Industrial security systems
The opportunity for criminals to take advantage of COVID-19 face covering requirements presents a security challenge for commercial premises. The Face Recognition Company (FRC) is addressing that challenge with the addition of a new “unmasking” capability to its multi-camera face-recognition security system. Designed for a wide range of commercial environments, from retail outlets and hospitals to sports arenas and hotels, the FRC system identifies and alerts about individuals on a...
Allied Universal®, a security and facility services company in North America, launches its new, fully integrated marketing campaign titled ‘There for you’ which delivers on the company’s new purpose statement of ‘serving and safeguarding customers, communities and people in today’s world.’ Important role of safety With this new, bold campaign, Allied Universal displays the important role of safety and security in an individual’s ability to thrive a...
Global cyber and deep tech investor, Paladin Capital Group, announces the appointment of Ciaran Martin, CB, as a Managing Director. Ciaran joins Paladin from the UK Government’s National Cyber Security Center (NCSC), which he established as its first CEO in 2016 and is regarded as one of the best public authorities in the world for cybersecurity. The mission of the NCSC is to help make the UK a safe place to live and work online, working with the public sector, SMEs and industry, and the...
Designed with facilities managers and nominated Responsible Persons in mind, the guide has been created to be a trusted source of safety and compliance information. It is free for any business to download and use to review their own fire doors. In 2019, the Fire Door Inspection Scheme found that 76% of fire doors inspected were condemned as not fit for purpose, with excessive gaps, damaged smoke seals and poorly adjusted door closers the top reasons for failings. Fire door safety The research...
LexisNexis® Risk Solutions releases its biannual Cybercrime Report, which tracks global cybercrime activity from January 2020 through June 2020. The report dives deep into how the COVID-19 pandemic has impacted the global digital economy, regional economies, industries, businesses and consumer behavior. The period has seen strong transaction volume growth compared to 2019 but an overall decline in global attack volume. This is likely linked to growth in genuine customer activity due to chan...
CertAlarm, an organization offering a pan-European quality mark in the fire protection and security systems industry, has appointed Dr. Benoît Stockbroeckx as new Chair of its Technical Advisory Group (TAG). The TAG is CertAlarm’s organ to provide technical guidance on issues such as the interpretation of the respective standards or on the monitoring of the competence and integrity of the participating certification bodies and test laboratories. Dr. Benoît Stockbroeckx, who is...
Operational Technology (OT) networks are increasingly vulnerable to cyber-attacks as a result of ‘blind spots’ brought on by digital transformation and IIoT – a new report has warned. The report, published by Yokogawa UK and titled Industrial Cyber Threats: Processes & Protection for Industrial Control Systems, highlights the vulnerability of OT networks in critical infrastructure and industrial applications, such as utilities and petrochemical plants, energy generation, automated manufacturing, pharmaceutical production, and water networks. Targeting critical infrastructure Donal Bourke, Manager New Business & Advanced Solutions at Yokogawa UK & Ireland, says digital transformation and IIoT, while having enormous benefits, if not appropriately designed and managed can simultaneously create an acute danger. Unlike cyber-attacks on IT systems, attacks on OT networks are of significantly higher concern “Digitalization and the adoption of new technologies that facilitate interoperability, information flow and data insight, can create an OT ‘blind spot’ that can be exploited by state-sponsored action or by highly sophisticated lone-wolf hackers. They are increasingly targeting critical infrastructure with attacks that have the potential to disrupt the normal functioning of a society, such as power generation.” Vulnerabilities of OT systems Unlike cyber-attacks on IT systems, attacks on OT networks are of significantly higher concern and can have much graver implications. Mr Bourke continued: “At one time, industrial environments were considered immune to cyber-attack due to employing techniques such as air-gapping which is the physical isolation of networks." "This is no longer the case as digitalization, which has facilitated the convergence of IT and OT has created a larger threat attack surface for bad actors to gain access to a facility’s integrated control and safety systems. Today’s hackers recognize the vulnerabilities of OT systems and are actively looking for ways to compromize them.” Security management system Keeping one step ahead of hackers is difficult, not least because cyber threats are continually evolving" The report highlights the fact that OT security is in its infancy compared to IT security, despite the magnified risk, and urges government and industry to take a holistic approach. Mr Bourke adds: “There is no technology magic bullet that will mitigate the cybersecurity risk of increasing IT and OT convergence, the threat to control systems and human fallibility." "The solution lies in taking a more holistic approach that involves awareness training, risk assessments, the development of OT appropriate policies and procedures, and architecting a system which provides an organization with a comprehensive Cyber Security Management System.” Industrial control systems Mr Bourke concludes: “Keeping one step ahead of hackers is difficult, not least because cyber threats are continually evolving. Regulation, rightly, looks to maintain the pace but has also made OT cybersecurity a daunting challenge for most organizations. This report simplifies that problem, bringing together all the information necessary to develop an effective OT Cyber Security Management System." "No system is impregnable, and vulnerabilities will continue to be discovered across the OT domain. Even with generous investment, no plant can completely eliminate its risk exposure. It stands to reason that a holistic approach to cybersecurity is the only way to keep pace with the latest generations of malware tailored to industrial control systems.”
