów) an organizational unit of the city is responsible for the management of public roads in Chorzów. Offering image stabilisation The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System. The department had extensive requirements for this complex system to truly meet its needs. Firstly, they needed to be able to recognize number plates efficiently, even at high speeds of up to 250 km/h. Further the system needed to be able to classify the vehicles. The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System Secondly, the cameras used needed to have a high image quality and also to have some aesthetic quality, as they would be mounted all over the city, sometimes in prominent places. The ability of the cameras to maintain a high image quality in low light conditions, and to offer image stabilisation were also important for this project. Traffic management system The system needed to effectively monitor traffic on major roads and intersections throughout the city. It would be used for a variety of activities – from verifying accidents to tracking truck routes. A high priority for the solution was to create a traffic management system in the city, taking into account relevant data submitted to the Traffic Control Centre. With this, the MZUiM could optimize signaling work and create priority for public transport vehicles. Chorzów’s Traffic Management System using Hikvision ANPR intelligent cameras other supporting CCTV was installed by Sprint in 2019. The system used the DarkFighter Network Speed Dome PTZ camera (DS-2DF6A236X-AEL) in key areas. This camera has high sensitivity in low light levels, image stabilisation and rapid focus, making it ideal for the position. Client-server system platform They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections, to capture all the access roads to the intersection. These also come with lower infrastructure costs, since they combine four cameras into one. They also look pretty good! Footage from the cameras was recorded using 5 4K NVRs (DS-9632NI-I16) and it was all brought together using the HikCentral client-server system platform. But perhaps the real hero in the system was the ANPR technology. ANPR data from the ANPR Checkpoint Capture Unit (iDS-TCV300) provided key data to meet the project’s needs. This included recognition of registration numbers up to a speed of 250 km/h, recognition of overloaded vehicles, and vehicle classification. The system was also designed to integrate the information transmitted from induction loops embedded in the roads, which register a vehicle as it drives over them. Intelligent management software Łukasz Cysewski, Project Manager at Sprint, says: “Hikvision’s solutions in the field of intelligent ANPR cameras and CCTV best corresponded to the project requirements. Specifically, we were impressed with the scope of implemented functions and effectiveness of the ANPR cameras, image quality and overall management of the CCTV system. Hikvision also offered a high level of support to integrate the smart cameras with our intelligent management software.” The system gave Chorzów the ability to monitor their traffic in one place. This brought a raft of benefits, like automatic detection of road offenses, and allowing the department to prioritise public transport for a quicker journey. It also allowed Police to track suspicious vehicles, with integration into their Smart City platform.
City Security Services has adopted workforce management software SmartTask to support its ambitious growth plans within the UK. The bespoke security solutions specialist will use SmartTask to better manage and safeguard its team of 650 officers that handle a wide range of static, mobile, reception and firewatch services at over 100 sites across London and the home counties. “Our aim is to create a successful guarding business through acquisitions and organic growth, so it is essential that we have the tools in place to support this process,” explains Roberto Baldacci, Director at City Security Services. Workforce management capabilities “SmartTask will become an important part of our IT infrastructure, providing a highly-scalable workforce management solution that ensures we continue to deliver consistent and quality security services across our expanding nationwide footprint.” The company undertook a detailed review of the marketplace and opted for SmartTask The lead company in the group recognized the need to upgrade its workforce management capabilities to reflect its aspirations moving forward. Its previous systems had lacked the flexibility and functionality to continue providing client-focused security services as the business grows. As a result, the company undertook a detailed review of the marketplace and opted for SmartTask based on the software’s ease-of-use, proven success in the security sector, and development roadmap. Improving incident reporting SmartTask will be used throughout City Security Services’ operation, helping to streamline and automate employee scheduling, proof of attendance and live monitoring processes. Most of security team will have a SmartTask-enabled smartphone – allowing them to receive rosters, book on and off shifts, and make check calls – with the remainder using a dedicated IVR number to confirm status. Electronic forms will also improve incident reporting, enabling security officers to capture critical information and photo evidence through the app, which can then be quickly shared internally and with the customer. City Security Services’ central control room will have a real-time overview of the status and welfare of all security officers, so it can have full visibility of performance and respond quickly to any issues. Reviewing financial performance City Security Services will be using SmartTask to differentiate its offering and win more business In addition, operations and HR managers will all have controlled access to relevant reports and operational data, while payroll will be able to take advantage of accurate timesheets and holiday accrual information to save time and avoid errors. The company has already enhanced its profitability reporting using SmartTask, making it possible to effectively review financial performance by client or individual site. With growing demand for operational data from customers, City Security Services will be using SmartTask to differentiate its offering and win more business. A number of customer sites are already using checkpoint tags, which can be scanned with a smartphone by security officers on patrol to capture time and attendance details. Advanced security technologies Meanwhile, the company is working towards launching an online portal for clients to access real-time and historical information for their individual security service. “We are always seeking to use advanced security technologies that benefit both our customers and the business. This helps us to provide a personal, proactive and adaptable service in the most efficient manner possible.” “SmartTask has everything we are looking for in a workforce management solution – backed by a great team, committed to ongoing development – so we are confident the software will enable us to improve transparency and continue to drive standards within the industry,” concludes Roberto.
