Air Partner plc (Air Partner), the global aviation services group, is seeing momentum build in its Safety & Security Division, with both Baines Simmons and Redline continuing to secure new business wins. Aviation safety and fatigue risk management consultancy company, Baines Simmons has been awarded a contract by Caledonian MacBrayne (CalMac), the UK's largest ferry operator, in terms of ships and destinations served, to implement a ‘Just Culture’ program, to build on its excell...
Teledyne FLIR, part of Teledyne Technologies Incorporated, has announced the release of new additions to its perimeter security portfolio for critical infrastructure. Teledyne’s Elara R-Series commercial ground security radars and the Triton FH-Series multi-spectral fixed cameras. Strengthening perimeter security A first for Teledyne FLIR, the Elara R-Series is the ideal commercial radar system for industrial commercial applications, increasing detection coverage, auto-tracking, dynamic...
Cymulate, the industry standard for SaaS-based Continuous Security Validation, has announced the launch of two new solutions, to enable businesses to validate their security technologies and policies. Attack Surface Management (ASM) discovers exploitable external assets, and Vulnerability Prioritization Technology (VPT) that integrates with vulnerability scanners, to reduce risk exposure time on internal assets. These new offerings empower security teams, to efficiently prioritize vulnerabiliti...
Morse Watchmans, the globally renowned company in key control and asset management systems, will be exhibiting at GSX 2021 show, featuring their latest new key control and management solutions, at booth #1714. Key control solutions at GSX 2021 The company’s flagship KeyWatcher Touch will be displayed with a new Generation 3 CPU that provides improved performance, and faster user interface and improved synchronization times. The new Gen3 CPU upgrade is also available to current KeyWatcher...
Pyronix is delighted to announce that the ‘Enforcer on Tour’ is back to talk to UK and Ireland professional installers, about its latest all-in-one security solution, the new Enforcer V11, with AndroidTablet, HomeControlHUB app, and SmartPlug, as well as its extensive support services. Hosted at various distribution centers across the United Kingdom and Ireland (UK&I), throughout October and November 2021, alongside online meetings, Pyronix Account Managers will be highlighting...
From precise monitoring to picking and automation, there are countless applications that benefit from reliable image information. However, what can be done, when there is only a tight budget for the realization of such an application? With the introduction of uEye XCP, uEye XLE, and Ensenso S, globally renowned camera specialist, IDS (IDS Imaging Development Systems GmbH) proves that industrial-grade image processing technology does not have to be expensive. For users, who need a camera for par...
Johnson Controls, the globally renowned company in smart, healthy, and sustainable building solutions is announcing the addition of body-worn cameras and autonomous robots to its physical security portfolio, along with the integration of package screening technology, powered by RaySecur. Intelligent technologies These intelligent technologies further strengthen Johnson Controls comprehensive building security portfolio and enable customers to extend the power of their systems, far beyond the capabilities of traditional access control and video surveillance. At Johnson Controls, we continue to enhance building technologies through digital transformation" “At Johnson Controls, we continue to enhance building technologies through digital transformation, by leveraging Edge AI devices that power the OpenBlue Platform," said Vijay Sankaran, the Chief Technology Officer (CTO) at Johnson Controls. Smart, autonomous buildings Vijay Sankaran adds, “Smart, autonomous buildings that continuously learn, adapt and automatically respond to the needs of occupants, and the environment are safer, more sustainable and more secure.” Johnson Controls Body-Worn Camera provides powerful personal protection, along with new methods for accountability, regulatory compliance, and evidence management. Tightly integrated into Johnson Controls’ video management solutions, the body-worn camera offers optimized, live video streams, using Wi-Fi or cellular networks for applications, where real-time visibility is important. For recorded video, the body-worn camera automatically transfers its encrypted, secure recorded video into the video management platform. This allows operators to seamlessly search through body cam footage, as well as traditional camera footage, for a more complete picture of their organization’s security. Johnson Controls Security Robots, powered by Ava Robotics, are a workforce multiplier for an organization’s security staff, autonomously conducting event response, along with routine patrols and inspections, providing 360-degree video coverage and SIP audio communication capabilities. The robots improve situational awareness for security staff to diagnose or diffuse an incident remotely. Equipped with video analytics that can monitor building occupancy levels, mask compliance, and object detection, the robots can promote a healthy and safe building environment, by measuring temperature, humidity, air quality, and combustible gases, during inspections, with solutions, such as Johnson Controls C•CURE and Victor event alerts. Physical goods and packages often enter premises unchecked. These threats are now commonplace across many industries. RaySecur’s MailSecur all-in-one screening technology detects liquid, powder, weapons, explosives, radiation, and suspected materials, with its safe electromagnetic radio waves. The integration with Johnson Controls’ security solutions means that scan results can now automatically trigger configurable responses, across building systems, in order to help mitigate incidents, for example, building lockdown or evacuation and communications with the building’s HVAC system, to prevent the potential spread of contaminants or smoke. The combination of these innovations provides a powerful improvement to overall security management. Combining mail screening technology, robotics, edge intelligence, and deep integrations into building systems vastly improves an organization’s ability to dynamically respond to new threats while enhancing building security and performance. Johnson Controls Security Robot The Johnson Controls Security Robot can be autonomously dispatched to the mail room, based on a threat For example, the Johnson Controls Security Robot can be autonomously dispatched to the mail room, based on a threat, where the onboard cameras can provide remote viewing from angles, which are not covered by fixed cameras. A security operator can control the main robot’s movable front-facing camera, thereby evaluating the need for a human response to the threat area, prior to dispatch. The command center can employ the new Johnson Controls’ video wall solution, with its large-format displays for optimal viewing of the robot footage, combined with streams from the MailSecur software, body-worn cameras, and other cameras, so as to quickly assess the threat. Leveraging Artificial Intelligence, IoT, and robotics “Leveraging Artificial Intelligence, IoT, and robotics in our security solutions will enable us to provide our customers with new levels of operational visibility, situational awareness, and autonomous operation,” said Osvaldo San Martin, Vice President and General Manager, Johnson Controls Security Products. Osvaldo adds, “These technologies are among the first to be released from the OpenBlue Innovation Centers to accelerate bringing new technologies to market with our partners.” These technologies are expected to be available from Johnson Controls by the end of 2021.
Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, champions the use of the DORI standard, as the starting point for designing a video surveillance system and how in doing so, one can ensure that the specified cameras are able to cost-effectively meet the end-user’s expectations. The quality of the images that can be captured by many of the latest generations of super-high definition video surveillance cameras are simply breathtaking, allowing users to see ultra-sharp detail of objects and people within the field of view. 4K and 8K high-resolution cameras The resolution capabilities of 4K and 8K cameras, for example, enables operators to digitally zoom in to see a non-pixelated image of just a very small part of a scene, making them an ideal solution for large open area applications, where installing multiple cameras may be impractical or cost-prohibitive. The deployment of ultra-high-resolution cameras, however, comes at a price, in that they all capture large file size images which, when transmitted over the network, consume large amounts of bandwidth. They also have large data storage requirements. Proprietary compression technologies Some camera manufacturers, such as Hanwha Techwin, have developed proprietary compression technologies Some camera manufacturers, such as Hanwha Techwin, have developed proprietary compression technologies which, when working in conjunction with H.265 compression, are able to reduce bandwidth and storage demands by up to 80%. It is, however, still wise for system designers to question, if it is really necessary to specify the highest resolution camera available, bearing in mind the higher initial capital cost, as well as ongoing network and storage requirements, even if they are reduced by complementary compression technology. DORI helps specify the ideal camera The phrase ‘horses for courses’ comes to mind, when thinking about what system designers need to take into consideration when deciding on the best camera model for each location and objective. In this respect, the design of the system must obviously reflect the finding of the risk assessment and take into account an end-user client’s operational requirements. They may, for example, need to capture high-quality, evidence-grade images, which will identify an individual or able to verify an intruder alarm event. DORI - Detection, Observation, Recognition, and Identification While many system integrators will be familiar with DORI, installers who are relatively new to the world of video surveillance, perhaps do not know that the IEC EN62676-4 international standard provides time-saving guidance, as to which cameras should be specified. So, for those who are not familiar with the standard, listed below is an overview of what the DORI acronym stands for: Detection: The quality of images captured by a camera allows a user to determine, whether a person or vehicle is present. Observation: The captured images are able to provide characteristic details of an individual, such as their clothing. Recognition: The clarity of the images enables operators to see with a high level of certainty that an object or incident is the same as the one that an operator has seen before, e.g. it is a person, vehicle, or fire. Identification: The resolution and quality of the images enable an individual to be identified beyond a reasonable doubt. Cameras ability to achieve DORI defined objectives The ability of a camera to achieve these DORI-defined objectives will depend on a number of factors, such as the resolution, lighting, and the amount of movement within the scene. In terms of ‘Observation’, it is worth noting that sequential low-resolution images can provide as much detail (albeit of a different nature) for the human brain to process, than high resolution still images, i.e. the movement of a vehicle is very different to that of someone walking. As an example, a 4-megapixel camera in daylight conditions should deliver the following: Objective 2.88mm lens 3.6mm lens 120 meters Detection 43 meters 80 meters 120 meters Observation 17 meters 32 meters 48 meters Recognition 9 meters 16 meters 24 meters Identification 4 meters 8 meters 12 meters However, the maximum distance that there can be between a camera and an object, in order to meet one of the above requirements, will vary depending on the lighting conditions, the compression format, camera locations, and other factors. Sensitivity of the camera sensors The sensitivity of the camera sensors used by different camera manufacturers will also vary The sensitivity of the camera sensors used by different camera manufacturers will also vary and in this respect, Hanwha Techwin’s online Toolbox Plus enables system integrators to compare the specifications of its Wisenet cameras side-by-side and compile a list of the products required for a specific project. There is also the added benefit of being able to generate a report on the estimated bandwidth and storage requirements for the project. It seems almost too simple, but using DORI as a guide for designing a new video surveillance solution, will ensure no wastage of money, by over-specifying the cameras needed for the job in hand. Equally important, the reverse also applies in that the DORI standard will help to avoid experiencing ‘buyers’ remorse’, as a result of installing cameras that are not fit for purpose. Other key factors, such as IR illumination and WDR functionality It is important, however, to bear in mind that DORI is a guide to ensuring that an unsuitable camera is not specified, but on its own is not going to choose the perfect camera for a job. Other requirements need to be taken into consideration, such as if the camera will need to have built-in IR illumination and/or have good WDR functionality because it will be pointing towards an outside window and will have to deal with variable lighting conditions. As always, the best advice is therefore to work with manufacturers you believe you can trust and ask them to confirm that you have made the correct camera choice.
Qognify has announced the appointment of two Regional Channel Managers to its Ocularis channel team. Amanda Euler and Olga Scorobogataya will support Qognify’s extensive network of channel partners and their customers, across the Northwest and Southwest regions of the US, helping them to maximize their use of the powerful Ocularis video management software (VMS). New Regional Channel Managers Amanda Euler joins Qognify as Regional Channel Manager for Northwest from ADT Commercial and is accompanied on the team by Olga Scorobogataya, who brings a wealth of experience in the security sector to the Southwest, gained during her job tenures at ICU Technologies Inc. and Motorola Solutions. Amanda Euler and Olga Scorobogataya join Qognify’s growing channel team Amanda Euler and Olga Scorobogataya join Qognify’s growing channel team, at an exciting time, in the development of Ocularis video management software. Last month, the company launched version 6.1 of the Ocularis VMS, which includes the highest level of integration with BriefCam’s advanced video content analytics, for earlier incident detection, improved real-time response, and faster investigations. It also added new capabilities to protect recorded footage against unauthorized screen recording and sharing. Integrated physical security ecosystems Jeff Swaim, the Director of Channel Sales in the US for Qognify, said “Our partners are committed to being there for customers and our channel team is there to support them in their deployment and use the openness of Ocularis, to deliver integrated physical security ecosystems, with enterprise-class requirements, the desired outcomes for their short-, medium- and long-term physical security goals.” In addition to the ongoing expansion of Qognify’s North America channel team, the company is currently recruiting for new positions in other countries, including Germany, United Kingdom, and Israel, in the areas of project management, product development, and professional services.
