AlertEnterprise Inc., global physical-logical security convergence software company, has announced its latest evolution in insider threat protection with the launch of its next-generation Identity Intelligence technology, available in the upcoming release of Enterprise Guardian and Enterprise Sentry software (“The system”). Identity Intelligence Technology Identity Intelligence technology is designed to dramatically reduce the time and cost for detecting and resolving risk by automa...
Raytheon Company (RTN) and German sensor specialist HENSOLDT, both globally renowned air traffic radar providers, are on path to provide two European customers integrated air surveillance radars that combine HENSOLDT’s next-generation primary airport surveillance radar (ASR-NG) and Raytheon’s Mode S monopulse secondary surveillance radar (Condor Mk 3). World Air Traffic Management Congress 2019 As reported by both companies at World Air Traffic Management (ATM) Congress 2019 in Mad...
IONODES, a market innovator in dedicated IP video appliances, announced that it has joined the Genetec Technology Partner Program as a Silver Partner. Genetec is a global provider of unified security, public safety, operations, and business intelligence solutions. IONODES’ Secure Display Stations, which offer a secure and reliable video wall and spot monitor solution, is now fully integrated with Genetec Security Center. The integration is available as of Security Center 5.7 Service Releas...
Booth number: 16115 Arteco is a global provider of event-driven intelligence solutions with a focus on ease of use and event management. Arteco's Video Event Management Software is designed to help users gain the most relevant video and security information at any given time by identifying critical events and areas of interest. Arteco’s research and development initiatives have united world-class, state-of-the-art video analytics and video management onto a single platform to...
Princeton Identity Inc., the identity management company, announced the launch of its new IOM Access600e iris and face biometric capture device, a premium level unit designed for high volume enrollment and fast, convenient identification in high security, high throughput applications. The Access600e replaces the company’s Access500e model, offering superior performance, significantly lower pricing, and a sleek, updated form factor that allows it to fit easily on tight table counters. The...
AlgoSec, the network security management vendor, announced a new integration with the IBM Resilient Incident Response Platform (IRP), enabling organizations to tie security incidents and attacks directly to the business processes that could be impacted. AlgoSec’s integration provides security analysts with the ability to enrich the Resilient IRP with critical business and network context to immediately assess an incident’s potential business impact, and to prioritize and autom...
AMAG Technology hosted its annual Security Engineering Symposium in Miami, Florida, February 15-18, 2019 at the Trump National Doral Miami. Eighty end users, consultants and integrators were in attendance. Guests were treated to two days of interactive presentations with thought leaders in compliance, AI, edge technology, insider threat, and open technologies and were taught how to apply what it means to them to understand how to utilize the right solutions to mitigate risks, ensure compliance and save money. AMAG Technology President, Kurt Takahashi and Director of Business Development, Kami Dukes opened the conference by welcoming attendees and introducing honored guests and AMAG staff. Chief Operating Officer, Howard Johnson and Vice President of Products and Partner Programs, Jason Schimpf presented Your Voice, Our Vision, and discussed AMAG’s vision for the future which is based on customer feedback and the technology innovation needed to meet today’s threats. Discussing Security Trends Our goal this year was to change and improve the format to provide digestible, useable content that was valuable to our attendees"A Platinum panel based on the theme, Achieve More Together, discussed security trends, customer needs and how best to move forward together to be successful. Two TED style talks featured Open Ideas with Dukes and Senior Director of Global Sales, Justin Wilmas and People Within with Business Development Manager, Dan Bissmeyer. “Our goal this year was to change and improve the format to provide digestible, useable content that was valuable to our attendees, and I believe we met that goal,” said Dukes. “Our diverse audience inspired impactful discussions surrounding topics that affect vertical markets dealing with compliance challenges, and I am proud to announce that together we raised nearly $9,500.00 for St. Jude Children’s Hospital.” Integrating Access Control With Video “AMAG hosted a first-class event that provided the opportunity to network with AMAG, as well as many end users and vendors," said Salt Lake City Police Department Captain, Scott Teerlink. "The format allowed for much discussion not only about the Symmetry solution, but with how to better integrate access control with video, audio, and other innovative solutions to improve our site security while simplifying and reducing time needed to complete the critical tasks necessary to ensure our facilities are secure. “I left with a better understanding about AMAG, the Symmetry solution and what's new in the security industry. Most importantly, I met outstanding people that will be a tremendous asset as we work to adapt and evolve our systems to best meet our changing environment and needs." Building Relationships With Security Professionals The Security Engineering Symposium provided a wonderful opportunity to network and build relationships with fellow security professionals"Ten certified technology partners worked together to deliver theme-based presentations to attendees. Platinum Level sponsors, ASSA ABLOY and Vingtor Stentofon presented Living on the Edge. Gold level sponsors Axis Communications and Salient Systems presented Take Tech to the Biz. Gold sponsors LifeSafety Power and Winsted presented Automation & Compliance. Silver sponsors shared a breakout session and included Idemia, IRIS ID, LiveSafe and Wavelynx. "The Security Engineering Symposium provided a wonderful opportunity to network and build relationships with fellow security professionals," said Jorge Gomez PE, RCDD, Managing Member/Project Engineer, J&A Engineering Consultants. "The event revitalized me and renewed my excitement about the security industry." During the closing banquet, a representative from St. Jude’s Research Hospital presented about the mission and advances St. Jude’s is making in pediatric cancer research. Our generous SES19 sponsors and attendees together raised $4,728.00, which was matched by AMAG for a record setting total of $9,456.00! “We are so thankful to our integrators, consultants, partners and end users for their generosity, and are thrilled to donate such a large sum to St. Jude,” said Dukes.