The new CCTV system installed by WLS at Vauxhall City Farm, is according to its Chief Executive, Monica Tyler, being used to its full potential to ensure that the 50,000 visitors who visit the farm every year, are able to safely enjoy all its facilities. “Our previous CCTV was well past its ‘use-by’ date. Although it was still working, it lacked the functionality we needed to ensure around the clock security of our animals and property, as well as ensuring compliance with our health & safety procedures,” said Monica. Central urban farms “The new CCTV system, generously donated and installed by WLS, has transformed our working lives by providing us with peace of mind in knowing we can monitor every area of the farm, including our recently opened eco-garden, without any blind spots.” “The quality of the images captured by the Dahua cameras enable us to see close up detail of any activity or incident, whilst I and other colleagues are able to use an app running on our mobile phones to remotely keep an eye on the farm when it is closed and if there is an alarm event.” Located within earshot of Big Ben, Vauxhall City Farm is one of the oldest and most central urban farms in London. Local and wider communities The farm was established in 1976 when a group of architects began working on a vacant plot of land The farm was established in 1976 when a group of architects began working on a vacant plot of land and made it available to local residents for them to grow vegetables and care for livestock. From those humble beginnings, the farm has continually grown and is now the home for over 100 animals, a riding center and a cafe, and with the enthusiastic support of a large team of volunteers, conducts dozens of education and youth projects. As a registered charity, the farm’s main objectives are to enhance the health, well-being and life chances of children and disadvantaged people, as well as create enjoyment and recreational opportunities for those from our local and wider communities. Intruder detection systems WLS’s connection with Vauxhall City Farm spans over 15 years, during which it has installed and maintained the farm’s fire and intruder detection systems, as well as the now superseded CCTV system. Alison Ewen, the wife of WLS’s managing director, also has a close bond with the farm. Having been a volunteer for over 20 years, Alison has been appointed a trustee specializing in Riding for the Disabled activities. “As a company which has enjoyed considerable success installing a great number of electronic security solutions across London, we believe we have a corporate responsibility to give something back to the community,” said Jeremy Ewen. “We have welcomed the opportunity to do so by supporting a charity which we have such high regard for, in respect of the support, education and enjoyment it gives to so many people.”