Door entry and access control manufacturer Videx has introduced a new handle for its range of MiAccess proximity readers. The HL1000-MF provides an ideal access control solution for small to mid-sized installations including offices, guest houses, industrial units and schools. The Mifare proximity handle can be used as a standalone unit or as part of a system including MiAccess readers and other accessories, such as the AL500-MF handle. Sian Luxton, Key Accounts Manager at Videx, said: “The HL1000-MF is an extremely versatile door handle and lock that can provide access to an unlimited number of users, access to one or more doors, and can restrict access whenever it is required therefore making it ideal for different access control solutions." Programming information Fobs are also available in a range of colors to further simplify the management of the system "It’s very easy to install and use too; all you need is the handle, a PC and a USB desk reader for programming alongside the user’s cards or fobs. User cards and fobs are programmed at the PC and then issued to the users without the need to visit the site or development to program anything further; saving time and cost because no wiring connections or power supply are required.” Fobs are also available in a range of colors to further simplify the management of the system. It is compatible with both the PROA MS and PROH MS MiAccess software, where programming, configuration settings and event logs of the built-in reader can be transferred between the PC and the reader. This is carried out via the micro-USB or with programming cards where the programming information is transferred from the card to the reader. Key override facility User cards can be created via the software with the PROX-USB desktop enrollment reader where access rights can be registered directly onto each corresponding card. Sian added: “The battery powered handle can be used internally or externally and has a robust stainless-steel body and handle. It also includes a dead lock with a key override facility to the secure side and thumb turn release for the inside." "Two override keys are included. It can be used on up to a maximum of 80 doors, has an unlimited user capacity and up to 3,500 events can be logged. There are four variants of the handle which can be used for inward or outward opening doors and doors which open to the right or the left.” The handle is powered by 4x standard AA batteries giving on average 60,000 opening cycles.
Suprema, a globally renowned provider of access control, biometrics and time and attendance solutions, invites industry members to the “Fusion Face Recognition” live session scheduled on September 17th, where it will introduce the new FaceStation F2 Fusion Multimodal Terminal. The live session is part of Suprema Connect 2020, Suprema’s first virtual event, designed to compensate for traditional security conferences, most of which were canceled due to COVID-19. At the Fusion Face Recognition live sessions, which will be held twice on the 17th (at 12AM and 4PM GMT+9) to accommodate for time difference, a Suprema expert will go over the features and technology of FaceStation F2 in detail. FaceStation F2 is Suprema’s 3rd generation face recognition terminal that provides exceptional authentication accuracy and anti-spoofing performance by combining visual and IR face recognition technology. Mask and temperature detection These live sessions, which will also be held twice each day, will introduce Suprema’s relevant solutions in detail It is equipped with untact photo enrollment feature as well as mask and temperature detection, meeting the needs of the post-pandemic world. On September 22nd and 24th, more live sessions are planned on the topics of “Mobile Access Solution” and “Access Control Solution.” These live sessions, which will also be held twice each day, will introduce Suprema’s relevant solutions in detail. Hosts will open up the floor for Q&A and discussions at the end and Suprema will select participants with the best questions to award Suprema Airfob Patches with credits. In-depth technical trainings In addition to the live sessions, over thirty on-demand videos on customer applications and in-depth technical trainings will be available on Suprema Connect 2020 website from the opening day (Septmeber 15th) for one month until the end of the event. Suprema encourages everyone to sign up on the Suprema Connect 2020 website to view the detailed schedule and receive updates and reminders about the event.
Fingerprint Cards AB (Fingerprints™) and Sentry Enterprises, a US-based manufacturer of converged biometric identification solutions, have entered into a global license agreement for Fingerprints’ software platform for access, FPC-BEP, as well as a volume agreement for the FPC T-Shape® sensor module to incorporate into its SentryCard™ security credential. The agreement features converged biometric credentials for physical and logical access to address the increased market demand for enhanced security across every industry, including financial institutions, healthcare and pharmaceutical companies. Standalone biometric solutions The SentryCard replaces standalone biometric solutions while leveraging the existing infrastructure for physical access control, supporting multiple industry standard protocols. With enrolled fingerprint biometrics stored and then matched on the physical card, the SentryCard supports compliance with GDPR and CCPA regulations as well as broader privacy standards addressing the key concerns of security professionals. “We chose biometric technology from Fingerprints as it is the leading biometrics company with proven and cutting-edge biometric performance. Our collaboration is wide ranging from product design and integration to system design and manufacturing,” said Mark Bennett, President and CEO of Sentry Enterprises. Trusted biometric solutions More secure and seamless access and authentication methods are now in high demand “We are pleased to collaborate with Sentry Enterprises and to see our sensors and software continuing to gain new ground within the access control market, where there is an increased demand for secure, convenient and trusted biometric solutions,” said Michel Roig, SVP Business Line Payment & Access at Fingerprints. With PINs and passwords offering a poor user experience, as well as being susceptible to compromise, more secure and seamless access and authentication methods are now in high demand and on the agendas of large multinational enterprises to keep the workplace safe in a more convenient and cost-effective way, both for physical access and to login to corporate systems and applications. Personal security credentials Biometrics can not only play a role in securing the modern workplace, but can also improve convenience, saving time and giving employees greater flexibility over how, when and where they work. Remote working is a trend that has accelerated in recent times. Also, in the wake of the pandemic, many people want to avoid touching surfaces in public environments as far as possible. Personal security credentials such as SentryCard offer a hygienic and convenient way of authenticating oneself. Sentry’s first-of-its-kind converged biometric credential launched in August and Sentry Enterprises will make its SentryCard generally available in Q4 2020.