Altek Corp., global digital imaging company based in Taiwan, is introducing three new technologies: Vision AI chips, AI commercial surveillance cameras, and 3D depth image sensing modules with the theme of ‘Bringing Vision AI to The Edge’. The company’s vision AI chip and AI commercial surveillance cameras enable high-resolution smart surveillance by supporting AI human/object detection, event detection and behavior recognition. The entire AI process is conducted in the camera and corresponding alerts are sent out according to the detection results. It reduces the network bandwidth for data transmission to the cloud and improves the AI detection speed. This technology can be utilized in multiple use cases, including in retail, restaurants and hospitals. Altek also has collaborated with global tech leaders in providing commercial/home use surveillance system with edge vision AI capability" “Being dedicated to more than 20 years in digital imaging, Altek believes that edge vision AI will unleash remarkable market demands.” Alex Hsia, Chairman of Altek Corporation said. “Recently, Altek also has collaborated with global tech leaders in providing commercial/home use surveillance system with edge vision AI capability, aiming to bring the surveillance environment in retail, manufacturing, factory and home to new level of experience.” Altek – CyberLink Software Integration In partnership with CyberLink Corp. (5203.TW), Altek’s 3D sensing solution has been integrated with CyberLink’s AI facial recognition engine FaceMe. The new integration strives to enhance the anti-spoofing capabilities of smart security systems, enabling them to accurately detect facial images and videos apart from live human faces. “Anti-spoofing is vital for smart security and other AIoT applications. CyberLink’s FaceMe engine is capable of accurate anti-spoofing by utilizing an array of inputs including 2D & 3D cameras, human head motions, voice, and mainstream 3D imaging technologies including Altek’s active stereo technology. This allows FaceMe to achieve highly accurate human face pairing with faultless anti-spoofing results,” said Dr. Jau Huang, CEO of CyberLink. “Through our collaboration with Altek Corp., we hope to implement FaceMe’s high-accuracy facial recognition technology into 3D camera solutions to deliver safer and more reliable facial recognition capabilities to hardware manufacturers of mobile phones, door access control systems, and a number of other applications.” Edge Vision AI Technology With Microsoft and Qualcomm, Altek also co-developed a Visions AI Developer Kit Altek has also co-developed products with other global tech leaders to demonstrate its commitment to commercializing edge vision AI technology. With Qualcomm, the company has co-developed a commercial AI surveillance IP camera. This camera is powered by QCS603 platform with distributed edge AI computing power to enable AI detection of humans and objects within the recognition area in the camera. It also supports Amazon KVS so that users can leverage the AWS cloud platform to access, process and store streaming video with ease for further analysis by deep learning. Visions AI Developer Kit With Microsoft and Qualcomm, Altek also co-developed a Visions AI Developer Kit. By supporting Microsoft Azure IoT Edge and using Qualcomm AI Engine, it strengthens Azure’s deep learning service and delivers ultra-high resolution video quality, creating optimal capability for processing vision AI at the edge for various markets and applications. Having established itself in the market of edge vision AI, Altek has integrated its software/hardware systems, chips and algorithms, and continues to collaborate with leading technology providers to leverage technological advantages and industry experiences to expand sales channels and provide omnidirectional services in the field of edge vision AI.