Buyers who are serious about protecting the public and rooting out rogue elements in their security provision, at a time when events are restarting in earnest after over a year of lockdowns, should ask their security companies to evidence their approval to the code of practice for the ‘Provision of Labour in the Security and Events Sectors’. Mindful to maximize the benefit industry-wide and in the interest of all security providers and event organizers - and the public attending those events -– certification bodies operating in this sector and appointed by the SIA have come together to offer a labor provision scope of approval to their approved companies, protecting the public from rogue security workers, and security workers from the risk of exploitation. Rogue labor deployment NSI, ACM-CCAS and SSAIB share the view that the widest adoption of this code of practice for labor provision will best serve the public to good effect in deterring rogue labor deployment. Anyone involved in the delivery of security services, particularly in the events sector, will know the industry is immensely flexible in managing licensed security officer resources to accommodate its clients. The fundamental distinction between the two is often misunderstood or not even recognized by buyers It does this through two key proven methods a) Subcontracting and b) Labor provision. The fundamental distinction between the two is often misunderstood or not even recognized by buyers. The second – labor provision - falls outside the scope of ACS (Approved Contractor Scheme), even for ACS approved companies - and therein lies the loophole and the risk. A risk particularly in the events sector where their security may unwittingly be being compromised by the deployment of untrained, underpaid, unlicensed, non-security screened, or worse – terrorism-motivated individuals. Less scrupulous operators The risk is compounded by less scrupulous operators undercutting the professional industry in labor provision at rates that strongly suggest immoral and, in some cases, illegal employment practices. Social media posts evidencing this are not hard to find. The over 800 security companies who maintain ACS approval granted by the Security Industry Authority are mindful that ACS signals to buyers a degree of professionalism and competence they rely on. Yet as with all approval schemes the devil is in the detail, and in the case of ACS whilst robust in its assessment process, its reach is limited to contractors themselves, and not their labor providers. Therein lies the ‘loophole’. Identifying this as a growing concern over the last few years, and one which many in the sector recognize, NSI developed a code of practice which has enabled approved companies to specify approval to the code as a requirement within their labor supply chain. Three assessing bodies NSI has also proposed the code be adopted by BSI in a new industry standard NSI has also proposed the code be adopted by BSI in a new industry standard. In addition to NSI, the code of practice is now being adopted and offered by ACM-CCAS and SSAIB which will result in a wider reach of labor providers being required to hold approval. Now, any company operating as a labor provider can apply for approval to this scope and will be audited annually against the requirements which include such checks as: PAYE being operated for all staff, national minimum or living wages is being paid, holiday pay, and pension being provided, identity and right to work checks, screening to BS 7858 and ongoing SIA licensing checks. The three assessing bodies will be requiring all approved companies to use only labor providers approved to the code of practice or actively audit them to the requirements of the code – and evidence it – as part of their own ongoing approval.
National Monitoring Center (NMC), the nation’s premier 3rd party monitoring center, has unveiled a new logo to further commemorate the company’s 20th anniversary. The new logo reflects NMC’s continued commitment to evolve with new technology innovations, an enhanced portfolio of services, and the best support and security personnel in the industry. Highly trained personnel “We wanted to punctuate two decades of growth and success with a renewed spirit of entrepreneurism and perpetual forward motion, which is reflected in the design of the new NMC logo,” said Woodie Andrawos, President, National Monitoring Center. “As we look to the next twenty years and beyond, NMC will continue to build upon its outstanding reputation for best-in-class customer support, and our superior combination of highly trained personnel and cutting-edge technologies to provide our dealer partners with the best possible pathway to growth and prosperity.”
LifeSafety Power, an ASSA ABLOY company, has announced that it has received LenelS2 factory certification and joined the LenelS2 OpenAccess Alliance Program (OAAP). LifeSafety Power’s NetLink NL4 and NLX Network Communication Modules interface with OnGuard access control software versions 8.0 and 7.6, to provide advanced power management for enterprise access control systems. NetLink modules interface with OnGuard platform NetLink adds proactive monitoring and management capabilities to LifeSafety Power’s power systems NetLink adds proactive monitoring and management capabilities to LifeSafety Power’s power systems and interfaces directly to the OnGuard platform, and is engineered to handle applications, which require network management. Leveraging this new interface, all power system alerts are now viewable in the OnGuard software. “LifeSafety Power has completed required factory testing at LenelS2, to validate the functionality of its interface to the OnGuard system. This interface to the OnGuard system allows users to add powerful remote monitoring capabilities to LifeSafety Power’s access control power systems, through an intuitive web browser interface,” said John Marchioli, OAAP Product Management, LenelS2. LifeSafety Power and LenelS2 partnership John Marchioli adds “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program (OAAP).” “The ability to receive alerts and notifications on all power-connected systems through the OnGuard system brings greater intelligence to access control solutions,” said John Olliver, the Senior Vice President of Sales and Marketing for LifeSafety Power, adding “For the end-users and systems integrators, managed power improves the ability to preemptively assess power status for greater reliability and uptime.”
Most consumers are enjoying the convenience brought by electronic locks. With the existence of electronic locks, people no longer need to be restricted by keys. There are a variety of unlocking methods and more convenient remote control unlocking options. Suppose, you are going on vacation, and with the presence of an electronic lock, you can easily enter your house with your babysitter, without a spare key. Of course, not only smart homes, but also some infrastructure and commercial buildings are enjoying the convenience, brought by electronic locks. Passive electronic lock access control system This article will introduce a smart electronic lock used in the infrastructure industry, named passive electronic lock access control system. In traditional manufacturing, mechanical locks are commonly used in all walks of life, to protect the safety of property and facilities. However, the mechanical lock has caused many practical problems in the long-term application. For example, the keys are duplicated randomly, the unlocking authority cannot be controlled, the user's operation records cannot be known, and the remote control is not possible. Imagine that if you are in a remote telecom base station, it happens that you have the wrong key in your hand and cannot open the front door. In such a situation, this lock, maybe the worst scenario. In some industries, with a wide scope and large working area, more attention must be paid to access control systems Therefore, in some industries, with a wide scope and large working area, more attention must be paid to access control systems. In some outdoor scenarios, such as base stations and electric power cabinets, the requirements for access control systems are quite strict. Due to the particularity of its environment, ordinary power-based access control systems will no longer be applicable. Therefore, the emergence of passive access control systems has solved these problems. Electronic locks offer intelligent management function Based on years of in-depth field research, Vanma has developed the Vanma passive electronic lock access control system, based on the current situation of the industry. This system is different from other electronic lock systems, as it integrates the advantages of both mechanical locks and electronic locks. It not only has the simplicity of mechanical locks, but also has the intelligent management function of electronic locks. The term ‘passive’ of passive electronic locks means that no power is needed. Passive electronic locks have the same appearance as ordinary mechanical locks, so they can be installed anywhere, just like common mechanical locks. They also have a variety of practical functions of electronic locks. Authorized remote access control The Vanma management software allows security managers to assign access rights to specific areas, for different technical personnel. In order to facilitate real-time access control, the electronic key can be used in conjunction with the mobile phone app, in order to send information about its access rights to the technicians, in real time. Vanma management software can provide access to all operations performed by technicians Vanma management software can provide access to all operations performed by technicians, including complete audit reports. Access attempts outside the specified time range or outside the specified area can be obtained through the report, so as to analyze any abnormal situations. Access control in extreme weather conditions In the access control system, the lock (lock cylinder) maintains an extremely high standard and its protection level is IP67, to ensure the greatest degree of protection. Infrared induction technology is used in the electronic key, even if the surface of the lock is wet, the electronic key can also transfer the access authority to the lock cylinder. Ensure stable exchange of information between the key and the lock cylinder. In other words, a poor connection cannot prevent the transmission of information between the key and the lock. At present, this kind of passive electronic lock is widely used in many fields, such as telecom, electric power, water utilities, public utilities, medical emergency and so on in Europe.