FelenaSoft announced the release of Xeoma software version capable of detecting people that are or are not wearing protective facial masks. With the start of the pandemic a facial mask has become an essential part of the everyday life and an integral element of the safety rules in many governments. Thanks to current technological advances, cutting-edge solutions like Xeoma can aid humanity in the struggle. Xeoma’s Mask Detector is a fully automated, artificial intelligence-powered feature designed to detect people who are not wearing facial masks and who are thus putting surrounding people at risk. It can also work in reverse order (detect people in masks) - for example, for statistics purposes. The authorized personnel will be automatically notified (via email/SMS) upon detection of people who do not have facial masks on, which allows to react promptly to the threat of spreading the virus. Neural network mechanisms Features like Mask Detector alone can significantly reduce the number of cases of non-compliance Moreover, video and photo evidence of all detected cases of disobedience to government safety rules will be retained for the specified amount of time on- or off-premises, or even mailed to the authorized official. Using artificial intelligence and neural network mechanisms for face recognition, the module cannot just spot, but also identify the offender. Connected to fine-imposing systems, it can be a part of a complex solution that helps detect, identify and punish the rule-breaker. The inevitability of punishment has accumulative snowballing effect slowly turning the system's type from “post-incident” into “proactive”. Features like Mask Detector alone can significantly reduce the number of cases of non-compliance to safety rules and restrain the spread of COVID-19. But Xeoma has a lot more to offer. Ensure compliance with safety regulations The onset of the coronavirus pandemic has resulted in enforcing the law regarding the allowed number of people staying within a confined area. Xeoma’s Visitors Counter module helps automatically count the number of people leaving or entering the monitored area. Xeoma's AI-powered Color Recognition module can be used as a Fever Detector and greatly facilitate the process of spotting people with elevated body temperature or even mild fever. No need to have a staff member standing at the entrance with a thermometer gun, risking their lives every day, every hour any more. Allow the tireless machine vision do the job. Also, this module can be used alongside thermal cameras that enhances fever detection even more. During the pandemic the feature of recognizing people using Face Recognition is especially demanded to detect ones flouting safety regulations. Video surveillance solutions The solution encompasses many of the required tools and features to ensure safety during this challenging time Xeoma offers a digital solution to this request: its Face Recognition module uses artificial intelligence and neural networks to identify the person in sight with better accuracy. Social distancing has been proven to be one of the simplest and most effective precaution measures standing in the way of spreading the virus. Xeoma's Social Distance module is coming soon to detect the break of the allowed physical distancing between people. With Xeoma, the users don’t need to buy a lot of separate devices or solutions. The solution encompasses many of the required tools and features to ensure health and safety during this challenging time. Video surveillance means safety. Safety means life. Powerful video analytics that video surveillance solutions like Xeoma can provide are a sign that video surveillance systems have jumped from simple camera feed storing utilities to effective tools in marketing, business, policing, and process automation. AI-Powered Video Analytics Xeoma’s module emotions detector recognises eight emotional states (sadness, joy, surprise, disgust, fear, anger, neutral) which helps business owners know customers better and tailor the offers to meet the needs of target audience. More information can be known from the Age and Gender Recognizers to get demographic statistics in reports or in real time. These modules will help to create a perfect advertising strategy that hits the target. Detection of helmets automatically carries out an estimation of whether or not the necessary safety gear elements are present at a construction site. Reduce the number of accidents, protect the workers by helping them comply with safety regulations - simply, fully automated, affordably. Automatize routine processes Developed for over 10 years now, Xeoma is the front-liner software for video surveillance Detection of forgotten or missing objects can be of use in safe storage to trigger alarms in case valuables are approached to or missing; or in stations (railroad, sea, airports) for the system to automatically detect an unattended item even in spite of the constant flow of people around. Xeoma has over 100 of features, including over 30 modules that provide intelligent and flexible video analytics. It can help automatize routine processes, save on staff, reduce losses and increase profits. More features are added regularly. Developed for over 10 years now, Xeoma is the front-liner software for video surveillance. Responding to needs and challenges of users from all around the globe, it is compatible with nearly all camera models and operating systems. 3D multimedia spheres The solution offers simple interface, affordable pricing policy with no hidden costs, flexible setup to adjust to the user’s goals, coupled with advanced analytics and fast high-quality support team. With over 15 years of experience in video surveillance, video editing, 3D multimedia spheres, Felenasoft has developed trendsetting solutions for various industries, from retail to governmental organizations. Xeoma can be synchronized with access control systems, security systems and alarms, smart home devices and smart traffic management, and it is not even its full potential. All of the user’s needs can be met in Xeoma, whether they only opt for simple recording or they are willing to build their own cloud service.