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX Camera Platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensors and devices in the network to enable "Beyond Human Vision" solutions. These solutions include the reliable detection of threats through the combination of different sensor technologies as well as the independent initiation of measures to counter such threats. Increased Process Efficiency The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models. Future software updates will enable completely new functions based on deep learning methods, such as the recognition of human behavior, moods or voices. In order to make this possible, a so-called "plug-in concept" is being further developed that goes far beyond what is available on competing products. This allows customers to easily create new features similar to developing apps for mobile devices while taking full advantage of the system's performance, including full CPU and GPU power and programmable logic. Examples could be analyzing customer behavior in retail situations and detect emergency situations in elderly homes and hospitals or analyze quality in production lines. The first products based on the new camera platform will be launched in the first quarter of our financial year 2019/20.
Senstar, a global provider of video management and perimeter intrusion detection solutions (PIDS), is pleased to announce the release of Symphony 7.2, the latest version of its intelligent video management software (VMS). The award winning Senstar Symphony delivers an all-in-one solution for video management, video analytics, PIDS integration, and alarm management for deployments of all sizes. Key Highlights: Securely share video clips with 3rd parties with integrated cloud video upload feature Revamped Alarm Console allows for better event management with simplified workflow Seamlessly navigate from camera to camera with Visual Tracking Links PostgreSQL database support Streamlining User Experience “The latest version of Symphony further streamlines the user experience by reducing task effort in common scenarios such as video export and alarm management," said Justin Schorn, Vice President of Product Management at Senstar. "With Symphony 7.2, we continue to build on our success as one of the industry’s most trusted and reliable video management software providers." Senstar Symphony 7.2 is available worldwide in Arabic, Chinese (Simplified), English, French, German, Portuguese, Spanish and Turkish. Senstar hardware appliances such as the R-Series can be upgraded to the latest version with a valid maintenance agreement.
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced Security And Privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID solutions. GenKey’s ID platform has helped many governments and organizations to improve inclusivity, reduce fraud and improve time and cost efficiencies. IrisID, the world’s most deployed iris recognition platform, provides advanced security and privacy, which further enhances GenKey’s ID platform. “GenKey’s ID platform is being used to identify and verify millions of people in several countries worldwide,” said Arnd Langguth, chief operating officer, GenKey. “We are experts in fingerprint biometrics, but our ID platform has been designed for multi-modality. Our customers expect proven, secure, high performance, that is why we choose IrisID. IrisID’s IrisAccelerator will plug-in seamlessly into our ID platform.” Iris ID Biometrics Authentication Systems The integration into Genkey’s ID platform now offers full deduplication on both modalities" The Iris ID technology provides a fast, accurate and non-contact method of capturing citizens’ biometrics, identifying people and detecting duplicates. Iris ID authentication systems are used worldwide for access control, time and attendance checks, national ID programs, border crossings, voter registration, and many other applications. The company’s solutions are currently being used by public and private organizations across Africa and on five other continents. Mohammed Murad, vice president of global sales and business development, Iris ID said the company’s technology is a natural fit with GenKey. Integration With GenKey Biometrics ID Platform “Our cameras are unaffected by dirt, grease, gloves, facial hair and other factors that can limit the quality of registration and identity verification of other biometric systems.” he said. “In addition to its speed and accuracy, our software has been proven to be highly effective for deduplication – the elimination of multiple registrations by the same person. The integration into Genkey’s ID platform now offers full deduplication on both modalities.” GenKey’s ID platform is designed for capturing biographic and biometric data of individuals in small to large-scale registrations and ensuring that each subject stored is unique. Besides its standard registration, verification and reporting modules, the software has customized modules for biometric voter verification, election management and biometric member verification for healthcare, and other use cases.