Household adoption of smart home systems currently sits at 12.1% and is set to grow to 21.4% by 2025, expanding the market from US$ 78.3 billion to US$ 135 billion, in the same period. Although closely linked to the growth of connectivity technologies, including 5G, tech-savvy consumers are also recognizing the benefits of next-generation security systems, to protect and secure their domestic lives. Biometric technologies are already commonplace in our smartphones, PCs and payment cards, enhancing security without compromising convenience. Consequently, manufacturers and developers are taking note of biometric solutions, as a way of leveling-up their smart home solutions. Biometrics offer enhanced security As with any home, security starts at the front door and the first opportunity for biometrics to make a smart home genius lies within the smart lock. Why? Relying on inconvenient unsecure PINs and codes takes the ‘smart’ out of smart locks. As the number of connected systems in our homes increase, we cannot expect consumers to create, remember and use an ever-expanding list of unique passwords and PINs. Indeed, 60% of consumers feel they have too many to remember and the number can be as high as 85 for all personal and private accounts. Biometric solutions strengthen home access control Biometric solutions have a real opportunity to strengthen the security and convenience of home access control Doing this risks consumers becoming apathetic with security, as 41% of consumers admit to re-using the same password or introducing simple minor variations, increasing the risk of hacks and breaches from weak or stolen passwords. Furthermore, continually updating and refreshing passwords, and PINs is unappealing and inconvenient. Consequently, biometric solutions have a real opportunity to strengthen the security and convenience of home access control. Positives of on-device biometric storage Biometric authentication, such as fingerprint recognition uses personally identifiable information, which is stored securely on-device. By using on-device biometric storage, manufacturers are supporting the 38% of consumers, who are worried about privacy and biometrics, and potentially winning over the 17% of people, who don’t use smart home devices for this very reason. Compared to conventional security, such as passwords, PINs or even keys, which can be spoofed, stolen, forgotten or lost, biometrics is difficult to hack and near impossible to spoof. Consequently, homes secured with biometric smart locks are made safer in a significantly more seamless and convenient way for the user. Biometric smart locks Physical access in our domestic lives doesn’t end at the front door with smart locks. Biometrics has endless opportunities to ease our daily lives, replacing passwords and PINs in all devices. Biometric smart locks provide personalized access control to sensitive and hazardous areas, such as medicine cabinets, kitchen drawers, safes, kitchen appliances and bike locks. They offer effective security with a touch or glance. Multi-tenanted sites, such as apartment blocks and student halls, can also become smarter and more secure. With hundreds of people occupying the same building, maintaining high levels of security is the responsibility for every individual occupant. Biometric smart locks limit entry to authorized tenants and eliminate the impact of lost or stolen keys, and passcodes. Furthermore, there’s no need for costly lock replacements and when people leave the building permanently, their data is easily removed from the device. Authorized building access Like biometric smart locks in general, the benefits extend beyond the front door Like biometric smart locks in general, the benefits extend beyond the front door, but also throughout the entire building, such as washing rooms, mail rooms, bike rooms and community spaces, such as gyms. Different people might have different levels of access to these areas, depending on their contracts, creating an access control headache. But, by having biometric smart locks, security teams can ensure that only authorized people have access to the right combination of rooms and areas. Convenience of biometric access cards Additionally, if building owners have options, the biometric sensors can be integrated into the doors themselves, thereby allowing users to touch the sensor, to unlock the door and enter. Furthermore, the latest technology allows biometric access cards to be used. This embeds the sensor into a contactless keycard, allowing the user to place their thumb on the sensor and tap the card to unlock the door. This may be preferable in circumstances where contactless keycards are already in use and can be upgraded. Smarter and seamless security In tandem with the growth of the smart home ecosystem, biometrics has real potential to enhance our daily lives, by delivering smarter, seamless and more convenient security. Significant innovation has made biometrics access control faster, more accurate and secure. Furthermore, today’s sensors are durable and energy efficient. With the capacity for over 10 million touches and ultra-low power consumption, smart home system developers no longer have to worry about added power demands. As consumers continue to invest in their homes and explore new ways to secure and access them, biometrics offers a golden opportunity for market players, to differentiate and make smart homes even smarter.
In the past decade, we’ve seen an unfortunate increase in gun-related incidents on school campuses, making security and policy efforts a top priority for educational facilities nationwide. While the causes for this increase are hotly debated in and around the education community, the facts remain that specific steps can be taken to mitigate risks. To tackle this issue, officials from campus stakeholders, law enforcement officials, architects, and security personnel, have met to find solutions for protecting educational facilities. Further complicating matters, educational campuses are again tasked with mitigating health risks associated with COVID-19, as we head into the third pandemic school year. Video communication tools To safely reopen, new technologies and policies in many K-12 and higher education institutions have been released, with many searching for a way to leverage existing security infrastructure. Achieving both health safety and physical security requires an integrated approach—from all-around best practices, to video communication tools and enhanced security infrastructure. The simple intercom has been a security staple in the education market for many years A holistic approach is best to ensure the safety of students, staff, and visitors. The simple intercom has been a security staple in the education market for many years, but now in a pandemic-centric world, these devices provide a new set of required capabilities. Intercoms, once thought to be a basic security tool, can now be combined with video, offering users the ability to solve multiple pain points associated with COVID-19. Controlled access points In this article, we’ll discuss some best practices for educational decision-makers, as well as how video intercoms can enhance overall security architecture. A school’s first opportunity to mitigate threats lies in its ability to deter threats entering in the first place. This begins with ensuring policies, procedures, and equipment are all up to standard. Most campus shootings and other violent acts occur once the individual has made it through the front door of a building; putting the emphasis on controlled access points at key entries to add an extra barrier of safety between threats and students. While written policies help staff understand how visitors are approved for entry, they should also be informed of more simple items, such as why doors can’t be left propped open, when to lockdown, or how to evacuate during an emergency. Physical security solutions The security industry has also created effective physical security solutions for protecting a campus Another best practice would be training staff to spot signs of distressed and potentially violent students, while providing ways to get help for them. When it comes to campus security, there is no one-size-fits-all approach, which is why security integrators should also be included in planning processes to tailor a custom solution for each campus to address its unique security needs. While best practices, including mental health screenings, stricter discipline codes, and faster law enforcement responses are all crucial to campus safety, the security industry has also created effective physical security solutions for protecting a campus—which includes enhanced two-way video and audio/visual communication solutions such as a video intercom. For years educational facilities have utilized intercoms to manage access, but now, it’s more important than ever to ensure the safety of