2N, a global provider of IP access control systems, introduces its new 2N Indoor View answering unit for accepting video calls from 2N IP intercoms, making the whole intercom experience more stylish in the luxury apartments. The 2N Indoor View answering unit is equipped with a 7” color touchscreen display, providing a detailed view of incoming people from its scratch resistant 4-mm tempered glass panel. Users can easily and quickly display live video from the intercom and see who is at the front door in real-time, or they can replay missed or unanswered calls from unexpected visitors who have left a message. As the video call preview is enlarged, residents can read a courier’s name tag with ease. HD audio and noise cancellation also optimize the listening experience. Home automation systems All four products in the portfolio were developed with a focus on protecting customers from cyber security threats In addition, users will appreciate how easy it is to operate the unit on the large display and the home screen can even display the current weather forecast. There is also a new office stand so the unit can be used in the office interior as well. The 2N Indoor View completes 2N’s portfolio of answering units for 2N door intercoms, each of which meets the needs of a different target group and has its own 2N operating system and stylish design. The other products in the portfolio are the 2N Indoor Touch 2.0, which provides full integration with home automation systems and was the winner of the prestigious Red Dot Design Award, 2N Indoor Talk which won the iF Design Award, and the 2N Indoor Compact, both designed for normal residential complexes. All four products in the portfolio were developed with a focus on protecting customers from cyber security threats as well as on ensuring their physical safety. Great user experience Tomáš Vystavěl, 2N’s Chief Product Officer, said: “We have been inspired by our customers and we know that they take design just as seriously as innovation. The 2N Indoor View is a premium answering unit which is the result of our ongoing commitment to developing cutting-edge devices and setting the industry benchmarks." "Modern residential apartments deserve a great looking unit, and no one will be embarrassed to put the 2N Indoor View on the wall of their kitchen or living room. It will fit perfectly and provide a stylish look with a great user experience.” Highest quality audio components This is a premium product, so it was essential to come up with a design which added real aesthetic value" The 2N Indoor View comes in either a black or white design and the emphasis was placed on the selection of components of the very highest quality. The answering unit is protected by highly-resistant, carefully crafted glass and utilizes the highest quality audio components to achieve a clean sound without any echoe. The stylish new design was developed by a top Czech designer, Kryštof Nosál, who has won a number of prestigious international design awards including Red Dot, Good Design and the iF Design Award. Kryštof Nosál said: “This is a premium product, so it was essential to come up with a design which added real aesthetic value. It also needed to be flexible enough to fit seamlessly into all interiors." Custom operating system "The final design is an evolution from two earlier 2N products that we worked on - the Indoor Talk, which received an iF Design Award, and the Indoor Compact - with an emphasis on a sophisticated, classic look.” To install the device, all one needs is a UTP cable and an installation box. The 2N custom operating system is the guarantee of reliable operation and simple configuration. The device can also be configured remotely without the need to travel to the installation site. The product was developed and produced in Europe.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish. Major Security System Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome. While every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs. Product Knowledge Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing. What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going. Team work is essential with large projects not only to get the job done, but also to manage any risk Comprehensive Strategy At STANLEY Security we very much focus on identifying technology solutions that minimize financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery. A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two. Manage Any Risk Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate. High Security Requirements This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues. Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skillful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognizing industry leaders. Sold-Out Event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout Keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting Emerging Threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity Professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle Sensitive Data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. Today, even air travel seems incredibly risky, or at minimum a huge hassle. The good news is that the industry has adapted well without the shows. A series of “on-line shows” has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. It’s easy to dismiss these sessions as “Death by PowerPoint,” but some of them are incredibly informative. And conveniently accessible from the comfort of a home office. Internet transforming businesses We have already seen how the online world makes it easier than ever to connect with customers. In the consumer space, businesses like Uber, Shopify and Airbnb have proven that the Internet can transform how business is done. But in the security industry, we hear: “You can’t replace the value of meeting face to face.” That’s definitely true to some degree. A lesson of 2020 is the need to take a hard look at the economic model of trade shows However, the reality of 2020 suggests that there are alternatives that are almost - emphasis on almost - as good. And that don’t cost as much. And that don’t take away as much time from the office. And that don’t involve the effort of schlepping luggage through an airport yet again to a hotel in a beautiful city you will never see where you will spend three days in a big exhibit hall eating overpriced hot dogs and regretting your choice of footwear. Economic model of trade shows Sure, you’ll meet up with old pals, and get some value out of the experience. But how much value versus the cost? A lesson of 2020 is the need to take a hard look at the economic model of trade shows - how much they cost versus the value they provide. Considering how well we have gotten along without them, one wonders how and why trade shows have become such an integral part of our industry, and of hundreds of other industries, for that matter. I have had many conversations with exhibitors at trade shows in the last several decades. I have heard probably thousands of complaints about the slowness of the foot traffic, the high costs of exhibiting, the price and hassles of travel. The question I have often wondered (and asked): Is it worth it? Defray the costs Usually, the complaining exhibitor will reluctantly admit that it is, and/or provide some other justification, such as one of the following: All my competitors are here. If I don’t exhibit, it sends the wrong message to the market. That’s why I need to have the largest booth near the front of the show, too, because it’s all about perception and positioning ourselves in the market. We need the show for the sales leads, which drive our sales for the next six months. If I meet one large end user who turns into a big sale, the extra revenue pays for it all and makes everything worthwhile. This is the only time I get to see my sales staff or other coworkers from around the country. We have a sales meeting this