Location monitoring and personal safety specialist, Vismo has announced that its app, Vismo App helped users during the recent protests in Portland, Oregon, by guiding them to safety in offices and hotels, after they had activated the panic button on their app, while on their way to or from their place of work. “Vismo is no stranger to being used to protect employees in potentially harmful situations,” said Craig Swallow, Vismo Chief Executive Officer (CEO), adding “And in the past few months our app has proved invaluable to users who were at risk of being caught up in some of the hundreds of protests that have taken place in Portland, and elsewhere.” Vismo App The Vismo App alerted security teams immediately, as soon as users pressed its panic button The Vismo App, used by staff of many FTSE 100 and Fortune 500 companies as a duty of care precaution by their employers, alerted security teams immediately, as soon as users pressed its panic button. The teams received the alert via text, email and an automated phone call, and quickly reacted to users’ situations, by using Vismo’s secure portal to identify a place of safety for them. In addition, the teams quickly received an audio clip, sent automatically from the users’ smartphones, which allowed them to get a clearer understanding of the situations at hand. Extensive deployment and use of app “In these instances, the safest places were hotels and offices unaffected, and likely to remain unaffected, by protests,” said Craig Swallow, adding “Security teams were able to monitor users’ movements and their precise location, and stay in contact with them throughout, from the moment they gave them advice on where to go until they had reached a place of safety. Then, until they reached home or work.” Although the Vismo App is used by staff of many large and medium size companies, typically in the oil and gas, healthcare and retail sectors, other employers who have achieved significant benefits include NGOs, whose staff and volunteers can work in extreme at-risk situations and media companies, whose reporters and camera operators can likewise be at extreme risk, in locations around the world. Key features of the Vismo App and portal Via the Vismo secure portal, security teams can place virtual geo-fences around areas of high-risk or safety Via the Vismo secure portal, and as part of its incident management capability, security teams can place virtual geo-fences around areas of high-risk or safety, depending on where app users are and/or will be. When users enter or exit these areas, the security teams will receive an automatic text and email alert of this movement, allowing them to take immediate and necessary actions to ensure the users are as safe as possible. To help identify potentially dangerous areas/neighborhoods, organizations’ security teams can add points of interest (POI) to a map on the portal to help protect employees and denote safe places (e.g. approved hotels or office locations). Individual points of interest, POIs can be added by a team, to take account of specific areas which are relevant to the organization. These POIs can include known high-risk areas and safe havens. Reliable and efficient way of mass communication Vital information can be communicated to app users to avoid troublesome areas or guide them to a safe destination. Vismo provides organizations with a reliable and efficient way of communicating with any number of employees, for example during an unfolding unstable situation in a specific geographic area by providing mass notification service. These notifications can include a personalized message with response options to quickly see if anyone requires assistance. Notifications can be sent via text, email, in-app and an automated phone call, which can be set to loop continuously until a response is received.
As a multi-faceted community with several buildings, public safety services, healthcare facilities, schools, childcare, barracks, a commissary and a visitor’s center, a typical U.S. Military base is a city in itself. Beyond the protection of armed forces personnel, the base is responsible for the safety of many civilians and civil servants. With such high standards and complex needs, U.S Military bases recognize the need for intelligent security systems that enable proactive monitoring, provide fast and smart forensics and comply with NDAA Section 889. Challenges faced by the US Military Base Inadequate situational awareness - The size and diversity of the military base pose a challenge. Past security measures led to gaps in coverage, leaving the base vulnerable to both internal and external threats. In addition, the COVID-19 pandemic created the need for increased situational awareness. Without a real-time and dynamic understanding of the environment, it became increasingly difficult to enforce preventative measures to control and mitigate the risk of transmission. Slow incident response time - Speed is critical. Within the confines of the military base, the consequences of slow incident response time can be devastating and even sometimes deadly. The longer it takes for the Security Operation Center (SOC) to gather, understand, and analyze the details of the incident, the greater the threat becomes. It became clear that responding to an Active Shooter, vehicle breach, or an assault, required immediate action that wasn’t available through their existing technology. Limited real-time analytic capabilities - The base wanted to prevent incidents from occurring rather than reacting after an incident has occurred. The traditional method of receiving an emergency call and responding after the fact was too costly. The US Base needed a platform that would provide the security team with automation notifications and alerts based on anomalies and rule-violations that were captured on video. NDAA-889 compliance - All military bases must meet the NDAA-889 compliance which states that the U.S. Government has banned specific telecommunications and video surveillance equipment utilising chips manufactured in China. Government contractors must help agencies remove/ replace banned equipment by Aug 12, 2021. Why Ava? One U.S. Military Base recently turned to Ava for an end-to-end intelligent security solution that would meet its full range of needs. Their requirements were a platform that was: Proactive - When there is a need to respond to a threat, the response needed to be immediate. Precise - On a base of this size, it was critical to pinpoint the exact location and nature of a security event in seconds - not hours or days. Simple - The system needed be straightforward