students and staff by thoroughly vetting all those who enter a building. Providing visual verification Long gone are the days of asking visitors to check in manually using a sign-in book, or simply walking into a school. Best practices now require the presence of a visitor management system (VMS), which is a more accurate and seamless way to manage access. Using a VMS, a campus could add its own custom watch list, which when properly implemented, can provide protection from abuse orders, custodial issues, and offer names and pictures of disgruntled former employees and students. Using a VMS, a campus could add its own custom watch list, which when properly implemented As security technology has become more sophisticated, so have intercom capabilities—extending far beyond what they used to be. Going further than a simple button and speaker system, when used in conjunction with an IP video system, intercoms provide visual verification that the person requesting access into a school building does indeed belong there. Contact tracing solutions Whether it’s a student, parent, or staff member, verifying a person’s identity and ensuring that the individual has proper credentials is key. Pairing an intercom with a camera allows for this important, real-time visual and audio communication between the front office and those requesting access. Additionally, intercoms can be used as contact tracing solutions by leveraging an audit trail in case of an outbreak. For example, if a number of students at a college or university all use a mobile app to gain access to a dormitory through an intercom system, in the event that someone tests positive for COVID-19, they are able to contact all students, staff, or visitors who frequent that building. IP video intercoms can assist in pandemic related and security use cases by limiting unnecessary human-to-human interaction and replacing that with remote management capabilities. Remote monitoring station Remote monitoring allows for eyes on a facility while personnel are not physically present There is increased flexibility when working from a mobile app, or remote monitoring station, especially for security directors or officers on educational campuses. For example, if a campus is not able to staff a lobby of a building or a dormitory, they can remotely manage access from a mobile device. This enables security personnel to access video feeds and directly communicate with students or staff requesting access into a building. Remote monitoring allows for eyes on a facility while personnel are not physically present, thus increasing overall security. It can also give the appearance of the building being occupied at all times, even when it’s not. Another way an educational facility can leverage their video intercom system is to shift to mobile applications that offer a touchless way to gain access. Mobile application credential A mobile application removes the need for a physical key card and eliminates the potential of loss or theft of that access credential. It also allows for easy updating to credential status. For example, if a student, staff member or visitor is added to an ‘access denied’ list, security personnel can simply revoke a mobile application credential, versus having to track down a physical key and run the risk of copies or other issues. The importance of visual confirmation cannot be stressed enough when it comes to educational campuses The importance of visual confirmation cannot be stressed enough when it comes to educational campuses. Not only for security purposes to visually confirm identity, or screen for suspicious behaviors or other anomalies, simply having the ability to have a conversation with someone requesting access is vital. Better audio feedback There’s been a shift in recent years, in some cases spurred by the pandemic, to focus on how existing technologies can meet the unique needs of students, staff and visitors. For example, intercoms allow for two-way video which is crucial for an individual who is deaf, or hearing impaired, who needs to communicate using sign language. Additionally, intercoms can be integrated with t-coil features, to allow for better audio feedback for those with hearing aids. The past few years have taught us that while best practices, attention to the mental wellbeing of students, enhanced security at main entry points, and exits are all important focuses, educational security needs to be holistic and comprehensive. From physical security risks, to potential pandemic-related outbreaks, to the regular day-to-day communication needs of all individuals, decision-makers recognize intercom systems easily address each unique need.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalization in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialog over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritization to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customized accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
Imagine a world where video cameras are not just watching and reporting for security, but have an even wider positive impact on our lives. Imagine that cameras control street and building lights, as people come and go, that traffic jams are predicted and vehicles are automatically rerouted, and more tills are opened, just before a queue starts to form. Cameras with AI capabilities Cameras in stores can show us how we might look in the latest outfit as we browse. That’s the vision from Panasonic about current and future uses for their cameras that provide artificial intelligence (AI) capabilities at the edge. Panasonic feels that these types of intelligent camera applications are also the basis for automation and introduction of Industry 4.0, in which processes are automated, monitored and controlled by AI-driven systems. 4K network security cameras The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications Panasonic’s 4K network security cameras have built-in AI capabilities suitable for this next generation of intelligent applications in business and society. The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications. The AI engine is directly embedded into the camera, thus reducing costs and Panasonic’s image quality ensures the accuracy of the analytics outcome. FacePRO facial recognition technology Panasonic began advancing AI technology on the server side with FacePRO, the in-house facial recognition application, which uses AI deep learning capabilities. Moving ahead, they transitioned their knowledge of AI from the server side to the edge, introducing i-PRO security cameras with built-in AI capabilities last summer, alongside their own in-house analytics. Moreover, in line with the Panasonic approach to focus more on collaboration with specialist AI software developers, a partnership with Italian software company, A.I. Tech followed in September, with a range of intelligent applications, partially based on deep learning. Additional collaborations are already in place with more than 10 other developers, across the European Union, working on more future applications. i-PRO AI-capable security cameras Open systems are an important part of Panasonic’s current approach. The company’s i-PRO AI-capable cameras are an open platform and designed for third-party application development, therefore, applications can be built or tailored to the needs of an individual customer. Panasonic use to be a company that developed everything in-house, including all the analytics and applications. “However, now we have turned around our strategy by making our i-PRO security cameras open to integrate applications and analytics from third-party companies,” says Gerard Figols, Head of Security Solutions at Panasonic Business Europe. Flexible and adapting to specific customer needs This new approach allows the company to be more flexible and adaptable to customers’ needs. “At the same time, we can be quicker and much more tailored to the market trend,” said Gerard Figols. He adds, “For example, in the retail space, enabling retailers to enhance the customer experience, in smart cities for traffic monitoring and smart parking, and by event organizers and transport hubs to monitor and ensure safety.” Edge-based analytics offer multiple benefits over server-based systems Edge-based analytics Edge-based analytics offer multiple benefits over server-based systems. On one hand, there are monetary benefits - a cost reduction results from the decreased amount of more powerful hardware required on the server side to process the data, on top of reduction in the infrastructure costs, as not all the full video stream needs to be sent for analysis, we can work solely with the metadata. On the other hand, there are also advantages of flexibility, as well as reliability. Each camera can have its own individual analytic setup and in case of any issue on the communication or server side, the camera can keep running