week, too, so it helps to defray the costs. Success of alternatives The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come Given the experience of the year 2020 without any trade shows, might some of these justifications melt away? At a minimum, companies will be taking a hard look next year to evaluate what they missed about the trade show experience, and more importantly, what the impact was on their business (if any). What is the future of trade shows? After the 2020 hiatus, exhibitors and attendees alike will be starting with a clean slate, taking a fresh look, reexamining the value proposition with new eyes, braced by the successes (while acknowledging the failures) of alternatives that emerged as necessities during a global pandemic. Ensuring safety and security The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come - including trade shows. During the pandemic, we have all had to reinvent ourselves, deploy new strategies, work around new challenges, and in the end, hopefully, emerge better for it. There’s no reason trade shows shouldn’t undergo the same transformation. And it’s likely the “new normal” could look very different. The security market has found new opportunities during the pandemic, including new applications for existing technology and a renewed emphasis on the importance of ensuring safety and security. That positivity will hopefully carry our industry triumphantly into the new decade, and trade shows will adapt to find their place in the newly revitalized industry. As it should be.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promises to 'elevate the event experience with modern education learning experiences, revitalized networking opportunities, and a reimagined trade show floor.' More than 550 exhibitors will be featured in the expo hall (open Sept. 10-12), according to ASIS International. Chicago is a great location for GSX, as evidenced by the successful 2013 ASIS show. Cutting-Edge solutions X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding GSX seeks to attract more attendees to the exhibition hall with education events positioned alongside the industry’s latest-and-greatest equipment and technology exhibits. On the expo floor, the GSX: Disruption District will include new and enhanced programs such as the X Learning stages, the D3 (drones, droids, defense) Learning Theater, the Pitch Competition and the Innovative Product Awards. X Learning is a series of experiential sessions. X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding of new technology. GSX: Startup Sector highlights new companies with emerging technologies; and GSX: Pitch Competition brings together entrepreneurs, investors and industry leaders to feature early-stage startup pitches. Career HQ will provide free resume reviews, career coaching, professional development and networking opportunities. A Sharpshooter Contest sponsored by Smart Simulators and SB Tactical will allow contestants donating $20 to compete for $500 in prizes each day. Pre-Conference certification courses More than 300 security courses, plus pre-conference certification courses, will provide security professionals expertise to enhance their career development. Programming will be led by ASIS and InfraGard subject matter experts. (InfraGard is a non-profit organization serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation.) Seventeen education tracks will serve the needs of security professionals interested in topics from business continuity to crime/loss prevention, law and ethics to national security, information security to physical and operational security. The show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers 'Game Changer' sessions will address hot and controversial topics, including 'The Ever-Changing Drone Landscape: What You Need to Know' and 'Accelerating Digital Transformation: Insights and Applications.' Ian Bremmer of Eurasia Group will speak on navigating the geopolitical landscape; Steve Demetriou and Joe Olivarez of Jacobs, a global professional services company, will speak about harnessing technology and big data to make strategic decisions. Providing new opportunities Wednesday morning, General John F. Kelly of the U.S. Marine Corps (Ret), will provide insight into the evolving geopolitical landscape around the world. His keynote presentation on Sept. 11 will kick off Military and Law Enforcement Appreciation Day. Tarah Wheeler, cyber security researcher, will speak on protecting assets in the age of cybersecurity leaks and scandals. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry Although the attendee emphasis is on security end-users, the show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry, according to ASIS International. Networking events will include an ASIS Town Hall Meeting on the afternoon of Sept. 8, aimed at opening communication between ASIS staff and membership. There will be an Opening Night Celebration Sept. 8 centred on the theme 'Chicago on the Silver Screen' at Revel Motor Row, a popular Chicago landmark originally home to the Illinois Auto Club. Emphasis on education On Monday (Sept. 9) a networking luncheon will be followed by the Awards Reception later in the day. A reception in the evening will present the Karen Marquez Honors Award, recognizing a female security professional. Tuesday (Sept. 10) will have a Happy Hour at the exhibit hall, followed later by a Women in Security and Young Professionals Happy Hour. Wednesday evening will be the President’s Reception at Wintrust Arena, with a 1980s theme. The annual trade show has declined in recent years, and ASIS International has implemented changes that seek to reinvigorate the show, culminating in the rebranding last year. One challenge is that the show’s emphasis on education keeps attendees engaged for hours of the day, making it harder to meet the expectations of exhibiting companies who want more booth traffic. More attractions on the show floor, including the Tuesday happy hour, are aimed at increasing overall foot traffic in the hall.
Lufthansa Technik operates in a special division of the aviation industry, and security is a top priority to safeguard its people, planes and facilities. Over the years, the need to control access to its premises - particularly when it comes to external visitors - has become increasingly more important. A key challenge, however, is that Lufthansa Technik wants to maintain an inviting environment that feels free from restrictions, while also ensuring the highest security standards. Although Lufthansa Technik wants to prevent unauthorized access, it doesn’t want to hinder employees as they go about their day. It’s really important to the business to find the right balance between security and convenience, so people can feel secure but also free as they move around. And employees have a dynamic work environment that supports them in performing to the best of their ability. Unified access control Another key objective for Lufthansa Technik’s new access control system was unification. It has more than 35 locations and 100,000 employees worldwide and, in the past, each site was responsible for its own security. This would sometimes involve hiring specialists to solve the same problems at different locations. Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system Lufthansa Technik wanted to avoid this and ensure not just consistent security standards but a culture of great connection where people can easily network and collaborate wherever they’re based. As a result, Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system and follow the same standardized security policy. Access control system It also wants all employees to be able to use one single Lufthansa Technik badge to access all the locations they’re authorized to access - both locally and internationally. It was a big challenge to begin tackling, particularly when considering the IT challenges of implementing a unified access control system in multiple locations around the world. Lufthansa Technik began its search to find the right access control system by thoroughly researching the market and issuing an in-depth tender to a variety of suppliers. After detailed comparison, it chose Nedap. Melf Westphal, Head of Security Solutions at Lufthansa Technik, explains: “We were really impressed with Nedap’s entrepreneurial culture, hands-on mentality and personal approach. They were really reaching out to us, determined to find out exactly what we need. So we decided to implement Nedap’s AEOS system, which has helped us tremendously in meeting our requirements and creating a single system.” Security with convenience People set free to perform at their best Lufthansa Technik’s goals for its access control also align with Nedap’s people-first approach to providing ‘Security for life’. Nedap believes that a security system should be designed around the people using it, rather than the technology driving it. This ‘Security for life’ concept underline’s Nedap’s desire to free people’s minds from security so they can make the most of each day. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg Which, in turn, mirror’s Lufthansa Technik’s desire to balance security with convenience. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg, where it has 10,000 employees, followed by four affiliate locations. Melf says: “We weren’t sure at first how to go about it. But we got a lot of help from Nedap and their excellent partners, who were a great help to us during the implementation phase." Create tailormade solutions "The pilot project enabled us to overcome two major challenges: how to implement AEOS access control in our IT infrastructure and how to involve our employees. In both areas, Nedap and their partners did a wonderful job,” he continues. “It wasn’t only the really good products they presented to us. With their support, and that of their dedicated partners, they helped us solve all the operational issues." "And through their partner network, they enabled us to create tailormade solutions by offering third party integrations that matched our security demands. It’s meant that instead of barricading ourselves in we have relative freedom of movement. I feel very secure but I can use my badge to go anywhere. We have fantastic solutions and, importantly, the same Lufthansa Technik ID badge connects all of us – no matter where we’re based.” Third-party integrations The AEOS access control system that Lufthansa Technik implemented goes beyond just securing doors; they installed additional components such as key cabinets and visitor management. Melf says: “AEOS was a great help in this respect - it enabled us to bring in third-party providers. As Nedap has an ethos of working closely with third-party technology partners, and AEOS integrates easily with other systems, it means we weren’t restricted to just one solution." "We had the flexibility to create exactly what we wanted. I have a slogan when it comes to our security: ‘We open doors rather than close them.’ That’s really important to me,” Melf Westphal, Head of Security Solutions at Lufthansa Technik. For Lufthansa Technik, a key aspect of the pilot project and subsequent rollout is getting employees on board with the new access control system. Significant investment in training Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment It believes that even the best access control system loses its value if the people working with it don’t have the right mindset. For this reason, Lufthansa Technik made a significant investment in training, communication and awareness campaigns. These focused first on letting employees know how valuable they are, how important security is and why the security changes are being implemented. They’ve also made employees aware of the importance of anticipating security risks and of their own role in Lufthansa Technik’s security management system. Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment. And they’re all trained in how to respond to a security alert and address someone if they see them in a place they’re not supposed to be. New security system Importantly, Lufthansa Technik employees understand that their AEOS access control system is as much about preserving their freedom as it is about locking down their safety. The next steps for Lufthansa Technik are to continue rolling AEOS out worldwide. Melf explains: “The success of our new security system hasn’t gone unnoticed. Other Lufthansa Technik facilities have seen that AEOS has proved itself in practice in Hamburg, in a facility with 10,000 employees." "And we’ve seen an increase in requests for similar systems from facilities all over the world. Our goal now is to implement AEOS in all our locations worldwide, so we can truly build a unified security system that connects the entire Lufthansa Technik family. A security system that allows us to open doors, not close them.”
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
Video surveillance has many applications, and keeping a watchful eye on an active volcano ranks as an important one. IDIS’ video technology has been meeting the task as the video technology provider for the Volcan de Fuego project in Guatemala. This volcano, one of the world’s most active and dangerous, is now watched day and night in order to give early warning of impending eruptions. Continual live footage of the ‘Volcan de Fuego’ can now be viewed online by emergency agencies, scientists and residents, as it is all being captured by IDIS’ award winning 8MP 31x IR PTZ camera. Ultra-high definition Even from over nine miles away, the 8-megapixel model is delivering ultra-high definition, full day, and night surveillance of the active caldera, showing sudden gas and ash eruptions as often as every 15 to 20 minutes. In June 2018 nearly 200 people were killed on Volcan de Fuego during a series of explosions and pyroclastic flows which left little evacuation time. This was the volcano’s most powerful eruption since 1974 and its deadliest since 1929 but was far from an isolated incident. More than 60 major eruptions have been recorded over the last five centuries, and with 54,000 people living on the fertile farmlands within six miles of the crater, the risk remains high. DC-S3883HRX camera The H.265 IR DC-S3883HRX camera features an 8MP, auto focus, and 31x optical zoom lens Consequently, ultra-high definition, continual video monitoring, alongside data from sensors including seismology and gas detectors, now aims to protect vulnerable communities living around the volcano by giving early warning. The H.265 IR DC-S3883HRX camera, which features an 8MP, auto focus, and 31x optical zoom lens, IR performance up to 200m, and a highly sensitive auto-return positioning sensor, was installed by IDIS, its partner EPCOM and Guatemalan telecommunications specialist Crelosa. Like all IDIS cameras, the model, which has won two prestigious design awards, benefits from true, one-click plug-and-play set up, making it ideal for hassle-free installation at height, in challenging environments, and in locations where engineers are exposed to increased risk. Electronic image stabilization The IDIS PTZ also features true wide dynamic range (WDR), allowing it to cope easily in changing lighting conditions; electronic image stabilization (EIS) ensures steady coverage of scenes at distance, so images from the volcano remain crisp and sharp; and H.265 and intelligent codec requires minimum bandwidth even for 4K live monitoring. The camera also remains stable despite the region’s variable weather conditions including under strong sun, and when temperatures that fall sharply at night. The water droplet wiper proves essential during the rainy season. Smart failover and IDIS’ Ultimate Warranty gives Crelosa and the Volcan de Fuego monitoring agencies peace of mind that the camera will continue to deliver outstanding video in one of the world’s most dramatic settings.