Eagle Eye Networks, global cloud video surveillance solutions provider, has announced the expansion of the Eagle Eye Cloud Video Application Programming Interface (API) Developer Program. Eagle Eye Cloud Video API Developer Program participants receive an Eagle Eye Video API account, along with discounted equipment to connect compatible security cameras to the Eagle Eye Cloud Video Surveillance platform. Additionally, they receive access to sample code, training, phone support and assistance with system design. Eagle Eye Video API The Eagle Eye Video API provides a set of tools to quickly build or integrate applications with both live and recorded video from surveillance cameras. The applications can range from very simple to highly complex. Eagle Eye Networks does the heavy lifting of capturing, storing, and indexing the video and events. The Eagle Eye Video API eliminates the high infrastructure burden of traditional video system integration Developers can search, modify, tag, play, share, and stream the video in their apps with a few lines of code. There are unlimited new applications for visualization and analysis, such as point-of-sale, customer service, video alerts, employee training and more. Big Data Video Framework Eagle Eye Networks’ RESTful Video API is easy to use, scalable, secure, reliable, and redundant, providing a robust set of storage, analytics, indexing, and interfaces for quickly building or integrating applications with both live and recorded video. The Eagle Eye Video API eliminates the high infrastructure burden of traditional video system integration, by removing the requirement to purchase and install servers, storage, and software and hire staff to assemble and maintain the infrastructure before beginning development. The platform uses the Eagle Eye Big Data Video Framework, with time-based data structures for indexing, search, retrieval and analysis of the video. There are no extra charges for using the Eagle Eye Cloud VMS API. Some examples of API usage include analytics integration, user database integration, simplified user interface development, specialized mobile app development, and many more.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (video surveillance at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labor to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS Design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open Architecture Platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple Licensing Processes And Pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing And Matching Camera License Types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto Camera Detection And Configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart Camera Driver Technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance Of Network Security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomized video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic Updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
A rapid string of merger and acquisition (M&A) transactions as 2018 passed into 2019 suggests the physical security industry may be on the verge of a busy year of companies buying other companies. Observers have noted a large amount of investment capital currently available to be invested in security M&A, and plenty of entrepreneurial companies are looking to be acquired. Joe Grillo, CEO of ACRE, previously hinted at upcoming M&A activity for his company by the end of 2018, foreshadowing ACRE’s late-year announcement to acquire access control company Open Options, Addison, Texas.The VaaS cloud-based image capture platform includes fixed and mobile license plate reader cameras driven by machine learning Just days later, in the midst of the holiday season, Qognify announced its plan to acquire On-Net Surveillance Systems Inc. (OnSSI) and sister company SeeTec GmbH. Then came an even larger announcement: Motorola has acquired VaaS International Holdings Inc., a data and image analytics company for $445 million. The VaaS cloud-based image capture and analysis platform includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. Most recently, ADT announced yet another acquisition, Advanced Cabling Systems, a technology integration company in the South, thus continuing consolidation on the integration side of the business. There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019 Continuation Of The Trend In the case of the Qognify and Motorola deals, Jon Cropley, Principal Analyst, Video Surveillance & Security Services, IHS Global Limited, sees them as the next chapter in an M&A trend going back several years. “I think this is a continuation of what we have been seeing in recent years of video surveillance software vendors being acquired,” he says.In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features" “In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features and are looking at software to offer unique competitive advantages.” In short, he sees it as a continuation of a trend that previously saw Canon acquiring Milestone Systems and Briefcam, Panasonic acquiring Video Insight and Tyco acquiring Exacq. “There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019,” adds Cropley. “However, a spree of large-scale mergers and acquisitions is not expected.” Memoori, another market research firm, forecasts that the value of acquisitions could actually decline marginally in 2019 in value terms but increase in number. This observation is based on Memoori’s charting of physical security deals over the last 18 years. Jim McHale, Managing Director of Memoori, says there have been four cycles of increase and decline in activity, often exaggerated by billion dollar deals in one year such as the merger of Johnson Controls and Tyco of $165Bn in 2016. Access control when combined with identity management is punching well above its weight, and this trend has continued Access Control To Open Systems Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead“It may be too early to make judgements on the future based on the last four weeks, but there are some interesting points that can be made when compared with our 2018 analysis,” says McHale. “Access control when combined with identity management is punching well above its weight, and this trend has continued. "Acre has been a major contributor and has completed some 10 acquisitions. In general, the access control business has been slow to move to open systems, and hopefully we can expect this trend toward openness to continue as it will give additional growth to the business.” For more commentary from Memoori, see their report “Major Trends in the Global Access Control Market 2018”. Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead. While past trends may provide a glimpse of what’s coming, there are always new variables. It’s a sure bet the overall trend toward consolidation will continue but predicting the pace and timing of individual transactions is almost impossible. In any case, it will be interesting to watch how 2019 unfolds on the M&A front, among other factors in a changing industry.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customized Security Solution And Integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customized security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire Protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular Alarm System Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