the analysis at the edge, thereby making sure the CCTV system is still fully operational. Most importantly, systems can keep the same high level of accuracy. Explosion of AI camera applications We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications" “We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications,” said Gerard Figols, adding “However, it doesn’t mean the hardware is not important anymore, as I believe it’s more important than ever. Working with poor picture quality or if the hardware is not reliable, and works 24/7, software cannot run or deliver the outcome it has been designed for.” As hardware specialists, Figols believes that Panasonic seeks to focus on what they do best - Building long-lasting, open network cameras, which are capable of capturing the highest quality images that are required for the latest AI applications, while software developers can concentrate on bringing specialist applications to the market. Same as for smartphones, AI applications will proliferate based on market demand and succeed or fail, based on the value that they deliver. Facial recognition, privacy protection and cross line technologies Panasonic has been in the forefront in developing essential AI applications for CCTV, such as facial recognition, privacy protection and cross line. However, with the market developing so rapidly and the potential applications of AI-driven camera systems being so varied and widespread, Panasonic quickly realized that the future of their network cameras was going to be in open systems, which allow specialist developers and their customers to use their sector expertise to develop their own applications for specific vertical market applications, while using i-PRO hardware. Metadata for detection and recognition Regarding privacy, consider that the use of AI in cameras is about generating metadata for the detection and recognition of patterns, rather than identifying individual identities. “However, there are legitimate privacy concerns, but I firmly believe that attitudes will change quickly when people see the incredible benefits that this technology can deliver,” said Gerard Figols, adding “I hope that we will be able to redefine our view of cameras and AI, not just as insurance, but as life advancing and enhancing.” i-PRO AI Privacy Guard One of the AI applications that Panasonic developed was i-PRO AI Privacy Guard Seeking to understand and appreciate privacy concerns, one of the AI applications that Panasonic developed was i-PRO AI Privacy Guard that generates data without capturing individual identities, following European privacy regulations that are among the strictest in the world. Gerard Fogils said, “The combination of artificial intelligence and the latest generation open camera technology will change the world’s perceptions from Big Brother to Big Benefits. New applications will emerge as the existing generation of cameras is updated to the new open and intelligent next generation devices, and the existing role of the security camera will also continue.” Future scope of AI and cameras He adds, “Not just relying on the security cameras for evidence when things have gone wrong, end users will increasingly be able to use AI and the cameras with much higher accuracy to prevent false alarms and in a proactive way to prevent incidents." Gerard Figols concludes, “That could be monitoring and alerting when health and safety guidelines are being breached or spotting and flagging patterns of suspicious behavior before incidents occur.”
The Royal United Hospitals Bath NHS Foundation Trust is the latest healthcare site to benefit from Triton², a patented, high-security master key system from ASSA ABLOY, delivering assured security and key control. The Trust’s Royal National Hospital for Rheumatic Diseases and Brownsword Therapies Center is a key facility to take advantage of the Triton² system. Opening in 2019 at the main Royal United Hospitals site in the Weston area of Bath, the center is an outpatient facility providing treatment, care, and education to those recovering from episodes of illness or injury, or who need help managing long-term conditions. With services covering rheumatology, therapies, and pain management, the center includes clinic and treatment rooms, a gym, hydrotherapy pool, an assessment and teaching kitchen, bathroom and bedroom, Skype clinic room, and education rooms for forums and classes. Secure and reliable key management The Triton² master key system has also been installed in the Bernard Ireland House residential building, which offers specially-designed accommodation for patients, with facilities including group treatment areas, office space, and a dedicated therapeutic courtyard area. Triton² provides a safe, secure, and reliable means of key management for both the residents and staff, so they can focus on delivering the highest standards of care to patients. Triton² provides a safe, secure, and reliable means of key management for both the residents and staff When searching for a suitable master key system for these buildings, the Trust had a wide range of requirements that needed to be satisfied. Hospitals and healthcare estates typically have large and complex key demands, because of the high number of staff employed, the variety of areas requiring different levels of access rights, and the fact that security and safety must not be compromised. Hierarchy of security access Fortunately, Triton² was ideally suited to meet the Trust’s needs. Supplied and installed by local distributor Gemsec, the platform raises security standards by ensuring employees have different levels of security access based on their roles, significantly reducing the risk of unauthorized access and security breaches. A hierarchy of access rights means no matter what an individual’s role at the site – whether it’s a general manager, doctors and nurses, tenants, porters, and so on – all have access to only the areas they need. And within each type of role, the large availability of differs ensures access rights can be personalized to meet an individual’s exact requirements. The Trust’s estates team then has a master key, and there is a grandmaster key that sits above this that can access all areas. The system helps simplify key management too; a member of staff can access a range of rooms and areas from a single key, rather than having to carry around a collection of them. Furthermore, the fact that one key can open several locks means fewer duplicates are needed. Should there be a security breach, it’s easy to identify who has access to a particular area and ensure the appropriate action is taken. Patented key protection Keys can only be cut by registered dealers, maintaining a high level of security should a key ever be misplaced One of the key features of Triton² is its long-lasting patent protection. Guarding against unauthorized and 3D key copying, Triton² is patented until 2036 for guaranteed peace of mind. Keys can only be cut by registered dealers, maintaining a high level of security should a key ever be misplaced. With built-in anti-pick, anti-pull, anti-drill, and anti-bump protection, the system’s cylinders exceed the requirements of BS EN 1303:2015, meeting the highest standards for physical security. The platform has also been fire tested in line with BS EN 1634-1:200, and so is suitable for use on 30- and 60-minute timber fire doors. Easy and efficient future-proof solution Anthony Green, Senior Estates Officer at Royal United Hospitals Bath NHS Foundation Trust, said: “We’ve been so impressed with the Triton² master key system from ASSA ABLOY that we’re now planning to review the rest of the estate in line with the capabilities of the platform, to roll it out to other facilities across the site.” “The system delivers an assured future-proof solution. The Gemsec team has been a big help in ensuring we consider all likely events, as we continue to redevelop and expand the hospital site so that Triton² can meet any possible needs.” “Even simple considerations, such as the fact that Triton² is available with a comprehensive range of cylinder profiles to suit every type of lock case, help us save money in the long run by making sure we would not have to install new lock cases if we were to expand the system to existing buildings across the site. Secure and practical key management “ASSA ABLOY’s Triton² is so impressive because it perfectly meets the complicated key needs of a healthcare site such as ours, but does it in such an intuitive, efficient, and easy to manage way.” Craig Birch, Head of Product Management at the ASSA ABLOY Door Hardware Group, adds, “With long-life patent protection and 1.5 billion different master keying combinations, Triton² delivers a secure and practical key management solution, built to last. For the Royal United Hospitals Bath NHS Foundation Trust, Triton² offers a highly secure and durable master key platform.”