Staff safety and customer service will be boosted across Sydney’s rail network with the deployment of SafeZone®, the pioneering safety, security and emergency management solution from CriticalArc. The technology will enable Sydney Trains to manage a wide range of situations, including mitigating risks to staff and customers and strengthening the capacity to respond to incidents and emergencies across the network. SafeZone will put up to 2,500 of Sydney Trains’ front-line staff directly in touch with security control room teams, letting them summon immediate assistance at the touch of a button via their assigned smartphone. This capability is as valuable on crowded city platforms at rush-hour as it is on more remote suburban stations where staff may be working alone late at night. Enhancing staff safety The investment in SafeZone will cover over 175 stations across the greater Sydney area and is the latest step in a modernization drive to transform Sydney Trains’ operations, with more than a million customer journeys taken on the network every weekday. Employing proven technology such as SafeZone will help us solve day-to-day challenges" “Sydney Trains is committed to fulfilling our duty of care to all of our staff and enhancing our high safety standards in order to maintain and enrich customer service levels on station platforms,” explains Mark Edmonds, Manager of Security Capability, Network Operations. “Employing proven technology such as SafeZone will help us solve day-to-day challenges, further improving the safety of our staff and helping them work more effectively to continue to deliver world-class service.” Real-time situational awareness Across its transportation network, Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events. This makes possible a wide range of security management functions, such as sending targeted alerts to specific individuals and groups. It enables control room operators to pinpoint the location of individuals needing help so they can initiate the most efficient and rapid emergency response. “This visionary deployment by Sydney Trains will have a significant impact on the safety and wellbeing of staff and thus will produce dividends with regards to customer service and satisfaction, and the potential for streamlined operations moving forward,” says Glenn Farrant, CEO, CriticalArc. “With staff safety a primary concern for all rail operators internationally, implementation of this technology by Sydney Trains represents a significant step forward for the sector and will be the blueprint for many implementations to follow.”
Generally, the Less Than Load (LTL) industry is always looking to increase the amount of product shipped per truck. A lesser amount of product on a truck equates to a lower amount of billable product per trip. Raw Load Average (RLA) Raw Load Average (RLA) is the percentage of product on a truck – 100% is a completely full trailer. As the name implies, LTL averages less than 100%. In the fast- paced world of logistics, delivering millions of packages per day, than how do companies maximize the RLA? Most shipping managers are responsible for inspecting each trailer, before it leaves for several additional items. They make sure that the packages are secure and then evaluate whether the truck can handle any more inventory. There might be 200+ dock doors in a 400,000 sq. ft. facility and dozens of trucks waiting to leave and get on with their trips. At peak times, inspections will require several individuals running all over the facility. Less Than Load (LTL) Industry experts estimate that only about 80% of trucks are actually inspected Industry experts estimate that only about 80% of trucks are actually inspected. The missed trucks are now at risk for unsecured packages arriving damaged. More importantly, they are leaving 74% full. If the truck had waited another 30 minutes for inspection, they could have added another one skid of products to increase the load to 75%. That 1% difference does not sound like much. However, considering the volume of shipments that the top 10 LTL companies deliver, the 1% will amount to somewhere between US$ 6 million and US$ 12 million per year, which goes directly to the bottom line. Role of video security systems So, what is the role of security video systems here? Well most people say that security video does not have a real Return on Investment (ROI) in its traditional role. It’s hard to disagree. One exception might be when security companies have used video systems to reduce the number of guards. Using video, one guard can see as much as 3 or 4 guards could see in the past, without ever having to leave their post. This certainly reduces cost, but at the end of the day, guarding is still an overall cost to the bottom line. This case study will highlight how a couple of Salient’s very resourceful customers have transformed video into cash generating systems. Operational efficiency with video In the guarding scenario, video can put one person in several places at once. This operational efficiency can also be applied to how many people are needed to inspect trailers. But the ROI doesn’t come from removing a couple of salaries from the payroll. The real money comes into play because now inspecting 100% of the trailers leaving the dock are possible versus 80% and get that RLA up by 2 or 3%. Then, it’s about the big bucks. And that’s just the tip of the iceberg, when looking at the overall operational efficiencies available by utilizing video. Using video for misclassified products or shipment validation In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified when shipped. All products being shipped have a classification, and each classification has a specific associated cost. These per-pound costs fluctuate based on the value of the product, required insurance, risk and other factors. An example would be a sporting goods manufacturer shipping ammunition and firearms, under the code for clothing. In this example, a 200-pound load would be billed at about US$ 100, when it should be billed at closer to US$ 300. Multiply this by hundreds of packages a day and the total of the missed revenue is astronomical. So how would a video surveillance system correct this problem? Certainly, security cameras cannot see though a box, but one would expect a box with 200 pounds of clothes to be a fairly large box. But if the box were full of firearms or ammunition, the video would reveal a much smaller box. This anomaly when noticed would prompt an operator to investigate the contents of the box and contact the manufacturer to rectify the billed amount. This process might seem a bit hypothetical, but already a current customer of Salient Systems is capturing over US$ 40 million a year with the right system components. Using video to reduce OSHA violations and false claims The logistics industry requires a tremendous amount of labor in order to operate. The more labor hours, the greater the propensity for on-the-job injuries, OSHA violations, insurance payouts, lawsuits and business interruption. False claims are also a consideration. Let’s look at some real-world examples of using video to reduce or eliminate these issues: OSHA reports that 5,250 workers died on the job in 2018 (3.5 per 100,000 full-time equivalent workers), on average, more than 100 a week or more than 14 deaths every day. The loss of an employee is one of the most emotionally devastating situations a business can encounter. There are several benefits of video that can increase safety. One result of a fatality is typically an OSHA investigation. An action item that could result from this investigation would be to increase security guards. This is a perpetual cost that could continue for several months to years. Video systems enhance guards’ efficiency Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas at the same time. The systems can be coupled with the use of video analytics to alert guards to