to implement, manage and use within the existing infrastructure and cameras. Ease of use saves time and lives. Scalable - The system needed to be able to scale to thousands of cameras. Protecting military personnel and staff at the base Using Ava, operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights Ava understood that the ability to protect military personnel and civilians that run the US Military Base is of utmost importance with even seconds being critical. Ava’s wicked-fast and smart forensic searches and powerful analytics transform the manually intensive examination of massive surveillance footage into accurate and useful results within mere minutes. Security operators are using powerful appearance, event, or image search functions to narrow down and track people or objects of interest. Using Ava, security operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights. Each map can be configured and includes camera views, alarm views, as well as the ability to track people and objects as they move around the campus. Only Ava could meet their challenges by providing: Advanced Situational Awareness: Powered by Ava’s Smart Presence, the company’s use of AI and machine learning allows security personnel and operators to detect anything unusual at any time. Ava Aware VMS understands perimeters and behaviours, identifies, classifies, and tracks people of interest, vehicles, or other objects to send alerts before threats escalate. Operators now receive immediate alerts on unidentified loud noises including the exact source of the sound through microphones. The US Military Base’s security teams are now able to stop threatening actions, before there is damage to property or people. Rapid Incident Response: Powered by Ava’s Spotlight, video streams change dynamically to bring only the relevant feeds to the attention of the operator. Real-time alerts and notifications show up on the video wall to describe the incident, the time, and place it occurred. Using Ava’s Smart Search, the base is able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities to comb through countless hours of video within seconds. Real-time Analytics: Ava provided the US Military Base with threat detection and notifications in real-time and uses intelligent algorithms and self-learning to detect abnormal behavior. The platform will alert the base’s security operators in real-time. It will intelligently highlight what’s relevant from all of the US Base’s cameras, in real-time, all the time. NDAA Compliant - Ava’s video hardware is TAA (Trade Agreement Act) Compliant, enabling any base to be fully NDAA 889 compliant. Ava’s solution provided operational efficiencies, such as: Seamless integration with existing cameras - Whether a military base is replacing all or some of their cameras, Ava Aware VMS easily integrates into and enhances existing cameras with the same AI capabilities. Now, existing ONVIF cameras are enhanced with analytics such as object detection, people and vehicle count, similarity based searching and more. By linking all existing cameras into a larger, AI-based video analytic platform, the base can leverage these powerful analytics across ‘all the cameras, all the time’. Access Control Integration - Ava’s solution easily integrates into access control, remote monitoring, and existing infrastructure. Monitoring the entire military base can be done as part of a single video management system. Scalable - The platform can easily be clustered to meet the growing needs of a base, from hundreds to thousands of cameras. Deployment simplicity - Ava’s system is designed for overall simplicity and readiness for deployment. With security cameras that were ready to go, fully loaded with out-of-the-box Ava Aware software, the base could easily replace cameras in a phased implementation, minimizing installation time and eliminating downtime. Ava’s simplified licensing/pricing model further simplified deployment. Plug and play configuration Plug and play configuration removes the need for user names and passwords The same simplicity extends to maintaining scalable management within a base’s group configuration policies. Plug and play configuration removes the need for user names and passwords, pre-configuration steps, and default settings. And finally, the base chose the Ava system for its general ease of use. Security operators now have access to detailed camera information, activity logs, and advanced video adjustments in a single, user-friendly screen view. Set up for success with intelligent video security The US Military Base is now set up for success with an end-to-end intelligent video security system that will scale with their needs. Highlights include: Camera installation, which will put the base into full compliance with NDAA-889. The US Military Base now has the highest level of security, to protect against the vulnerabilities of the connected world. The equipment has end-to-end encryption, factory-installed certificates, and records detailed audit trails of both operators and administrators to assist with any other compliance requirements. Security operators have gone from having ‘data overload’ to easily and quickly accessing ‘actionable insights’ to drive more confident and proactive security decisions. By leveraging powerful analytics, the base’s operators are able to respond in real-time and investigate incidents faster and with fewer resources. Operators are able to act on the system’s identification of objects, events, anomalies, and similarities that detect issues as they unfold. Furthermore, operators also have full occupancy insight to manage the flow of people and traffic across the base, in support of COVID-19 rules and regulations. Ava Smart Presence includes a people and vehicle counter to track objects in real-time, allowing for historical analysis and reporting. Configurable maps of all locations provide instant situational awareness and insights. The US Military Base seamlessly integrated the new system with existing access controls and non-banned cameras to cost-effectively meet the mandate and fully leverage analytics across the entire security system. Security teams at the base can trust in a powerful security solution that doesn’t inadvertently contain technology that poses a new threat. Whether enhancing existing cameras with advanced video analytics, replacing the entire video security system to meet the NDAA mandate, or creating a solution from scratch, the U.S. Military and supporting agencies can benefit from Ava’s secure cameras and leverage Ava’s powerful analytics for the highest levels of proactive security.