As part of a new centrally controlled vehicle security system, The North West Ambulance Service has recently updated the security of its premises at its Lancashire regional headquarters using Nortech’s stainless steel bollards that house Nedap ANPR cameras. The North West Ambulance Service (NWAS) NHS Trust operates around 1,000 vehicles to provide 1.1 million emergency and non-emergency patient journeys. It was established in 2006 by the merger of ambulance trusts from Greater Manchester, Cheshire and Merseyside, Cumbria and Lancashire. The Lancashire regional HQ is based near Broughton in Preston. Securing The Perimeter Nortech supplied the ANPR camera housed in a robust stainless steel bollard to protect the camera from any potential vehicle knocksThe trust needed to secure the perimeters of their premises at the Lancashire regional HQ and appointed Expert Security UK, Frank Whittle Partnerships and W. Monks Ltd to design and install the new centrally controlled vehicle security system. Expert Security UK approached Nortech in order to integrate the Nedap Automatic Number Plate Recognition (ANPR) into the system and new automatic barriers were installed to secure the perimeter and prevent unauthorized vehicles. Nortech supplied the ANPR camera housed in a robust stainless steel bollard to protect the camera from any potential vehicle knocks. As vehicles approach the new barriers, the ANPR reads the number plates and converts each valid number plate into a Wiegand ID string, which it sends to the access control panel in the same way as a standard card reader. The Wiegand number can then be checked centrally for access rights so that vehicle access can be granted or denied accordingly. Preventing Unauthorized Parking The barrier system is a great security measure for us and has prevented unauthorized parking"Danny Scholfield, Sales Director at Expert Security UK, commented, "We are all delighted with the final result. The system is very fast and ticks all the boxes for us. As we are already using the Net2 system here at the HQ, it is great to see the ANPR integrating into the system without complication. The barrier system is a great security measure for us and has prevented unauthorized parking." The benefits of the Nortech ANPR system is that it integrates with most access control software, avoids the need for manned gates or vehicle tags, allows automatic vehicle identification at between three and six metres and prevents unauthorized vehicle access. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Following the recent successful installation of 360 Vision Technology’s new Invictus ruggedized PTZ camera by a north London borough, the same borough has now rolled-out over 100 Invictus cameras across seven Greater London towns. With an early success in prosecuting serious crime following the deployment of Invictus, its highly effective night-time HD quality color video footage proved to be just one of the useful attributes of the UK manufactured camera, when a recent significant impact by a vehicle to a camera column tested its suitability for roadside deployment. The Invictus camera took the high-speed impact in its stride and showcased its ‘Attack Detect’ feature, automatically resetting to the last viewing position prior to being forcibly moved from its previous viewing direction, and with no damage to the camera or its direct drive PTZ mechanism. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer" Importance Of Ruggedized Cameras Commenting on the broader roll-out of Invictus cameras, DSSL Group’s Works Director, Aaron Stephens, who specified the 360 Vision Technology cameras confirmed: “The importance of selecting a product that is ‘fit for purpose’ when being deployed roadside in a town center is often overlooked by some companies, who deploy non-ruggedized cameras purely on the basis of cost. If a PTZ camera were to fall from height following an impact, which is a real risk, there would be a substantial public health and safety incident. “At DSSL, we take a holistic view to consider the surveillance needs at each individual location, to ensure that all aspects of camera deployment are taken in to consideration. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer.” The expanded installation takes the total number of Invictus cameras to over 100; and allied to wireless links forming a major part of the system’s infrastructure, comment has been made regarding the superb quality of the Invictus camera video over wireless infrastructure. Simplified Surveillance Operation Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras"In a market often dominated by imported Far East products, the integration of Genetec Security Center and high-performance Invictus PTZ cameras has proven the effectiveness of two Commonwealth technology providers. Commenting on the camera/control technology collaboration, Genetec Country Manager, Paul Dodds said: “Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras. Genetec Security Center unified platform and Omnicast video surveillance has been used to seamlessly blend full Invictus camera menu control, within a single intuitive interface. 360 Vision cameras are a Genetec certified product on our supported device list. This successful deep integration has simplified the London borough’s surveillance operation and effective management. We value all of our technology partnerships, and especially with manufacturers such as 360 Vision Technology, who offer reliability with their Invictus PTZ cameras, as illustrated here across seven north London towns.” Reducing Carbon Footprint With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption"Adrian Kirk, Strategic Account Director at 360 Vision commented on the green credentials of Invictus, which was a factor in the overall decision by DSSL to specify the camera: “With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption. “On larger projects like this, the savings on energy and reduction in associated pollution offers significant advantages over Far East camera alternatives, helping Local Authority end-user system operators to meet their carbon footprint reduction goals. “With a host of performance and user centric operational benefits, Invictus is well placed to feature extensively in future Local Authority upgrades, as customers look at total cost of ownership and the need to ensure CCTV equipment deployed road side is fit for purpose.”
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking Objects In Real Time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyze and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced Awareness Picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat Intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security Automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimized to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-In Intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behavior, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control center staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make Significant Differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end"“We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?