specific situations such as motion in areas that should be unoccupied or traffic proceeding in an unauthorized direction. In these ways, video systems can reduce the quantity of physical guards, thereby reducing the cost. One of Salient’s customers is saving almost US$ 20,000 per month with the reduction of two guards and it has OSHA’s approval. The end result is that the safety of the employees has been increased and operational cost is lowered by implementing technology. Inadvertently, this same type deployment at another facility helped mitigate a US$ 900,000 slip-and-fall lawsuit, which could have also been a possible cause for an OSHA investigation. Validation of safety policy Validation of safety policy can also be a drain on resources. Auditing seatbelt use for forklift drivers, pedestrians using appropriate marked walking paths, and proper social distancing in work spaces are a few examples among many. Assigning an individual to monitor this activity is costly and people typically obey the rules only when that individual is present. However, video can capture this information all the time without huge labor cost. This information can then be audited and used for education processes. OSHA statistics indicate that there are roughly 85 forklift fatalities and 34,900 serious injuries each year, with 42 percent of the forklift fatalities from the operator's being crushed by a tipping vehicle. The safest place for the driver to be is strapped. A facility that used video to audit seatbelt usage showed a 65% compliance rate. After the information was presented to the manager and employees, the next audit resulted in a jump to 87% compliance rate. In the event of an injury, this type of verifiable data can go a long way to prove that the employer is serious about employee safety and investing in ways to improve the safety culture within the company. Using video to increase sales LTL is a very competitive business and it is viewed primarily as a commodity type operation LTL is a very competitive business and it is viewed primarily as a commodity type operation. A few pennies per pound can typically sway a decision-maker. Already some great operational efficiencies and benefits from video to lower cost and to making LTL more competitive has been discussed. But these ideas still don’t move LTL out of the ‘dog-eat-dog race to the bottom on price’ world. Now, let’s look at how to use the implementation of these same video systems to provide value propositions and competitive advantages for customers. Many LTL customers have sensitive merchandise for which the safety and security of its delivery might outweigh cost differences. An example is freight regulated by government agencies, such as Drug Enforcement Agency (DEA), Alcohol, Tobacco and Firearms Agency (ATF), and Dept. of Energy (DOE). For example, the DEA reported ‘The overall trend of incidents of Controlled Prescription Drugs lost in transit increased in 2018 with the highest number since 2010.’ Extra layer of security And the ATF’s Interstate Theft Program states that ‘Under the program, hundreds of reports of thefts and losses from interstate shipments are received each year’. With statistics like these, customers in these categories have a heightened sense of vulnerability. Offering systems such as surveillance video can add that extra layer of security and added confidence. This is a marketable differentiator to help LTL companies set themselves apart from the traditional companies that only offer a lower cost. This, bundled with some of the other cost-saving measures outlined above, could be the icing on the cake needed for security departments to convince C-Level executives in their organization to invest in video.
Toyota Argentina has been operating in the country for 26 years. It represents 40% of the exports of automotive companies in 2019 and currently has an annual production capacity of 141,000 units, exporting 75% of its production to 22 Latin American countries and to the Caribbean. Toyota’s Zárate plant in Argentina, which was closed due to COVID-19, is ready to reopen with new regulations to ensure the security of its employees. Given the need to apply a health protocol against the pandemic and resume a safe operation, Toyota Argentina carried out an analysis of the new technologies on the market and chose the Dahua Thermal Body Temperature Monitoring Solution for its high quality and high cost-performance value. Safety at the factory Due to the large number of people entering and leaving the factory every day, the automaker required a safe and efficient solution to help them control the commuting staff (including 1,500 employees that take buses, 900 employees that use parking lots and 700 contractors) without delays, while complying with the new government regulations. The solution included 4 sets of Dahua Thermal Body Temperature Monitoring equipment (DHI-NVR4216-I + TPC-BF-5421 + Blackbody). They were installed in different entrances, providing a non-invasive way to check the body temperature of their employees at the same time, ensuring that the temperature of the people entering the plant is normal. Maximising employee security “This situation took us from having two production shifts before the pandemic to one production shift only, having to rise the number of buses to bring employees and contractors to the plant, as well as applying additional security measures in dining rooms, common areas, and production line for social distancing and cleaning and hygiene measures,” said Alberto Martín López, Corporate Security Manager at Toyota Motor Corporation. The training of personnel was also conducted to allow them to be familiar with the equipment"“Before this implementation, every shift entered and leave the plant in 30 minutes. Now, maintaining a rhythm of fluid access and social distancing, we do it in 45 minutes but in a more secure way, ensuring a competitive timing and maximizing our employees’ security,” explains López regarding the immediate benefit of the solution in the daily operation of the company. Production resuming “The installation and calibration was relatively quick. The Zárate Plant was operational in 3 days, with the addition of some infrastructure improvements on the entry/exit areas, since work was carried out in semi-open places and the impact of climate changes had to be reduced. In this period, the training of personnel was also conducted to allow them to be familiar with the equipment and to ensure the equipment’s usage life,” he added. The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners In addition, López also mentioned that “The current COVID-19 protocol was also implemented, randomly testing staff that reaches about 100 tests daily. These types of new technologies facilitate and maintain a safe production operation and care for our employees and contractors, allowing us to comply with the demand of our customers.” Business security The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners and can screen massive number of employees at a safe distance, enabling efficient entry/exit access for employees. It provides security guarantee for Toyota Argentina’s reopening and routine operations, while meeting the government’s business resumption requirements. "This technology allows companies to return to business in an orderly manner and be compliant with the measures dictated by official entities. This reinforces Dahua Technology's commitment to provide solutions that aid prevention measures during this pandemic. The objective is to be able to continue offering solutions that facilitate community care by supporting the economic business resumption of industries,” says Franky Su, Dahua Technology Country Manager for Argentina & Uruguay. Specific solutions and products might vary depending on the different regulations and measures for COVID-19 in each country.
Round table discussion
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?