Inaugurated in 2012, the government of West Bengal had taken an initiative to build a Cultural & Research Institute to commemorate the birth anniversary of Bengal’s polymath, known as the Bard of Bengal, globally. Spread over an area of 4.89 acres, the institute is in the heart of New Town with facilities including an auditorium, art gallery, exhibition hall, mini cinema hall and music room. Every year, thousands of guest tour exhibits, attend cultural programs, enjoy movies, and view artifacts. Incident management While the Cultural & Research Institute had delegated personnel to keep a watch on the premises, manning the expansive property proved to be time-consuming and inefficient. For security team, round-the-clock security preparedness at the location was crucial and ensuring the safety and security of the guests was quite a challenge. The management wanted to build a unified solution, aiming to not only deliver 24x7 surveillance but also empower the on-ground team to manage incidents proactively. Specially, they were facing the conflicting dilemma of keeping priceless objects safe yet allowing millions of visitors a chance to see them Intelligent VMS After analyzing the requirements, the Videonetics team conducted a detailed survey of the property along with the system integrator for the project, Prakash Electricals, to draw out a comprehensive plan for the campus. The state-of-the-art Videonetics unified solution combining Intelligent VMS and Intelligent Video Analytics coupled with IP cameras were chosen to address the unique needs of specific areas. Videonetics Intelligent VMS helps in recording and viewing 25+ cameras throughout the property including gated entrance, open-air pavilion, fountain park, art gallery, auditorium, passages, server room to name a few. The institute wanted a video analytics solution that could help with protecting valuable artifacts in the art gallery. The art gallery is secured with a virtual and invisible protective barrier called Artifact Protection. If an individual breaches this perimeter, in an attempt to touch or steal an artwork/paintings, an alarm is triggered and immediately received both in the centralized location as well as by the security personnel on their mobile devices, allowing them to react and take action quickly. During the survey, some of the vulnerable areas were identified where Videonetics deployed Zone Monitoring as part of the unified solution. The zone monitoring was required at the entrance, operators’ room, art gallery, park space, to detect when a person stays beyond a certain duration in a user-marked zone. Monitored facility The Cultural & Research Institute has been very successful in promoting an open and secured environment where guests and staff could move freely throughout the premises while keeping an eye on strategic locations and limiting access to more sensitive areas such as management offices, cash handling office and crossing barrier near to precious artifacts. Today, incidents are rare at the institute; but if something happens, the team is ready. The security team is alerted in real-time to any irregularities within the site, including tampering with the exhibits and entry into the restricted access zones. From the start of the tour, visitors become aware that they are in a secured and monitored facility. “As we looked to address a variety of surveillance challenges, we were assured to have Videonetics on board to exceed customer’s expectations, in terms of intuitive functionalities, open architecture and accuracy. With Videonetics team, we have successfully provided a right balance between securing the people and protecting assets, to the institute,” expressed, Ujjwal Kumar Dey, Partner, Prakash Electricals.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?