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in order to discuss interoperability, share industry trends and explore the future of digitalization and intelligence together. “We are excited to host our second virtual technology partner day. Technologies have evolved fast in the past year and the needs of digitization, and diversified challenges facing different industries today, are driving the integration of security companies,” said Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Jiaqi Gao adds, “It is a great opportunity to show how we can build a digital future together with our partners and through which, we can jointly provide the right solution for our customers.” Smart solutions for IoT and security on show A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs During the 2-day event, Dahua Technology and its partners, including Vanderbilt, AxxonSoft, Immix and Optex, will unveil how their smart solutions benefit the field of security and IoT (Internet of Things). It will focus on Artificial Intelligence (AI), cloud solutions and alarm monitoring, as well as specific vertical markets, such as retail, smart building & facilities, critical infrastructure, transportation, etc. This year’s event will also include a section that demonstrates outstanding Dahua products and their compatibility with third-party solutions. A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs, including cyber security & privacy protection, full-color 2.0 and TiOC 2.0, WizMind portfolio, and more. Attendees can register free of charge, connect with presenters and get product information. Behavior analytics in Artificial Intelligence (AI) “The Dahua Partner Day event offers a great platform for AxxonSoft, to present our solutions. We successfully exhibited on last year’s Traffic & Parking session and are excited to share more information about behavior analytics in the AI hub, this year,” said Alan Ataev, AxxonSoft’s Chief Executive Officer (CEO), adding “Together with Dahua, we are enthusiastic about creating joint solutions that grow our value proposition for both our partners and clients.” With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’, so as to serve its partners and customers around the world.
Globally renowned sensor solutions provider, HENSOLDT and L3Harris Technologies have joined forces to develop new capabilities for NATO’s Alliance Future Surveillance and Control (AFSC) program. Both companies have signed a joint strategic cooperation agreement, to combine their respective skills in the areas of platform-independent mission solutions. HENSOLDT - L3Harris Technologies In the frame of the cooperation, HENSOLDT, with its proven track record in developing and manufacturing sensors, and mission systems, will contribute, among other things, capabilities in the areas of active and passive sensors, sensor data fusion and network management capabilities. L3Harris and HENSOLDT with their respective strengths are ideally suited to offer NATO the optimum solution" “Next-generation surveillance requires an intelligent approach to platform-independent, networked high-end sensors, AI-based date exploitation and dissemination,” said Jürgen Halder, the Head of Strategic Projects at HENSOLDT’s Spectrum Dominance Division. Jürgen Halder adds, “L3Harris and HENSOLDT with their respective strengths are ideally suited to offer NATO the optimum solution.” Open systems and multi-function solutions “Our team will explore open systems, multi-function solutions and data-centric concepts to sustain the NATO Alliance’s military advantage from 2035 and beyond,” said Dave Johnson, the Vice President (VP) of Strategy, Integrated Mission Systems, at L3Harris Technologies. L3Harris Technologies and HENSOLDT are part of an international team that brings together NATO nations’ industrial expertise in surveillance and control. This team will analyze the risks and feasibility of technologies, and components within its systems of systems approach, in order to enhance the NATO Alliance’s capabilities, to the year 2035 and beyond. Enhancing efficiency of future NATO operations L3Harris Technologies’ international teammates share a common vision, which is to increase the effectiveness and efficiency of future NATO military operations, through the procurement and integration of a multi-domain (AFSC) capability, which is centered on the data enterprise.
The volume of data necessary to solve crimes continues to rise across the United Kingdom and sharing information quickly is instrumental in solving cases. With this in mind, NICE has announced that it’s NICE Investigate digital evidence management solution is now helping connect businesses and police forces. NICE Investigate system NICE Investigate system enables enterprises and police forces to work collaboratively on investigations, in order to speed the delivery of justice, by ensuring fast, seamless sharing of CCTV video and other digital evidence. Two major UK retailers have already embraced the initiative, by registering their thousands of CCTV cameras with the NICE Investigate system. The initiative is being driven in part by the National Business Crime Centre, a UK resource created out of Home Office Police Transformation Funding, to improve the partnership between the business community and police. Boots UK, the largest pharmacy health, safety and beauty chain in the United Kingdom, with 2,336 stores nationwide, is among the first retailers to join, along with a large UK supermarket chain. Sharing video with UK police forces When businesses register with NICE Investigate, they’re able to easily share videos with UK police forces When businesses register with NICE Investigate, they’re able to easily share videos with participating UK police forces. Currently, 15 UK police forces and organizations, including Hampshire Constabulary, are actively using the NICE solution to manage digital evidence and conduct investigations. Iona Blake, the Security and Incident Manager at Boots UK explained, “We have a large number of stores, with both internal and external CCTV cameras, for investigating all types of crimes and incidents.” She adds, “The addition of the NICE Investigate technology allows Boots to engage in the right level of data sharing, with local police forces. For us, it’s all about how can we get better at reporting crimes. In addition to improving efficiency and saving time, this program has really changed the dynamic of our relationship with the police. Boots may be the first to use the NICE platform, but I’m sure, we will not be the last, as more retailers and police forces come on stream.” Swift video evidence collection Patrick Holdaway, Superintendent at City of London Police and Lead for the National Business Crime Centre said, “NICE Investigate provides a great opportunity for police forces and businesses to work together, to ensure the swift collection of evidence, allowing the police to bring offenders to justice, as effectively as possible.” Chris Wooten, the Executive Vice President, NICE, stated “The need for businesses and police forces to work together is greater than ever. The volume of crime is rising and getting digital evidence into the hands of police investigators can be a time consuming, drawn out, manual process, requiring officers to travel to the business location, to copy and collect the evidence. With lean budgets and forces short-staffed, time is limited. NICE Investigate helps businesses and police forces break through this log jam, by removing the time-consuming manual processes.” One-stop, cloud-based solution NICE Investigate stores the contact details for each participating business, along with the geo-location of each CCTV camera NICE Investigate is a one-stop, cloud-based solution for transforming manual processes around the collection, management, analysis and sharing of all types of digital evidence. With NICE Investigate, the entire process of requesting and sending CCTV video is done electronically. Participating businesses register their cameras in NICE Investigate and can share CCTV video evidence securely and electronically. NICE Investigate stores the contact details for each participating business, along with the geo-location of each CCTV camera. When a crime occurs, investigators can view camera locations on a map and instantly send out an electronic request for the relevant CCTV footage. Video evidence files are cyber secure Upon receiving the request, the business uploads the video file(s) into NICE Investigate’s secure portal. As they are uploaded, video files are virus-checked, automatically converted to a playable format and deposited into an electronic case file, where they are available to the investigator for viewing. NICE Investigate is currently being by used more than 50,000 investigators and police officers around the world.
Property developers and residents at luxury apartment development - Live Oasis Deansgate, are the first to benefit from an all-encompassing building automation system, which is operable from one single app, designed by GET Dynamic, in partnership with Comelit and ASSA ABLOY Global Solutions. Smart mobile-first solution The new smart mobile-first solution, being debuted at Live Oasis in Manchester, enables property owners, YPP Lettings and Management Company Ltd, to more efficiently manage the 60-apartment site, via cloud-based technology. Apartment owners can also control all aspects of their home, including video entry calls, door opening and apartment automation, using just one single resident building application. Live Oasis Deansgate Located in the aspiring Deansgate district, Live Oasis is designed for students and young professionals Located in the aspiring Deansgate district, Live Oasis is designed for students and young professionals. With fully furnished studio, one- and two-bed apartments, it also features a concierge service, together with on-site security, all available for residents through the working week and supported by 24-hour CCTV. YPP Managing Director, Omar Al-Nujaifi, said “Manchester is a vibrant, creative and innovative city, and our latest development offers apartments for a modern generation of residents, who are not only looking for a stylish abode, but somewhere that is technology rich, sustainable and a connected place to live.” Access control and digital key functionality He adds, “For this to occur, we worked with each company, right from pre-project launch to achieve the desired, integrated result. GET Dynamic specified Comelit to provide fully-functional video door entry, without compromising on style or security, together with advanced access control and digital key functionality by ASSA ABLOY Global Solutions, all now operable from the main building app, ResiCentral.” Omar further stated, “The result is a unified experience that encompasses all the smart living features, expected by our future residents. The uptake of usage of the platform provides us with a unique window, into how we can better our delivery in the future.” Built-in smart hub and app capability Residents can benefit from the built-in smart hub and app capability, in order to control door entry security and access control, together with lighting, TV, blind automation and room temperature monitoring, and benefit from additional features, such as air quality, energy efficiency and occupancy monitoring. GET Dynamic’s Group CEO, James Baird, said “Our technology and platform is capable of bringing together every aspect of smart building automation in one system. Controlled by a single bespoke app, available in both iOS and Android, additional options provide customizable in-room tablet and streamlining, with our very own automation products.” Partnership with Comelit and ASSA ABLOY Global Solutions When selecting our specialist security partners, we have a long-established relationship with Comelit" He adds, “When selecting our specialist security partners, we have a long-established relationship with Comelit and know its video door entry systems are well-designed, robust and offer the latest smart video technology.” James further said, “The same is true for ASSA ABLOY Global Solutions. When brought together, Live Oasis presented the perfect opportunity to integrate the complete security operation into our app and offer an all-encompassing solution for a more enhanced user experience.” Integration with ResiCentral platform The virtual door entry and access control was integrated into the ResiCentral platform, with ASSA ABLOY Global Solutions’ technology for the building’s access control solutions, from perimeter protection to individual apartments. This also includes the ability for residents to gain convenient access to their accommodations, by using personal devices as a secure digital key. Comelit, with whom GET Dynamic has a close working partnership, was responsible for the IP door entry system installed at Live Oasis, operating from its renowned VIP technology. The system specified comprised two module video VIP entrance panels, together with a multi-user gateway, to allow for visual and audio individual apartment access. Smart home automation Stephen Wragg, Comelit’s Business Development Manager, said “Live Oasis is a development that really epitomizes the bustling and vibrant nature at the heart of Manchester, being a city where work and lifestyle balance is central to a commitment to evolve faster and smarter, with modern technology and community spirit.” He concludes, “Right from the specification process, the objective was to utilize latest smart solutions, to enable property owners and residents alike, a unified mobile experience. This is where ResiCentral, together with the advances of home automation, inclusive of Comelit’s video door entry, combined to provide a single cloud-based solution. The result helps property developers create safer, smarter buildings and at the same time, enhance the resident experience, taking all-inclusive mobile capability to a whole new level.”
Running a unified locking system for multiple municipal services may bring operational efficiencies. However, if the system is based on mechanical locks, it can also create time-consuming headaches. When keys go missing, for example, or user access requirements change, mechanical security does not have the flexibility to adapt quickly. For this reason, Vincennes city administrators sought a modern, electronic replacement for a master-key system whose lock-chart ran to 4,000 keys. Several locations around Vincennes — among them schools, nurseries, and the Town Hall elevator — relied on this complex locking solution. The costs and risk when keys went missing had become a growing logistical burden. Electronic locking system Vincennes officials tasked their city security director with finding a more responsive solution: An electronic locking system that is easy to install; does not require power to be cabled to every door or lock; and gives municipal staff the ability to tailor access rights for different people, to trace keyholder and lock interactions and to amend or revoke permissions when required. They also needed an established, trusted security partner able to offer all the necessary training and system support. An electronic locking system that is easy to install; does not require power to be cabled to every door or lock “A wired access control system was rejected because it required too much work to bring the power to each door,” says Fabrice Pain, Director at the Municipal Technical Center. “Now eCLIQ provides us access control without wiring at all.” Interior and exterior doors at buildings including the Hôtel de Ville, 11 nurseries, 12 schools, and the Municipal Technical Center are equipped with more than 650 programmable, electronic eCLIQ cylinders. Almost 1,000 battery-powered eCLIQ programmable keys have been issued to authorized staff. Solving the lost key problem and reducing thefts With eCLIQ, lost keys no longer threaten building security: They can simply be blacklisted by the city’s central eCLIQ management software, which saves the money spent on replacing mechanical locks. And because every key, lock, or user may be audited at any time, thefts from public property have dropped. The eCLIQ cylinder range brings almost any opening into an access system. Robust, durable eCLIQ locks can protect lifts, machines, mailboxes, cabinets, and more with the same security as sensitive doors. Robust, durable eCLIQ locks can protect lifts, machines, mailboxes, cabinets, and more with the same security as sensitive doorsCertified and available in multiple sizes and formats — including the EURO format first patented by an ASSA ABLOY Group brand nearly 100 years ago — eCLIQ cylinders maintain security and regulatory compliance across the city. During installation, no wiring or cabling was needed at the doors. A standard battery inside every programmable eCLIQ key powers the electronics inside the lock. Every authorized building user brings their own power to the door. Security solution Now, the city security team issues granular access to everyone who needs it and only where they need it from a single admin point. The new solution is popular with school and municipal staff, especially since a successful implementation of Vincennes’ integrated Vigipirate plan, in which eCLIQ plays an important role. With eCLIQ, Vincennes has found a security solution to match their image as a young, dynamic, tech-savvy place to live and work. More important still, eCLIQ key-based electronic access control has simplified security management and solved their lost key problem.
Round table discussion
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?